Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe

Overview

General Information

Sample name:44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe
Analysis ID:1581280
MD5:fff61bb50d1a423f5f92626a07c18221
SHA1:3c6807f3da269f5a5dda12d063d02ab01e4aa5f6
SHA256:44ba92cfe6426e6b641bda018ec4850696b32035a60e8d130086fdcb1604a2fc
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-27T10:11:55.591836+010020528751A Network Trojan was detected192.168.2.549704156.224.26.1286666TCP
2024-12-27T10:13:06.388072+010020528751A Network Trojan was detected192.168.2.549705156.224.26.1286666TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeReversingLabs: Detection: 68%
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeVirustotal: Detection: 69%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

Compliance

barindex
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeUnpacked PE file: 0.2.44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe.2860000.2.unpack
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: z:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: x:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: v:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: t:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: r:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: p:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: n:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: l:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: j:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: h:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: f:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: b:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: y:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: w:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: u:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: s:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: q:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: o:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: m:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: k:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: i:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: g:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile opened: [:Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02869BC0 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,0_2_02869BC0

Networking

barindex
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.5:49704 -> 156.224.26.128:6666
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.5:49705 -> 156.224.26.128:6666
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 156.224.26.128:6666
Source: Joe Sandbox ViewASN Name: VPSQUANUS VPSQUANUS
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: unknownTCP traffic detected without corresponding DNS query: 156.224.26.128
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02863670 select,recv,_errno,_errno,_errno,0_2_02863670

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: [esc]0_2_02872280
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02872280 Sleep,SleepEx,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_02872280
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02872280 Sleep,SleepEx,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_02872280
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286EE40 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,0_2_0286EE40
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02871E70 SHGetFolderPathW,lstrcatW,CreateMutexW,CreateMutexExW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_02871E70
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286E2F7 ExitProcess,ExitWindowsEx,0_2_0286E2F7
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286E327 ExitWindowsEx,0_2_0286E327
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286E348 ExitWindowsEx,0_2_0286E348
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028802A40_2_028802A4
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028633700_2_02863370
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028686F00_2_028686F0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02871E700_2_02871E70
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028717900_2_02871790
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028677A00_2_028677A0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028667A00_2_028667A0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286B2B00_2_0286B2B0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287CAF00_2_0287CAF0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028762100_2_02876210
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0288CA740_2_0288CA74
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02863BB00_2_02863BB0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287B3400_2_0287B340
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028698B00_2_028698B0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028838D00_2_028838D0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028628500_2_02862850
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028811B00_2_028811B0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286F9F00_2_0286F9F0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287B1040_2_0287B104
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028659300_2_02865930
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287C15C0_2_0287C15C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028691700_2_02869170
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287D6380_2_0287D638
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286EE400_2_0286EE40
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286F7800_2_0286F780
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02882F800_2_02882F80
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0288CFB00_2_0288CFB0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0288BFC00_2_0288BFC0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287F7F80_2_0287F7F8
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028697100_2_02869710
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02889F100_2_02889F10
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028807240_2_02880724
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0288B75C0_2_0288B75C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287ACE00_2_0287ACE0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286C4000_2_0286C400
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02880D100_2_02880D10
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609073D00_2_00007FF6609073D0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609033900_2_00007FF660903390
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF660906F700_2_00007FF660906F70
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609068600_2_00007FF660906860
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090E1C00_2_00007FF66090E1C0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090A30C0_2_00007FF66090A30C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090C28C0_2_00007FF66090C28C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609124BC0_2_00007FF6609124BC
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF660916C500_2_00007FF660916C50
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF660906C800_2_00007FF660906C80
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090AD440_2_00007FF66090AD44
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609158CC0_2_00007FF6609158CC
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609161300_2_00007FF660916130
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609148980_2_00007FF660914898
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF6609028800_2_00007FF660902880
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0281F2510_2_0281F251
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02832A510_2_02832A51
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028212610_2_02821261
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028172710_2_02817271
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028162710_2_02816271
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028193810_2_02819381
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028123210_2_02812321
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028301F50_2_028301F5
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0281E9110_2_0281E911
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028219410_2_02821941
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028136810_2_02813681
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0281BED10_2_0281BED1
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02812E410_2_02812E41
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0282A7B10_2_0282A7B1
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028307E10_2_028307E1
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02825CE10_2_02825CE1
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028154010_2_02815401
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0282BC2D0_2_0282BC2D
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02818C410_2_02818C41
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0282FD750_2_0282FD75
Source: classification engineClassification label: mal84.spyw.evad.winEXE@1/1@0/1
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286AB60 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0286AB60
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028690B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_028690B0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02868F30 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,0_2_02868F30
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02869590 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_02869590
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02868430 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,0_2_02868430
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02867150 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_02867150
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028677A0 lstrcatW,lstrcatW,CoCreateInstance,wsprintfW,RegOpenKeyExW,RegQueryValueExW,lstrcatW,lstrcatW,RegCloseKey,lstrlenW,lstrcatW,0_2_028677A0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.22
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeReversingLabs: Detection: 68%
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeVirustotal: Detection: 69%
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile read: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: dinput8.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: hid.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: devenum.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25E609E4-B259-11CF-BFC7-444553540000}\InProcServer32Jump to behavior
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeUnpacked PE file: 0.2.44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe.2860000.2.unpack
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02871790 GetVersionExW,LoadLibraryA,GetProcAddress,SetProcessMitigationPolicy,Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,SleepEx,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,0_2_02871790
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeStatic PE information: real checksum: 0x2bb4f should be: 0x20d5c
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0288F94B push rbp; retf 0_2_0288F974
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02830755 pushfd ; ret 0_2_0283075A
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286E29A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_0286E29A
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeKey value created or modified: HKEY_CURRENT_USER\Console\1 d33f351a4aeea5e608853d1a56661059Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeWindow / User API: threadDelayed 1501Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeWindow / User API: threadDelayed 752Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeWindow / User API: foregroundWindowGot 1704Jump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-37313
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-37955
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02869BC0 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,0_2_02869BC0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028667A0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetLocalTime,wsprintfW,lstrlenW,RegSetValueExW,RegCloseKey,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,GetTickCount,_localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,0_2_028667A0
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe, 00000000.00000002.3242559682.0000000000C5B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllCC
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeAPI call chain: ExitProcess graph end nodegraph_0-36939
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeAPI call chain: ExitProcess graph end nodegraph_0-36936
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02874F50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02874F50
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02871790 GetVersionExW,LoadLibraryA,GetProcAddress,SetProcessMitigationPolicy,Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,SleepEx,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,0_2_02871790
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02867EA0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_02867EA0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02871790 GetVersionExW,LoadLibraryA,GetProcAddress,SetProcessMitigationPolicy,Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,SleepEx,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,0_2_02871790
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02874F50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02874F50
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0287C444 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0287C444
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF660908580 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF660908580
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF660908AD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF660908AD0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090A5F4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF66090A5F4
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_00007FF66090CF6C SetUnhandledExceptionFilter,0_2_00007FF66090CF6C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028698B0 GetSystemDirectoryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,GetThreadContext,SetThreadContext,ResumeThread,0_2_028698B0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02869170 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_02869170
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286A670 VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,VirtualFreeEx,0_2_0286A670
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_02869170
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_0286FD50 lstrlenW,ShellExecuteW,0_2_0286FD50
Source: DisplaySessionContainers.log.0.drBinary or memory string: :]Program Manager
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe, 00000000.00000003.2116639169.000000000450E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 54HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free3 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe, 00000000.00000002.3243323978.0000000002FC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe, 00000000.00000003.2116547537.0000000004481000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .2.5 0 min562258Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free3 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetLocalTime,wsprintfW,lstrlenW,RegSetValueExW,RegCloseKey,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,GetTickCount,_localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,0_2_028667A0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoW,0_2_0288629C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: EnumSystemLocalesA,0_2_028863CC
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: GetLastError,free,free,GetLocaleInfoW,GetLocaleInfoW,free,GetLocaleInfoW,0_2_0287E8A0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: _getptd,GetLocaleInfoA,0_2_02885E54
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,free,0_2_02887664
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,0_2_02885FCC
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: GetLocaleInfoW,0_2_02885F3C
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,GetLocaleInfoW,GetLocaleInfoW,GetACP,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,0_2_028864D0
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: EnumSystemLocalesA,0_2_02886464
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02872140 GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,0_2_02872140
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_028802A4 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_028802A4
Source: C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeCode function: 0_2_02868220 GetCurrentProcessId,wsprintfW,GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,wsprintfW,0_2_02868220
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: acs.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: vsserv.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: avcenter.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: kxetray.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: avp.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: cfp.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: KSafeTray.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: 360Safe.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: rtvscan.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: 360tray.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: TMBMSRV.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: ashDisp.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: 360Tray.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: avgwdsvc.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: AYAgent.aye
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: QUHLPSVC.EXE
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: RavMonD.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: Mcshield.exe
Source: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exeBinary or memory string: K7TSecurity.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
2
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Modify Registry
121
Input Capture
2
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Access Token Manipulation
1
Access Token Manipulation
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol121
Input Capture
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
Process Injection
211
Process Injection
Security Account Manager3
Process Discovery
SMB/Windows Admin Shares1
Archive Collected Data
1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object Model2
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets11
Peripheral Device Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Indicator Removal
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync16
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe68%ReversingLabsWin64.Backdoor.Farfli
44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe69%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
156.224.26.128
unknownSeychelles
62468VPSQUANUStrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581280
Start date and time:2024-12-27 10:11:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe
Detection:MAL
Classification:mal84.spyw.evad.winEXE@1/1@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 67
  • Number of non-executed functions: 291
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.63
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
TimeTypeDescription
04:12:50API Interceptor4113x Sleep call for process: 44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
VPSQUANUSCnjMEmbChO.exeGet hashmaliciousUnknownBrowse
  • 198.44.170.193
Fqae7BLq4m.exeGet hashmaliciousUnknownBrowse
  • 43.250.172.42
236236236.elfGet hashmaliciousUnknownBrowse
  • 154.91.51.168
x.batGet hashmaliciousUnknownBrowse
  • 103.230.121.81
product.batGet hashmaliciousUnknownBrowse
  • 103.230.121.81
test.exeGet hashmaliciousUnknownBrowse
  • 103.230.121.81
Filezilla-stage2.exeGet hashmaliciousUnknownBrowse
  • 103.230.121.81
rebirth.dbg.elfGet hashmaliciousMirai, OkiruBrowse
  • 103.252.20.25
mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
  • 103.122.177.128
la.bot.arm.elfGet hashmaliciousMiraiBrowse
  • 154.91.52.33
No context
No context
Process:C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe
File Type:data
Category:dropped
Size (bytes):28020
Entropy (8bit):3.613497441764929
Encrypted:false
SSDEEP:192:+44444yAAAAAAFFFFFFFKKKKKKKnnnnnnnccccccccBBBBBBBGGGGGGGGzzzzzzs:+
MD5:43AB57F3669000808EDD9711949B5532
SHA1:95C587FD483E1219B28F7CDB4B91827419112695
SHA-256:ED8FC85FE8AB9FAEE66082164559FE4033D627825A4ECBB93984D51BE046D431
SHA-512:191E5CBB94CDF4B3D05DE676808A34302E576B9BF95047CABADE73AE46A1AB7EA92377C9F762E093CF1E39F2540E7CC24C1FC167E4610EF79A82CCD3C8F88F50
Malicious:false
Reputation:low
Preview:....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.1.:.5.9.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.1.:.5.9.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.1.:.5.9.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.r.a.m. .M.a.n.a.g.e.r.....[..e..:.].2.0.2.4.-.1.2.-.2.7. . .4.:.1.2.:.0.....[..Q.[:.].....[..h..:.].P.r.o.g.
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.106287978128525
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe
File size:133'632 bytes
MD5:fff61bb50d1a423f5f92626a07c18221
SHA1:3c6807f3da269f5a5dda12d063d02ab01e4aa5f6
SHA256:44ba92cfe6426e6b641bda018ec4850696b32035a60e8d130086fdcb1604a2fc
SHA512:f5cd46d6d53adc94896befb11647f27c794769a4391bbbfc78585b43e4c28cd8d80078554b4280a69f83d3744f9bcc059a56adfb241ccc8ebfc168f9ba9ae4d5
SSDEEP:3072:lO55k/y5dAj+BMTYlgEQnB+Y+pek7+3OrFZeUqe6o/:lO5n5d56TYZQnB+Dpekyyqm
TLSH:BAD36D4733A450F9D4A7C279C9A24A06E7B374660735A7CF17A086AA2F137D1BD3A331
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........VF.g.F.g.F.g.)...+.g.)...M.g.)...k.g.O...M.g.F.f...g.)...K.g.)...G.g.RichF.g.........................PE..d.....ld.........."
Icon Hash:00928e8e8686b000
Entrypoint:0x140009a74
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x646C86AC [Tue May 23 09:26:04 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:fb51ede541a9ad63bf23d302e319d2a0
Instruction
dec eax
sub esp, 28h
call 00007FC444DF9F88h
dec eax
add esp, 28h
jmp 00007FC444DF616Bh
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], edi
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 60h
dec eax
mov edi, edx
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [ebp-40h]
dec eax
lea edx, dword ptr [0000EAE5h]
inc ecx
mov eax, 00000040h
call 00007FC444DF533Fh
dec eax
lea edx, dword ptr [ebp+10h]
dec eax
mov ecx, edi
dec eax
mov dword ptr [ebp-18h], ebx
dec eax
mov dword ptr [ebp-10h], edi
call 00007FC444DFDFF5h
dec esp
mov ebx, eax
dec eax
mov dword ptr [ebp+10h], eax
dec eax
mov dword ptr [ebp-08h], eax
dec eax
test edi, edi
je 00007FC444DF630Dh
test byte ptr [edi], 00000008h
mov ecx, 01994000h
je 00007FC444DF62F7h
mov dword ptr [ebp-20h], ecx
jmp 00007FC444DF62FEh
mov eax, dword ptr [ebp-20h]
dec ebp
test ebx, ebx
cmove eax, ecx
mov dword ptr [ebp-20h], eax
inc esp
mov eax, dword ptr [ebp-28h]
mov edx, dword ptr [ebp-3Ch]
mov ecx, dword ptr [ebp-40h]
dec esp
lea ecx, dword ptr [ebp-20h]
call dword ptr [0000E7AFh]
dec esp
lea ebx, dword ptr [esp+60h]
dec ecx
mov ebx, dword ptr [ebx+18h]
dec ecx
mov edi, dword ptr [ebx+20h]
dec ecx
mov esp, ebx
pop ebp
ret
int3
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 00000088h
dec eax
lea ecx, dword ptr [00016781h]
call dword ptr [0000E7B3h]
dec eax
mov eax, dword ptr [0001686Ch]
Programming Language:
  • [ C ] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1d0280x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000x1b4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x250000x1578.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x280000x2f8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x180000x438.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x166060x168009cde0d8ddbf108908aa730f375bc1766False0.5621636284722222zlib compressed data6.429037086317127IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x180000x5d3a0x5e00b44503f0aa67867070e1b6433af825a5False0.3683926196808511data4.8111582224132965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1e0000x67700x2200c8548a34de37ef2b1c82d7743b8b22d2False0.22012867647058823data2.7002917262797337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x250000x15780x16006b2fcd8de66b48f900df2c9c6b6db832False0.4728338068181818data5.019696142888745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x270000x1b40x2005f882a758b6b0045acd02c3e0551be90False0.486328125data5.112623549532036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x280000x5be0x6003b9d434e2274fd734402fea8d43c6f67False0.3587239583333333data3.4572271853315204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x270580x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
DLLImport
KERNEL32.dllHeapCreate, EnterCriticalSection, DeleteCriticalSection, WaitForSingleObject, SetEvent, Sleep, CreateEventA, GetLastError, CloseHandle, GetCurrentThreadId, SwitchToThread, SetLastError, WideCharToMultiByte, lstrlenW, ResetEvent, CreateEventW, CancelIo, TryEnterCriticalSection, SetWaitableTimer, CreateWaitableTimerW, GetThreadContext, SetThreadContext, LeaveCriticalSection, GetExitCodeProcess, CreateProcessA, GetSystemDirectoryA, VirtualAllocEx, WriteProcessMemory, ResumeThread, FreeLibrary, SetUnhandledExceptionFilter, GetCurrentProcess, LoadLibraryW, GetConsoleWindow, CreateFileW, GetProcAddress, GetLocalTime, IsDebuggerPresent, GetCurrentProcessId, CreateThread, LCMapStringW, WriteConsoleW, SetStdHandle, GetStringTypeW, MultiByteToWideChar, HeapDestroy, InitializeCriticalSectionAndSpinCount, HeapFree, HeapAlloc, VirtualAlloc, OpenProcess, VirtualFree, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetConsoleMode, FlushFileBuffers, GetConsoleCP, SetFilePointer, GetSystemTimeAsFileTime, GetTickCount, QueryPerformanceCounter, GetStartupInfoW, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, RtlUnwindEx, FlsAlloc, FlsFree, FlsSetValue, FlsGetValue, HeapReAlloc, HeapSize, GetProcessHeap, ExitThread, DecodePointer, EncodePointer, GetCommandLineW, RaiseException, RtlPcToFileHeader, TerminateProcess, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, HeapSetInformation, GetVersion, GetModuleHandleW, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW
USER32.dllDispatchMessageW, PostThreadMessageA, PeekMessageW, TranslateMessage, MsgWaitForMultipleObjects, ShowWindow, GetInputState, wsprintfW
ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteValueW, RegQueryValueExW, RegCreateKeyW, RegSetValueExW
WS2_32.dllWSAWaitForMultipleEvents, WSAIoctl, connect, WSAStartup, select, WSAResetEvent, setsockopt, recv, socket, closesocket, gethostbyname, send, WSASetLastError, WSACreateEvent, shutdown, WSAEventSelect, WSAEnumNetworkEvents, WSAGetLastError, WSACloseEvent, htons, WSACleanup
WINMM.dlltimeGetTime
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
2024-12-27T10:11:55.591836+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.549704156.224.26.1286666TCP
2024-12-27T10:13:06.388072+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.549705156.224.26.1286666TCP
TimestampSource PortDest PortSource IPDest IP
Dec 27, 2024 10:11:55.470416069 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:55.589934111 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:55.590019941 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:55.591835976 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:55.711270094 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.088419914 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.088850021 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.208399057 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.208427906 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.208470106 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612065077 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612112999 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612128973 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612158060 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.612196922 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612236977 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.612617970 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612658024 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.612700939 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.820180893 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.820233107 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.820244074 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.820255041 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.820291042 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.820343971 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.828438997 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.828552008 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.828599930 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.836436987 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.836551905 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.836612940 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:57.844734907 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:57.888298035 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.028481960 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.028542995 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.028598070 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.032649040 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.032671928 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.032711983 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.040992975 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.041102886 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.041148901 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.049407959 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.049583912 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.049623013 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.057753086 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.057832956 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.057873011 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.066174984 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.066200018 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.066240072 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.074469090 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.074584961 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.074635029 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.082865000 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.082977057 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.083028078 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.238296986 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.238471031 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.238513947 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.242142916 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.242296934 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.242340088 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.249825001 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.249963999 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.250010014 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.255865097 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.255984068 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.256026030 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.263495922 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.263637066 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.263684988 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.271069050 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.271177053 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.271219969 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.278717041 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.278822899 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.278899908 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.288304090 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.288314104 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.288394928 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.294029951 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.294253111 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.294320107 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.301635027 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.301747084 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.301796913 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.309241056 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.309345961 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.309422970 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.318244934 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.318422079 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.318480968 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.324862957 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.372684956 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.428527117 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.444896936 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.444984913 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.444984913 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.447773933 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.447830915 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.447855949 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.452347040 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.452411890 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.452474117 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.458245993 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.458321095 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.458363056 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.464143038 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.464230061 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.464243889 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.470052958 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.470124006 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.470160007 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.476069927 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.476135015 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.476162910 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.481748104 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.481803894 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.481977940 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.487643003 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.487740993 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.487750053 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.493505955 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.493602037 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.493614912 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.499407053 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.499456882 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.499461889 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.505266905 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.505326986 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.505368948 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.511161089 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.511224031 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.511322021 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.517009020 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.517066002 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.517199993 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.522905111 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.523047924 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.523087025 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.528747082 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.528812885 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.528893948 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.534676075 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.534765005 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.534784079 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.540514946 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.540580034 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.540649891 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.546451092 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.546510935 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.546555042 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.552289963 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.552395105 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.552398920 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.558119059 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.558198929 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.653199911 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.653310061 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.653476954 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.655432940 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.655554056 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.655616999 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.659905910 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.659961939 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.660039902 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.664351940 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.664556980 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.664761066 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.668672085 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.668802977 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.668850899 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.672993898 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.673094988 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.673160076 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.677189112 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.677306890 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.677378893 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.681294918 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.681428909 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.681498051 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.685256004 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.685400009 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.685446024 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.689276934 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.689452887 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.689564943 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.693195105 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.693278074 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.693346977 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.697074890 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.697170973 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.697247982 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.700946093 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.701062918 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.701129913 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.704895020 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.705041885 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.705156088 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.708724976 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.708765030 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.708816051 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.712615013 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.712726116 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.712785959 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.716550112 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.716666937 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.716733932 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.720442057 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.720545053 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.720611095 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.724322081 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.724375010 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.724457026 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.728209972 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.728319883 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.728383064 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.732136011 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.732278109 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.732347965 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.736037970 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.736133099 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.736269951 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.739978075 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.740106106 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.740171909 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.743830919 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.743913889 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.743971109 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.747690916 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.747797012 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.747868061 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.751609087 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.751775026 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.751818895 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.755474091 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.755583048 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.755697966 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.759315968 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.810165882 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.861407995 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.861500025 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.861628056 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.862711906 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.862847090 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.862927914 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.865470886 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.865587950 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.865720034 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.868237972 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.868350029 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.868432999 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.871035099 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.871112108 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.871196985 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.873709917 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.873841047 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.873903990 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.876360893 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.876478910 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.876548052 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.879019976 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.879132986 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.879281998 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.881629944 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.881747961 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.881789923 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.884179115 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.884291887 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.884346008 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.886746883 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.886856079 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.886902094 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.889301062 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.889408112 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.889467955 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.891870975 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.892062902 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.892110109 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.894469976 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.894547939 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.894591093 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.897008896 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.897111893 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.897169113 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.899525881 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.899645090 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.899693966 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.902254105 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.902358055 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.902416945 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.904694080 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.904865026 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.904925108 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.907269001 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.907325983 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.907412052 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.909847021 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.910016060 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.910096884 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.912369967 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.912492037 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.912539005 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.914927006 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.915113926 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.915154934 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.917464018 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.917547941 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.917597055 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.920028925 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.920147896 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.920233011 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.922595978 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.922661066 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.922739029 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.925254107 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.925398111 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.925893068 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.927704096 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.927849054 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.927938938 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.930275917 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.930394888 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.930438995 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.932815075 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.932925940 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.932992935 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.935389042 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.935486078 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.935560942 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.937982082 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.938087940 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.939394951 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.940499067 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.940628052 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.943089008 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.943160057 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.943166018 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.943258047 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.945688963 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.945820093 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.945884943 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.948204994 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.948326111 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.948381901 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.950748920 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.950855970 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.950943947 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.953310013 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.953423023 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.953479052 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.955872059 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.956028938 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.956113100 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.958431959 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.958550930 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.959389925 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.961004972 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.961112976 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.963433027 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.963546991 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.963691950 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:58.963758945 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:58.966105938 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.028898954 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:59.069417953 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.069551945 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.069612980 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:59.070370913 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.070508003 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.070573092 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:11:59.072274923 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.072336912 CET666649704156.224.26.128192.168.2.5
Dec 27, 2024 10:11:59.072453022 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:00.107960939 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:00.227399111 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:00.227490902 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:02.091470003 CET497046666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:05.206557989 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:05.326219082 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.326232910 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.326288939 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.326323986 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.326333046 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.736526012 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:05.737570047 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:05.857146978 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:16.466522932 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:16.586009026 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:16.988492012 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:17.028795004 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:17.099509954 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:17.218978882 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:34.013309956 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:34.133210897 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:34.535883904 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:34.591209888 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:34.642389059 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:34.762130976 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:50.419555902 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:50.731777906 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:50.803126097 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:50.851356030 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:51.206087112 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:12:51.247399092 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:51.292450905 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:12:51.412086010 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:06.388072014 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:06.507668018 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:06.918102026 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:06.966056108 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:07.033906937 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:07.153587103 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:23.116394043 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:23.236033916 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:23.638612986 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:23.684747934 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:23.739614964 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:23.859256029 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:39.684936047 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:39.804477930 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:40.207101107 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:40.247167110 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:40.278968096 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:40.398677111 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:55.965930939 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:56.086666107 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:56.489274979 CET666649705156.224.26.128192.168.2.5
Dec 27, 2024 10:13:56.543952942 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:56.695586920 CET497056666192.168.2.5156.224.26.128
Dec 27, 2024 10:13:56.815198898 CET666649705156.224.26.128192.168.2.5

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:04:11:52
Start date:27/12/2024
Path:C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\44ba92cfe6426e6b641bda018ec4850696b32035a60e8.exe"
Imagebase:0x7ff660900000
File size:133'632 bytes
MD5 hash:FFF61BB50D1A423F5F92626A07C18221
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:5.3%
    Dynamic/Decrypted Code Coverage:68.8%
    Signature Coverage:32.4%
    Total number of Nodes:1335
    Total number of Limit Nodes:55
    execution_graph 36715 2810000 36717 2810448 36715->36717 36718 28105b1 36717->36718 36719 28100dc 36717->36719 36720 2810116 36719->36720 36723 281032a 36719->36723 36721 2810147 VirtualAlloc 36720->36721 36720->36723 36721->36723 36724 2810168 36721->36724 36722 28102b7 LoadLibraryA 36722->36723 36722->36724 36723->36718 36724->36722 36724->36723 36725 7ff660903c10 WaitForSingleObject SleepEx WaitForSingleObject WaitForSingleObject Sleep 36726 2867580 CreateMutexW 36727 28675b0 realloc 36726->36727 36732 28675b7 __getgmtimebuf realloc 36727->36732 36738 28675e9 __getgmtimebuf memcpy_s 36727->36738 36728 2867661 _amsg_exit 36729 2867669 GetConsoleWindow 36728->36729 36744 2871e70 6 API calls 36729->36744 36730 28675cb CreateMutexW 36730->36732 36732->36730 36732->36738 36733 2867610 lstrlenW 36774 28685c0 36733->36774 36736 28676a6 36754 2872280 36736->36754 36737 286768c 36785 2874f50 36737->36785 36738->36728 36738->36733 36741 2867637 lstrcmpW 36738->36741 36741->36728 36741->36738 36742 286769e 36745 2871f2a _close_nolock 36744->36745 36746 2871f32 DeleteFileW 36745->36746 36747 2871f3b ReleaseMutex DirectInput8Create 36745->36747 36746->36747 36748 2871f6d 36747->36748 36751 2871f74 36747->36751 36749 2874f50 _fltout2 7 API calls 36748->36749 36750 2867688 36749->36750 36750->36736 36750->36737 36751->36748 36752 287201b GetTickCount GetKeyState 36751->36752 36753 2872038 36752->36753 36753->36748 36771 28722a2 __getgmtimebuf memcpy_s _ftelli64 36754->36771 36755 287230e SleepEx 36756 2872325 GetTickCount OpenClipboard GetClipboardData 36755->36756 36755->36771 36758 28723f0 CloseClipboard 36756->36758 36759 2872350 GlobalSize GlobalLock 36756->36759 36758->36771 36760 28723e0 GlobalUnlock 36759->36760 36762 287236e memcpy_s ctype 36759->36762 36760->36758 36761 28725ea lstrlenW 36761->36771 36762->36760 36764 28723af wsprintfW 36762->36764 36763 2872080 WaitForSingleObject CreateFileW lstrlenW WriteFile ReleaseMutex 36763->36771 36807 2872080 WaitForSingleObject CreateFileW 36764->36807 36766 2872482 GetKeyState 36766->36771 36767 2872588 wsprintfW 36767->36771 36768 2872555 wsprintfW 36768->36771 36769 28724d0 lstrlenW 36769->36771 36770 2872518 lstrlenW 36770->36771 36771->36755 36771->36761 36771->36763 36771->36766 36771->36767 36771->36768 36771->36769 36771->36770 36772 2872540 wsprintfW 36771->36772 36773 28724f7 lstrlenW 36771->36773 36796 2872140 36771->36796 36772->36771 36773->36771 36775 2877e30 memcpy_s 36774->36775 36776 2868607 RegOpenKeyExW 36775->36776 36777 2868634 36776->36777 36778 286862f 36776->36778 36779 28686a5 RegCloseKey RegCloseKey 36777->36779 36780 2868641 RegQueryValueExW 36777->36780 36778->36779 36781 2874f50 _fltout2 7 API calls 36779->36781 36780->36779 36782 2868677 lstrcmpW 36780->36782 36783 28686cf 36781->36783 36782->36778 36784 2868692 lstrcpyW 36782->36784 36783->36738 36784->36779 36786 2874f59 36785->36786 36787 2874f64 36786->36787 36788 287ba30 RtlCaptureContext RtlLookupFunctionEntry 36786->36788 36787->36742 36789 287bab5 36788->36789 36790 287ba74 RtlVirtualUnwind 36788->36790 36791 287bad7 IsDebuggerPresent 36789->36791 36790->36791 36817 28869f4 36791->36817 36793 287bb36 SetUnhandledExceptionFilter UnhandledExceptionFilter 36794 287bb54 _fltout2 36793->36794 36795 287bb64 TerminateProcess 36794->36795 36795->36742 36813 2877e30 36796->36813 36799 28721ab memcpy_s 36800 28721bf lstrlenW 36799->36800 36801 287224e 36799->36801 36800->36801 36802 28721d0 GetLocalTime wsprintfW 36800->36802 36803 2874f50 _fltout2 7 API calls 36801->36803 36804 2872080 5 API calls 36802->36804 36805 287226e 36803->36805 36806 2872235 memcpy_s 36804->36806 36805->36771 36806->36801 36808 2872131 36807->36808 36809 28720d8 write_char 36807->36809 36808->36762 36810 28720f4 lstrlenW WriteFile 36809->36810 36815 288f430 36810->36815 36814 287216f GetForegroundWindow GetWindowTextW 36813->36814 36814->36799 36816 288f432 36815->36816 36817->36793 36818 28637c0 36819 2863833 36818->36819 36821 28637d8 __getgmtimebuf 36818->36821 36820 286380f timeGetTime 36820->36821 36821->36819 36821->36820 36822 7ff6609098fc 36823 7ff660909914 36822->36823 36862 7ff660909ec8 HeapCreate 36823->36862 36826 7ff66090997f 36867 7ff66090bbcc 36826->36867 36827 7ff660909966 36934 7ff66090a56c 62 API calls 2 library calls 36827->36934 36828 7ff66090996b 36935 7ff66090a30c 62 API calls 4 library calls 36828->36935 36833 7ff660909975 36936 7ff660909f5c GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 36833->36936 36834 7ff6609099aa _RTC_Initialize 36883 7ff66090d3cc GetStartupInfoW 36834->36883 36836 7ff660909996 36938 7ff66090a30c 62 API calls 4 library calls 36836->36938 36837 7ff660909991 36937 7ff66090a56c 62 API calls 2 library calls 36837->36937 36840 7ff6609099a0 36939 7ff660909f5c GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 36840->36939 36844 7ff6609099c3 GetCommandLineW 36896 7ff66090d344 GetEnvironmentStringsW 36844->36896 36850 7ff6609099ef 36909 7ff66090cf84 36850->36909 36854 7ff660909a02 36923 7ff66090a040 36854->36923 36857 7ff660909a0c 36858 7ff660909a17 36857->36858 36943 7ff66090a2b8 62 API calls 2 library calls 36857->36943 36931 7ff660908580 6 API calls 36858->36931 36861 7ff660909a37 36863 7ff660909959 36862->36863 36864 7ff660909ef0 GetVersion 36862->36864 36863->36826 36863->36827 36863->36828 36865 7ff660909efa HeapSetInformation 36864->36865 36866 7ff660909f14 36864->36866 36865->36866 36866->36863 36944 7ff660909f8c 36867->36944 36869 7ff66090bbd7 36948 7ff66090d7cc 36869->36948 36872 7ff66090bc40 36966 7ff66090b8d0 65 API calls free 36872->36966 36873 7ff66090bbe0 FlsAlloc 36873->36872 36874 7ff66090bbf8 36873->36874 36952 7ff66090c0a0 36874->36952 36877 7ff660909984 36877->36834 36877->36836 36877->36837 36879 7ff66090bc0f FlsSetValue 36879->36872 36880 7ff66090bc22 36879->36880 36957 7ff66090b8f8 36880->36957 36884 7ff66090c0a0 __onexitinit 62 API calls 36883->36884 36895 7ff66090d402 36884->36895 36885 7ff6609099b5 36885->36844 36940 7ff66090a2b8 62 API calls 2 library calls 36885->36940 36886 7ff66090d5d9 GetStdHandle 36891 7ff66090d5b4 36886->36891 36887 7ff66090d609 GetFileType 36887->36891 36888 7ff66090c0a0 __onexitinit 62 API calls 36888->36895 36889 7ff66090d529 36889->36891 36893 7ff66090d562 InitializeCriticalSectionAndSpinCount 36889->36893 36894 7ff66090d554 GetFileType 36889->36894 36890 7ff66090d672 SetHandleCount 36890->36885 36891->36886 36891->36887 36891->36890 36892 7ff66090d633 InitializeCriticalSectionAndSpinCount 36891->36892 36892->36885 36892->36891 36893->36885 36893->36889 36894->36889 36894->36893 36895->36885 36895->36888 36895->36889 36895->36891 36897 7ff66090d368 36896->36897 36898 7ff6609099d5 36896->36898 36987 7ff66090c020 62 API calls malloc 36897->36987 36903 7ff66090d254 GetModuleFileNameW 36898->36903 36901 7ff66090d38f __initmbctable 36902 7ff66090d3a8 FreeEnvironmentStringsW 36901->36902 36902->36898 36904 7ff66090d294 __wsetargv 36903->36904 36905 7ff6609099e1 36904->36905 36906 7ff66090d2ef 36904->36906 36905->36850 36941 7ff66090a2b8 62 API calls 2 library calls 36905->36941 36988 7ff66090c020 62 API calls malloc 36906->36988 36908 7ff66090d2f4 __wsetargv 36908->36905 36910 7ff66090cfb7 _amsg_exit 36909->36910 36919 7ff6609099f4 36909->36919 36911 7ff66090c0a0 __onexitinit 62 API calls 36910->36911 36912 7ff66090cfe4 _amsg_exit 36911->36912 36914 7ff66090d04c 36912->36914 36915 7ff66090c0a0 __onexitinit 62 API calls 36912->36915 36916 7ff66090d0a1 36912->36916 36912->36919 36920 7ff66090d08c 36912->36920 36989 7ff6609092d0 62 API calls 2 library calls 36912->36989 36990 7ff660909030 62 API calls 2 library calls 36914->36990 36915->36912 36992 7ff660909030 62 API calls 2 library calls 36916->36992 36919->36854 36942 7ff66090a2b8 62 API calls 2 library calls 36919->36942 36991 7ff66090a740 16 API calls _fltout2 36920->36991 36925 7ff66090a056 _cinit 36923->36925 36993 7ff66090db08 36925->36993 36926 7ff66090a073 _initterm_e 36929 7ff66090a0b9 _cinit 36926->36929 36996 7ff660909728 36926->36996 36928 7ff66090a096 36928->36929 36999 7ff6609174f0 WSAStartup 36928->36999 36929->36857 37032 7ff6609073d0 36931->37032 36934->36828 36935->36833 36937->36836 36938->36840 36967 7ff66090b8ac EncodePointer 36944->36967 36946 7ff660909f97 _initp_misc_winsig 36947 7ff66090dae0 EncodePointer 36946->36947 36947->36869 36949 7ff66090d7ef 36948->36949 36950 7ff66090d7f5 InitializeCriticalSectionAndSpinCount 36949->36950 36951 7ff66090bbdc 36949->36951 36950->36949 36950->36951 36951->36872 36951->36873 36953 7ff66090c0c5 36952->36953 36955 7ff66090bc07 36953->36955 36956 7ff66090c0e3 Sleep 36953->36956 36968 7ff66090fcb4 36953->36968 36955->36872 36955->36879 36956->36953 36956->36955 36979 7ff66090d9d8 36957->36979 36959 7ff66090b951 36960 7ff66090d8d8 _freefls LeaveCriticalSection 36959->36960 36961 7ff66090b966 36960->36961 36962 7ff66090d9d8 _lock 62 API calls 36961->36962 36963 7ff66090b970 _errno 36962->36963 36964 7ff66090d8d8 _freefls LeaveCriticalSection 36963->36964 36965 7ff66090b9a2 GetCurrentThreadId 36964->36965 36965->36877 36966->36877 36969 7ff66090fcc9 36968->36969 36974 7ff66090fce6 36968->36974 36970 7ff66090fcd7 36969->36970 36969->36974 36976 7ff660909384 62 API calls _errno 36970->36976 36972 7ff66090fcfe HeapAlloc 36973 7ff66090fcdc 36972->36973 36972->36974 36973->36953 36974->36972 36974->36973 36977 7ff66090a5b8 DecodePointer 36974->36977 36976->36973 36978 7ff66090a5d3 36977->36978 36978->36974 36980 7ff66090d9f6 36979->36980 36981 7ff66090da07 EnterCriticalSection 36979->36981 36985 7ff66090d8f0 62 API calls 7 library calls 36980->36985 36983 7ff66090d9fb 36983->36981 36986 7ff66090a2b8 62 API calls 2 library calls 36983->36986 36985->36983 36987->36901 36988->36908 36989->36912 36990->36919 36992->36919 36994 7ff66090db1e EncodePointer 36993->36994 36994->36994 36995 7ff66090db33 36994->36995 36995->36926 37004 7ff66090961c 36996->37004 36998 7ff660909731 36998->36928 37000 7ff660909728 _cinit 72 API calls 36999->37000 37001 7ff660917538 37000->37001 37020 7ff660908ad0 37001->37020 37003 7ff660917544 37003->36928 37019 7ff660909f74 37004->37019 37006 7ff66090963d DecodePointer DecodePointer 37007 7ff660909667 37006->37007 37010 7ff660909702 _cinit 37006->37010 37008 7ff66090c1b4 _cinit 63 API calls 37007->37008 37007->37010 37009 7ff660909683 37008->37009 37011 7ff6609096e0 EncodePointer EncodePointer 37009->37011 37012 7ff66090969f 37009->37012 37013 7ff6609096b0 37009->37013 37010->36998 37011->37010 37014 7ff66090c124 _cinit 66 API calls 37012->37014 37013->37010 37015 7ff6609096a7 37013->37015 37014->37015 37015->37013 37016 7ff66090c124 _cinit 66 API calls 37015->37016 37017 7ff6609096c8 EncodePointer 37015->37017 37018 7ff6609096c3 37016->37018 37017->37011 37018->37010 37018->37017 37021 7ff660908ad9 37020->37021 37022 7ff660908ae4 37021->37022 37023 7ff660909b1c RtlCaptureContext RtlLookupFunctionEntry 37021->37023 37022->37003 37024 7ff660909b60 RtlVirtualUnwind 37023->37024 37025 7ff660909ba1 37023->37025 37026 7ff660909bc3 IsDebuggerPresent 37024->37026 37025->37026 37031 7ff66090d7c4 37026->37031 37028 7ff660909c22 SetUnhandledExceptionFilter UnhandledExceptionFilter 37029 7ff660909c4a GetCurrentProcess TerminateProcess 37028->37029 37030 7ff660909c40 _cftof_l 37028->37030 37029->37003 37030->37029 37031->37028 37033 7ff6609073e4 _vsprintf_s_l 37032->37033 37092 7ff660908021 CreateThread WaitForSingleObject CloseHandle Sleep 37032->37092 37093 7ff6609072a0 37033->37093 37035 7ff660907440 37036 7ff6609072a0 3 API calls 37035->37036 37037 7ff660907456 lstrlenW lstrlenW 37036->37037 37039 7ff660907489 37037->37039 37038 7ff6609072a0 3 API calls 37040 7ff66090752f 37038->37040 37039->37038 37041 7ff6609072a0 3 API calls 37040->37041 37042 7ff660907545 lstrlenW lstrlenW 37041->37042 37045 7ff660907574 37042->37045 37043 7ff6609072a0 3 API calls 37044 7ff66090760f 37043->37044 37046 7ff6609072a0 3 API calls 37044->37046 37045->37043 37047 7ff660907625 lstrlenW lstrlenW 37046->37047 37050 7ff660907654 37047->37050 37048 7ff6609072a0 3 API calls 37049 7ff6609076f3 37048->37049 37051 7ff6609072a0 3 API calls 37049->37051 37050->37048 37052 7ff660907709 37051->37052 37053 7ff6609072a0 3 API calls 37052->37053 37054 7ff66090771f 37053->37054 37055 7ff6609072a0 3 API calls 37054->37055 37056 7ff660907735 37055->37056 37057 7ff6609072a0 3 API calls 37056->37057 37058 7ff66090774b lstrlenW lstrlenW 37057->37058 37059 7ff66090780d lstrlenW lstrlenW 37058->37059 37063 7ff66090777a 37058->37063 37060 7ff6609078cd lstrlenW lstrlenW 37059->37060 37065 7ff66090783c 37059->37065 37061 7ff66090798d lstrlenW lstrlenW 37060->37061 37067 7ff6609078fc 37060->37067 37062 7ff660907a4d lstrlenW lstrlenW 37061->37062 37070 7ff6609079bc 37061->37070 37064 7ff660907b0d lstrlenW lstrlenW 37062->37064 37074 7ff660907a7c 37062->37074 37063->37059 37066 7ff660907bcd lstrlenW lstrlenW 37064->37066 37073 7ff660907b3c 37064->37073 37065->37060 37068 7ff660907c8d lstrlenW lstrlenW 37066->37068 37075 7ff660907bfc 37066->37075 37067->37061 37069 7ff660907d4d RegOpenKeyExW 37068->37069 37076 7ff660907cbc 37068->37076 37071 7ff660907dbb _vsprintf_s_l 37069->37071 37072 7ff660907d8b RegQueryValueExW 37069->37072 37070->37062 37077 7ff660907dd6 RegQueryValueExW 37071->37077 37071->37092 37072->37071 37073->37066 37074->37064 37075->37068 37076->37069 37078 7ff6609072a0 3 API calls 37077->37078 37079 7ff660907e18 37078->37079 37080 7ff6609072a0 3 API calls 37079->37080 37081 7ff660907e2e lstrlenW lstrlenW 37080->37081 37082 7ff660907e52 37081->37082 37083 7ff6609072a0 3 API calls 37082->37083 37084 7ff660907ede 37083->37084 37085 7ff6609072a0 3 API calls 37084->37085 37086 7ff660907ef4 lstrlenW lstrlenW 37085->37086 37091 7ff660907f23 37086->37091 37087 7ff6609072a0 3 API calls 37088 7ff660907fe3 37087->37088 37089 7ff6609072a0 3 API calls 37088->37089 37090 7ff660907ff9 lstrlenW lstrlenW 37089->37090 37090->37092 37091->37087 37092->36861 37094 7ff6609072cc lstrlenW 37093->37094 37095 7ff6609072e6 lstrlenW lstrlenW 37093->37095 37098 7ff66090b7c0 37094->37098 37097 7ff660907314 __initmbctable 37095->37097 37097->37035 37099 7ff66090b7c9 37098->37099 37099->37095 37099->37099 37100 7ff66090945c 37101 7ff66090946a 37100->37101 37102 7ff6609094aa 37101->37102 37106 7ff66090947e 37101->37106 37110 7ff66090ba58 37102->37110 37104 7ff6609094d6 37142 7ff660909430 37104->37142 37108 7ff6609094a0 GetCurrentThreadId 37106->37108 37109 7ff660909491 GetLastError ExitThread 37106->37109 37107 7ff6609094db 37108->37104 37111 7ff66090bb80 37110->37111 37112 7ff66090ba61 37110->37112 37111->37104 37113 7ff66090ba7c 37112->37113 37151 7ff660909030 62 API calls 2 library calls 37112->37151 37115 7ff66090ba8a 37113->37115 37152 7ff660909030 62 API calls 2 library calls 37113->37152 37117 7ff66090ba98 37115->37117 37153 7ff660909030 62 API calls 2 library calls 37115->37153 37119 7ff66090baa6 37117->37119 37154 7ff660909030 62 API calls 2 library calls 37117->37154 37121 7ff66090bab4 37119->37121 37155 7ff660909030 62 API calls 2 library calls 37119->37155 37123 7ff66090bac2 37121->37123 37156 7ff660909030 62 API calls 2 library calls 37121->37156 37124 7ff66090bad3 37123->37124 37157 7ff660909030 62 API calls 2 library calls 37123->37157 37127 7ff66090baeb 37124->37127 37158 7ff660909030 62 API calls 2 library calls 37124->37158 37129 7ff66090d9d8 _lock 62 API calls 37127->37129 37133 7ff66090baf7 37129->37133 37130 7ff66090bb24 37160 7ff66090d8d8 LeaveCriticalSection 37130->37160 37133->37130 37159 7ff660909030 62 API calls 2 library calls 37133->37159 37161 7ff66090ba34 37142->37161 37145 7ff660909447 37189 7ff66090940c 37145->37189 37147 7ff66090944e __CxxFrameHandler 37147->37107 37151->37113 37152->37115 37153->37117 37154->37119 37155->37121 37156->37123 37157->37124 37158->37127 37159->37130 37194 7ff66090b9b0 GetLastError FlsGetValue 37161->37194 37163 7ff66090ba3f 37164 7ff660909439 37163->37164 37206 7ff66090a2b8 62 API calls 2 library calls 37163->37206 37166 7ff6609037e0 37164->37166 37171 7ff660903690 37164->37171 37180 7ff660906690 37164->37180 37167 7ff660903853 37166->37167 37170 7ff6609037f8 37166->37170 37167->37145 37168 7ff660903806 SleepEx 37168->37170 37169 7ff66090382f timeGetTime 37169->37170 37170->37167 37170->37168 37170->37169 37179 7ff6609036c0 __initmbctable 37171->37179 37172 7ff660903778 37174 7ff660908ad0 _cftof_l 8 API calls 37172->37174 37173 7ff660903710 select 37173->37172 37173->37179 37175 7ff6609037b0 37174->37175 37175->37145 37176 7ff660903738 recv 37176->37179 37178 7ff660909384 62 API calls _errno 37178->37179 37179->37172 37179->37173 37179->37176 37179->37178 37208 7ff660903c80 37179->37208 37181 7ff6609066a8 __initmbctable 37180->37181 37182 7ff6609066cb RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 37181->37182 37183 7ff6609067a4 37182->37183 37184 7ff66090673d 37182->37184 37183->37145 37186 7ff660906764 OpenProcess 37184->37186 37188 7ff660906797 Sleep 37184->37188 37324 7ff660906c80 89 API calls 2 library calls 37184->37324 37186->37184 37187 7ff66090677b GetExitCodeProcess 37186->37187 37187->37184 37188->37186 37190 7ff66090b9b0 _errno 62 API calls 37189->37190 37191 7ff660909419 37190->37191 37192 7ff660909426 ExitThread 37191->37192 37325 7ff66090bb8c 64 API calls _freefls 37191->37325 37195 7ff66090b9d6 37194->37195 37196 7ff66090ba1e SetLastError 37194->37196 37197 7ff66090c0a0 __onexitinit 57 API calls 37195->37197 37196->37163 37198 7ff66090b9e3 37197->37198 37198->37196 37199 7ff66090b9eb FlsSetValue 37198->37199 37200 7ff66090ba17 37199->37200 37201 7ff66090ba01 37199->37201 37207 7ff660909030 62 API calls 2 library calls 37200->37207 37202 7ff66090b8f8 _errno 57 API calls 37201->37202 37205 7ff66090ba08 GetCurrentThreadId 37202->37205 37204 7ff66090ba1c 37204->37196 37205->37196 37207->37204 37222 7ff660901080 37208->37222 37210 7ff660903eae 37210->37179 37211 7ff660903e95 37213 7ff6609011f0 65 API calls 37211->37213 37212 7ff660903ca8 __initmbctable 37212->37210 37212->37211 37214 7ff660903d24 timeGetTime 37212->37214 37216 7ff660901080 65 API calls 37212->37216 37218 7ff660903e31 VirtualAlloc 37212->37218 37238 7ff660906860 37212->37238 37265 7ff660911874 37212->37265 37213->37210 37229 7ff6609011f0 37214->37229 37216->37212 37219 7ff660903e52 __initmbctable 37218->37219 37220 7ff660903e6a VirtualFree 37219->37220 37220->37212 37223 7ff6609010a9 37222->37223 37224 7ff660911874 63 API calls 37223->37224 37226 7ff660901139 __initmbctable 37223->37226 37225 7ff6609010e2 VirtualAlloc 37224->37225 37227 7ff66090110a __initmbctable 37225->37227 37226->37212 37227->37226 37228 7ff66090112b VirtualFree 37227->37228 37228->37226 37230 7ff660901200 37229->37230 37231 7ff66090120a 37230->37231 37232 7ff660911874 63 API calls 37230->37232 37231->37212 37233 7ff66090122f 37232->37233 37234 7ff66090123c 37233->37234 37235 7ff660901249 VirtualAlloc 37233->37235 37234->37212 37236 7ff660901273 __initmbctable 37235->37236 37237 7ff660901289 VirtualFree 37236->37237 37237->37212 37239 7ff660906882 37238->37239 37262 7ff660906b19 37238->37262 37240 7ff660906894 RegOpenKeyExW 37239->37240 37241 7ff660906b26 __initmbctable 37239->37241 37242 7ff6609068d5 RegQueryValueExW 37240->37242 37243 7ff6609069ca 37240->37243 37245 7ff660906b3b VirtualAlloc 37241->37245 37244 7ff6609069bf RegCloseKey 37242->37244 37250 7ff660906916 _vsprintf_s_l 37242->37250 37246 7ff660906c2e 37243->37246 37247 7ff6609069fc 37243->37247 37244->37243 37256 7ff660906b71 __initmbctable 37245->37256 37290 7ff6609094dc 37246->37290 37248 7ff660906a08 VirtualFree 37247->37248 37261 7ff660906a1d _vsprintf_s_l __initmbctable 37247->37261 37248->37261 37252 7ff66090693a RegQueryValueExW 37250->37252 37253 7ff66090696b __initmbctable 37252->37253 37254 7ff6609069b7 37252->37254 37255 7ff660906980 VirtualAlloc 37253->37255 37254->37244 37311 7ff660908b00 37255->37311 37256->37246 37258 7ff660906bc0 RegCreateKeyW 37256->37258 37259 7ff660906bdf RegDeleteValueW RegSetValueExW 37258->37259 37260 7ff660906c19 RegCloseKey 37258->37260 37259->37260 37260->37246 37261->37262 37269 7ff660903860 GetCurrentThreadId 37261->37269 37262->37212 37266 7ff6609118b0 37265->37266 37267 7ff66091190b 37265->37267 37266->37267 37323 7ff660912db8 63 API calls 4 library calls 37266->37323 37267->37212 37270 7ff66090388e 37269->37270 37271 7ff660903958 37270->37271 37272 7ff660911874 63 API calls 37270->37272 37274 7ff6609039b1 37271->37274 37275 7ff660903a40 37271->37275 37273 7ff6609038f8 VirtualAlloc 37272->37273 37280 7ff660903925 __initmbctable 37273->37280 37276 7ff660911874 63 API calls 37274->37276 37277 7ff660901080 65 API calls 37275->37277 37278 7ff6609039c7 VirtualAlloc 37276->37278 37279 7ff660903a7f 37277->37279 37284 7ff6609039f4 __initmbctable 37278->37284 37313 7ff660903b10 37279->37313 37280->37271 37281 7ff66090394a VirtualFree 37280->37281 37281->37271 37286 7ff660903a19 VirtualFree 37284->37286 37287 7ff660903a27 37284->37287 37285 7ff6609011f0 65 API calls 37288 7ff660903ae3 GetCurrentThreadId 37285->37288 37286->37287 37287->37275 37289 7ff660903af8 37288->37289 37289->37262 37291 7ff660909507 37290->37291 37292 7ff66090951c 37290->37292 37319 7ff660909384 62 API calls _errno 37291->37319 37296 7ff66090c0a0 __onexitinit 62 API calls 37292->37296 37294 7ff66090950c 37320 7ff66090a7e4 17 API calls _invalid_parameter_noinfo 37294->37320 37298 7ff660909530 37296->37298 37297 7ff660906c4c SleepEx 37308 7ff660903310 37297->37308 37299 7ff6609095a0 37298->37299 37301 7ff66090ba34 _getptd 62 API calls 37298->37301 37321 7ff660909030 62 API calls 2 library calls 37299->37321 37302 7ff66090953d 37301->37302 37304 7ff66090b8f8 _errno 62 API calls 37302->37304 37303 7ff6609095a8 37303->37297 37322 7ff6609093c4 62 API calls 2 library calls 37303->37322 37305 7ff66090954c CreateThread 37304->37305 37305->37297 37307 7ff660909598 GetLastError 37305->37307 37307->37299 37309 7ff66090331f setsockopt CancelIo closesocket SetEvent 37308->37309 37310 7ff66090338a 37308->37310 37309->37310 37310->37262 37312 7ff660908b0c 37311->37312 37312->37254 37312->37312 37317 7ff660903b48 37313->37317 37318 7ff660903ba1 37313->37318 37314 7ff660903ac4 37314->37285 37315 7ff660903b60 send 37315->37317 37316 7ff660903bb0 send 37316->37314 37316->37318 37317->37314 37317->37315 37317->37318 37318->37314 37318->37316 37319->37294 37320->37297 37321->37303 37322->37297 37323->37267 37324->37184 37325->37192 37326 2863840 37327 2863867 _DllMainCRTStartup 37326->37327 37338 2861080 37327->37338 37329 28638b5 37330 2861080 41 API calls 37329->37330 37331 28638ef 37330->37331 37332 2861080 41 API calls 37331->37332 37333 2863936 ctype 37332->37333 37346 2863a40 37333->37346 37337 2863a05 _DllMainCRTStartup 37339 2861096 37338->37339 37340 286108e 37338->37340 37361 288cc90 37339->37361 37340->37329 37343 28610e5 ctype 37344 2861104 VirtualFree 37343->37344 37345 2861112 37343->37345 37344->37345 37345->37329 37350 2863a78 37346->37350 37351 2863ad1 37346->37351 37347 28639e6 37352 2861140 37347->37352 37348 2863ae0 send 37348->37347 37348->37351 37349 2863a90 send 37349->37350 37350->37347 37350->37349 37350->37351 37351->37347 37351->37348 37353 2861150 37352->37353 37354 286115a 37353->37354 37355 288cc90 39 API calls 37353->37355 37354->37337 37356 286117f 37355->37356 37357 286118c 37356->37357 37358 2861199 VirtualAlloc 37356->37358 37357->37337 37359 28611c3 ctype 37358->37359 37360 28611d9 VirtualFree 37359->37360 37360->37337 37362 288cccc 37361->37362 37364 28610bd VirtualAlloc 37361->37364 37362->37364 37365 288ce60 39 API calls 4 library calls 37362->37365 37364->37343 37365->37364 37366 2877460 37367 2877486 37366->37367 37372 28774c3 37367->37372 37376 287748e 37367->37376 37378 287730c 37367->37378 37371 2877508 37374 287730c 75 API calls 37371->37374 37371->37376 37372->37376 37423 2871dd0 37372->37423 37373 2871dd0 243 API calls 37375 28774fb 37373->37375 37374->37376 37377 287730c 75 API calls 37375->37377 37377->37371 37379 287731e 37378->37379 37380 287739b 37378->37380 37427 287bd14 HeapCreate 37379->37427 37382 28773ec 37380->37382 37387 287739f 37380->37387 37384 2877447 37382->37384 37385 28773f1 37382->37385 37397 2877327 _DllMainCRTStartup 37384->37397 37462 287e3f8 39 API calls 2 library calls 37384->37462 37445 287aae0 37385->37445 37389 28773d6 37387->37389 37387->37397 37441 28821c4 39 API calls free 37387->37441 37389->37397 37444 287e13c 41 API calls free 37389->37444 37390 2877333 _RTC_Initialize 37399 2877343 GetCommandLineA 37390->37399 37414 2877337 37390->37414 37393 28773cc 37442 287e13c 41 API calls free 37393->37442 37397->37372 37398 28773d1 37443 287bd6c HeapDestroy 37398->37443 37434 2882630 43 API calls 2 library calls 37399->37434 37400 2877405 __getgmtimebuf 37400->37397 37403 2877427 37400->37403 37404 287743d 37400->37404 37449 287e164 37403->37449 37458 2875500 37404->37458 37405 2877355 37435 2881ef0 43 API calls 2 library calls 37405->37435 37409 2877361 37410 2877365 37409->37410 37411 287736c 37409->37411 37436 287e13c 41 API calls free 37410->37436 37437 2882538 51 API calls 3 library calls 37411->37437 37433 287bd6c HeapDestroy 37414->37433 37415 2877371 37416 2877385 37415->37416 37438 2882238 50 API calls 5 library calls 37415->37438 37422 2877389 37416->37422 37440 28821c4 39 API calls free 37416->37440 37419 2877399 37419->37410 37420 287737a 37420->37416 37439 287beac 41 API calls 2 library calls 37420->37439 37422->37397 37424 2871e14 37423->37424 37425 2871dd8 37423->37425 37424->37371 37424->37373 37425->37424 37426 2871de2 CreateThread WaitForSingleObject 37425->37426 37426->37424 37482 2871790 37426->37482 37428 2877323 37427->37428 37429 287bd3c GetVersion 37427->37429 37428->37397 37432 287e438 42 API calls 3 library calls 37428->37432 37430 287bd46 HeapSetInformation 37429->37430 37431 287bd60 37429->37431 37430->37431 37431->37428 37432->37390 37433->37397 37434->37405 37435->37409 37436->37414 37437->37415 37438->37420 37439->37416 37440->37419 37441->37393 37442->37398 37443->37389 37444->37397 37448 287ab05 __getgmtimebuf 37445->37448 37447 287ab45 37447->37400 37448->37447 37463 2884338 37448->37463 37473 2882f3c 37449->37473 37451 287e1bd 37452 2882e3c _isindst LeaveCriticalSection 37451->37452 37453 287e1d2 37452->37453 37454 2882f3c _lock 38 API calls 37453->37454 37455 287e1dc ___lc_codepage_func 37454->37455 37456 2882e3c _isindst LeaveCriticalSection 37455->37456 37457 287e20e 37456->37457 37457->37397 37459 2875505 free 37458->37459 37461 2875525 realloc 37458->37461 37459->37461 37481 2875894 38 API calls __getgmtimebuf 37459->37481 37461->37397 37462->37397 37464 288434d 37463->37464 37466 288436a 37463->37466 37465 288435b 37464->37465 37464->37466 37471 2875894 38 API calls __getgmtimebuf 37465->37471 37468 2884382 HeapAlloc 37466->37468 37469 2884360 37466->37469 37472 287c408 DecodePointer 37466->37472 37468->37466 37468->37469 37469->37448 37471->37469 37472->37466 37474 2882f5a 37473->37474 37475 2882f6b EnterCriticalSection 37473->37475 37479 2882e54 38 API calls 7 library calls 37474->37479 37477 2882f5f 37477->37475 37480 287c108 38 API calls 2 library calls 37477->37480 37479->37477 37481->37461 37483 2877e30 memcpy_s 37482->37483 37484 28717e2 GetVersionExW 37483->37484 37485 2871804 37484->37485 37486 287180b LoadLibraryA GetProcAddress SetProcessMitigationPolicy 37484->37486 37485->37486 37487 2871842 __getgmtimebuf 37485->37487 37486->37487 37488 287188e _close_nolock 37487->37488 37491 28755f8 std::_Facet_Register 42 API calls 37487->37491 37489 28718a5 GetLocalTime wsprintfW SetUnhandledExceptionFilter 37488->37489 37490 28718a0 37488->37490 37518 28759ec 37489->37518 37660 2868f30 13 API calls 2 library calls 37490->37660 37494 2871871 37491->37494 37496 28759ec 42 API calls 37494->37496 37495 287192e _close_nolock 37535 28755f8 37495->37535 37496->37488 37499 287194e 37501 28755f8 std::_Facet_Register 42 API calls 37499->37501 37502 2871960 37501->37502 37507 2871974 __getgmtimebuf _close_nolock 37502->37507 37547 286c400 CreateEventW 37502->37547 37504 2871a9c EnumWindows 37504->37507 37505 28757e0 38 API calls _amsg_exit 37505->37507 37506 2871acb EnumWindows 37506->37507 37507->37504 37507->37505 37507->37506 37508 2871b6b CreateEventA 37507->37508 37513 2871c2b RegOpenKeyExW 37507->37513 37515 28759ec 42 API calls 37507->37515 37516 2871d72 WaitForSingleObject 37507->37516 37517 2871d39 WaitForSingleObject 37507->37517 37579 286fe20 RegQueryInfoKeyW 37507->37579 37588 28667a0 37507->37588 37570 28757e0 37508->37570 37513->37507 37514 2871c65 RegQueryValueExW 37513->37514 37514->37507 37515->37507 37516->37507 37517->37507 37519 2875a17 37518->37519 37520 2875a2c 37518->37520 37667 2875894 38 API calls __getgmtimebuf 37519->37667 37524 287aae0 __onexitinit 38 API calls 37520->37524 37522 2875a1c 37668 287c634 DecodePointer _invalid_parameter_noinfo 37522->37668 37526 2875a40 37524->37526 37525 2875a27 37525->37495 37534 2875aa8 realloc 37526->37534 37662 287e2a0 37526->37662 37527 2875500 free 38 API calls 37529 2875ab8 37527->37529 37529->37525 37669 28758d4 38 API calls 2 library calls 37529->37669 37531 287e164 __getgmtimebuf 38 API calls 37533 2875a5c CreateThread 37531->37533 37533->37525 37533->37534 37685 287596c 37533->37685 37534->37527 37537 2875603 37535->37537 37538 2871941 37537->37538 37543 2875622 std::_Facet_Register 37537->37543 37697 2875540 37537->37697 37714 287c408 DecodePointer 37537->37714 37538->37499 37661 2863210 9 API calls _fltout2 37538->37661 37540 2875673 37716 2875474 38 API calls std::exception::operator= 37540->37716 37542 2875684 37717 28775bc RaiseException ctype 37542->37717 37543->37540 37715 2875c70 41 API calls _cinit 37543->37715 37546 287569a 37548 286c456 37547->37548 37549 286c460 37547->37549 37732 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37548->37732 37726 2870170 HeapCreate 37549->37726 37552 286c523 CreateEventW 37554 286c561 37552->37554 37555 286c56c CreateEventW 37552->37555 37553 286c4f7 _lock 37553->37552 37733 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37553->37733 37734 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37554->37734 37558 286c58f 37555->37558 37559 286c59a CreateEventW 37555->37559 37735 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37558->37735 37563 286c5bd 37559->37563 37564 286c5c7 37559->37564 37736 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37563->37736 37737 2870290 DeleteCriticalSection RaiseException _lock 37564->37737 37568 286c65c timeGetTime CreateEventW CreateEventW 37569 286c6fe 37568->37569 37569->37507 37571 28757f1 37570->37571 37572 28757fb 37570->37572 37571->37572 37577 2875818 37571->37577 37739 2875894 38 API calls __getgmtimebuf 37572->37739 37574 2875804 37740 287c634 DecodePointer _invalid_parameter_noinfo 37574->37740 37576 2871bb7 RegOpenKeyExW 37576->37507 37577->37576 37741 2875894 38 API calls __getgmtimebuf 37577->37741 37580 2870116 37579->37580 37581 286fea4 memcpy_s ctype 37579->37581 37580->37507 37582 28700fd 37581->37582 37584 286ff1f RegEnumValueW 37581->37584 37586 28755f8 42 API calls std::_Facet_Register 37581->37586 37587 28705a0 42 API calls 37581->37587 37742 28708c0 52 API calls 37581->37742 37583 287010d RegCloseKey 37582->37583 37583->37580 37584->37581 37586->37581 37587->37581 37589 28755f8 std::_Facet_Register 42 API calls 37588->37589 37590 28667e7 memcpy_s 37589->37590 37591 2866811 gethostname gethostbyname 37590->37591 37592 2866873 inet_ntoa 37591->37592 37593 2866911 7 API calls 37591->37593 37901 2876574 38 API calls 2 library calls 37592->37901 37743 2868d20 LoadLibraryW 37593->37743 37597 2866896 37902 2876574 38 API calls 2 library calls 37597->37902 37603 28668c2 inet_ntoa 37903 2876574 38 API calls 2 library calls 37603->37903 37605 2866a73 lstrlenW 37608 28685c0 13 API calls 37605->37608 37606 2866a5d GetWindowTextW 37606->37605 37607 28668ae 37607->37593 37607->37603 37904 2876574 38 API calls 2 library calls 37607->37904 37610 2866aad 37608->37610 37611 2866aca 37610->37611 37612 28757e0 _amsg_exit 38 API calls 37610->37612 37613 28757e0 _amsg_exit 38 API calls 37611->37613 37612->37611 37614 2866ae2 lstrlenW 37613->37614 37615 28685c0 13 API calls 37614->37615 37616 2866b05 37615->37616 37617 2866b22 memcpy_s 37616->37617 37618 28757e0 _amsg_exit 38 API calls 37616->37618 37619 2866b34 RegOpenKeyExW 37617->37619 37618->37617 37620 2866c73 _amsg_exit 37619->37620 37621 2866b5f RegQueryValueExW 37619->37621 37626 2866c9a GetProcAddress 37620->37626 37622 2866bbf 37621->37622 37623 2866b99 37621->37623 37624 2866c68 RegCloseKey 37622->37624 37625 2866bc8 GetLocalTime wsprintfW lstrlenW RegSetValueExW 37622->37625 37627 28757e0 _amsg_exit 38 API calls 37623->37627 37624->37620 37625->37624 37628 2866c52 37625->37628 37629 2866cb7 GetSystemInfo 37626->37629 37630 2866cb3 GetNativeSystemInfo 37626->37630 37631 2866baf RegCloseKey 37627->37631 37632 28757e0 _amsg_exit 38 API calls 37628->37632 37633 2866cbd wsprintfW 37629->37633 37630->37633 37631->37624 37632->37624 37785 2868220 37633->37785 37640 2866d27 37641 28757e0 _amsg_exit 38 API calls 37640->37641 37642 2866d4a 37641->37642 37818 2867150 37642->37818 37655 2866e5e 37879 2866ee0 37655->37879 37657 2866e97 37658 2874f50 _fltout2 7 API calls 37657->37658 37659 2866ec5 37658->37659 37659->37507 37660->37489 37661->37499 37670 287e21c 37662->37670 37664 287e2ab 37665 2875a4d 37664->37665 37682 287c108 38 API calls 2 library calls 37664->37682 37665->37531 37667->37522 37668->37525 37669->37525 37683 288f438 37670->37683 37672 287e22c FlsGetValue 37673 287e242 37672->37673 37674 287e28a SetLastError 37672->37674 37675 287aae0 __onexitinit 36 API calls 37673->37675 37674->37664 37676 287e24f __getgmtimebuf 37675->37676 37676->37674 37677 287e283 37676->37677 37678 287e26d 37676->37678 37680 2875500 free 36 API calls 37677->37680 37679 287e164 __getgmtimebuf 36 API calls 37678->37679 37681 287e274 _DllMainCRTStartup 37679->37681 37680->37681 37681->37674 37684 288f43f 37683->37684 37686 287597a 37685->37686 37687 28759ba 37686->37687 37689 287598e 37686->37689 37695 287e2c4 38 API calls 4 library calls 37687->37695 37692 28759a1 realloc 37689->37692 37693 28759b0 _DllMainCRTStartup 37689->37693 37691 28759eb 37694 28759a7 ExitThread 37692->37694 37696 2875940 40 API calls 2 library calls 37693->37696 37694->37693 37695->37693 37696->37691 37698 28755d4 37697->37698 37699 2875558 37697->37699 37724 287c408 DecodePointer 37698->37724 37701 2875590 HeapAlloc 37699->37701 37706 28755b9 37699->37706 37710 28755be 37699->37710 37711 2875570 37699->37711 37721 287c408 DecodePointer 37699->37721 37701->37699 37705 28755c9 37701->37705 37702 28755d9 37725 2875894 38 API calls __getgmtimebuf 37702->37725 37705->37537 37722 2875894 38 API calls __getgmtimebuf 37706->37722 37723 2875894 38 API calls __getgmtimebuf 37710->37723 37711->37701 37718 287c3bc 38 API calls 2 library calls 37711->37718 37719 287c15c 38 API calls 4 library calls 37711->37719 37720 287bdc8 38 API calls 2 library calls 37711->37720 37714->37537 37715->37540 37716->37542 37717->37546 37718->37711 37719->37711 37721->37699 37722->37710 37723->37705 37724->37702 37725->37705 37727 28701af 37726->37727 37728 28701b9 37726->37728 37738 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 37727->37738 37729 28701e9 37728->37729 37731 2875500 free 38 API calls 37728->37731 37729->37553 37731->37729 37737->37568 37739->37574 37740->37576 37741->37574 37742->37581 37744 2868d47 GetProcAddress 37743->37744 37745 28669f6 GetSystemInfo wsprintfW 37743->37745 37746 2868d60 37744->37746 37747 2868e7a FreeLibrary 37744->37747 37757 2868430 37745->37757 37905 28757bc 37746->37905 37747->37745 37749 2868db6 37908 2868ca0 37749->37908 37753 2868e62 RegCloseKey 37755 2868e75 37753->37755 37754 2868e4c 37754->37753 37756 2875c88 _amsg_exit 38 API calls 37754->37756 37755->37747 37756->37753 37758 2868473 GetDriveTypeW 37757->37758 37759 28684a5 GetDiskFreeSpaceExW 37758->37759 37760 28684db 37758->37760 37759->37760 37760->37758 37761 28684e2 GlobalMemoryStatusEx 37760->37761 37762 28757bc 50 API calls 37761->37762 37763 2868567 37762->37763 37764 28757bc 50 API calls 37763->37764 37765 2868583 37764->37765 37766 2874f50 _fltout2 7 API calls 37765->37766 37767 2866a3f 37766->37767 37768 28686f0 CreateDXGIFactory 37767->37768 37771 286876a ctype 37768->37771 37777 286876f 37768->37777 37769 2874f50 _fltout2 7 API calls 37770 2866a52 GetForegroundWindow 37769->37770 37770->37605 37770->37606 37771->37769 37772 28688eb 37932 287282c 39 API calls 2 library calls 37772->37932 37774 28688df 37931 287282c 39 API calls 2 library calls 37774->37931 37775 28757bc 50 API calls 37784 28688f8 ctype 37775->37784 37777->37772 37777->37774 37778 286a030 42 API calls 37777->37778 37777->37784 37778->37777 37779 2868c3f 37934 287282c 39 API calls 2 library calls 37779->37934 37780 2868c33 37933 287282c 39 API calls 2 library calls 37780->37933 37783 286a030 42 API calls 37783->37784 37784->37771 37784->37775 37784->37779 37784->37780 37784->37783 37786 2872914 37785->37786 37787 2868252 GetCurrentProcessId wsprintfW 37786->37787 37935 2868040 GetCurrentProcessId OpenProcess 37787->37935 37789 286827a memcpy_s 37790 286828e GetVersionExW 37789->37790 37793 28682a9 _fltout2 37790->37793 37803 2868379 _close_nolock 37790->37803 37791 28683db wsprintfW 37792 28683eb 37791->37792 37794 2874f50 _fltout2 7 API calls 37792->37794 37795 28682ca OpenProcessToken 37793->37795 37793->37803 37796 2866d0e GetCurrentProcessId 37794->37796 37797 28682e3 GetTokenInformation 37795->37797 37795->37803 37804 2869d50 37796->37804 37798 2868309 realloc 37797->37798 37797->37803 37799 2868314 LocalAlloc 37798->37799 37798->37803 37800 2868331 GetTokenInformation 37799->37800 37799->37803 37801 2868355 GetSidSubAuthorityCount GetSidSubAuthority 37800->37801 37802 2868370 LocalFree 37800->37802 37801->37802 37802->37803 37803->37791 37803->37792 37805 2869d75 OpenProcess 37804->37805 37811 2869db0 _close_nolock 37804->37811 37807 2869d98 GetProcessImageFileNameW 37805->37807 37805->37811 37806 2874f50 _fltout2 7 API calls 37808 2866d22 37806->37808 37809 2869dbd 37807->37809 37807->37811 37812 2867d40 CoInitialize CoCreateInstance 37808->37812 37979 2869bc0 37809->37979 37811->37806 37813 2867d78 37812->37813 37814 2867d80 37812->37814 37813->37640 37814->37813 37815 2867e85 CoUninitialize 37814->37815 37816 2867e31 SysFreeString 37814->37816 37817 2867e80 37814->37817 37815->37640 37816->37814 37817->37815 37819 2867190 _close_nolock 37818->37819 37819->37819 37820 28671b0 CreateToolhelp32Snapshot 37819->37820 37822 286722b 37819->37822 37825 286720a Process32NextW 37819->37825 37820->37819 37821 28671c8 Process32FirstW 37820->37821 37821->37819 37823 2874f50 _fltout2 7 API calls 37822->37823 37824 2866d60 37823->37824 37826 2867b10 37824->37826 37825->37819 37827 2877e30 memcpy_s 37826->37827 37828 2867b58 RegOpenKeyExW 37827->37828 37829 2867b87 RegQueryInfoKeyW 37828->37829 37830 2867ce1 lstrlenW 37828->37830 37834 2867d0c 37829->37834 37840 2867be2 memcpy_s 37829->37840 37831 2867cf3 37830->37831 37830->37834 37833 2875c88 _amsg_exit 38 API calls 37831->37833 37832 2867cd9 37832->37830 37833->37834 37835 2874f50 _fltout2 7 API calls 37834->37835 37836 2866d6c 37835->37836 37842 28677a0 37836->37842 37837 2867cc6 RegCloseKey 37837->37832 37838 2867c41 RegEnumKeyExW lstrlenW 37839 2867c7e lstrlenW 37838->37839 37838->37840 37839->37840 37840->37832 37840->37837 37840->37838 37841 2876188 38 API calls _amsg_exit 37840->37841 37841->37840 37849 28677f6 memcpy_s 37842->37849 37843 2867893 CoCreateInstance 37844 28678c4 memcpy_s 37843->37844 37845 2867a8a lstrlenW 37843->37845 37852 2867a7a 37844->37852 37857 2867951 wsprintfW RegOpenKeyExW 37844->37857 37859 28679f8 RegQueryValueExW 37844->37859 37847 2867a97 lstrcatW 37845->37847 37848 2867aa8 37845->37848 37847->37848 37850 2874f50 _fltout2 7 API calls 37848->37850 37849->37843 37851 286782d 37849->37851 37993 28676b0 37849->37993 37853 2866d71 37850->37853 37855 2867853 lstrcatW lstrcatW 37851->37855 38002 286a7b0 GetModuleHandleA GetProcAddress GetProcAddress GetProcAddress 37851->38002 38003 286ab60 10 API calls 3 library calls 37851->38003 38004 286a860 42 API calls 2 library calls 37851->38004 38005 286aa60 47 API calls 2 library calls 37851->38005 37852->37845 37863 2875c88 37853->37863 37855->37849 37857->37844 37860 2867a52 RegCloseKey 37859->37860 37861 2867a32 lstrcatW lstrcatW 37859->37861 37860->37844 37861->37860 37867 2875c98 37863->37867 37864 2875c9d 37865 2866d89 GetTickCount 37864->37865 38006 2875894 38 API calls __getgmtimebuf 37864->38006 37872 28765f0 GetSystemTimeAsFileTime 37865->37872 37867->37864 37867->37865 37870 2875cdb 37867->37870 37868 2875cc7 38007 287c634 DecodePointer _invalid_parameter_noinfo 37868->38007 37870->37865 38008 2875894 38 API calls __getgmtimebuf 37870->38008 37873 2866d9b 37872->37873 37874 287652c 37873->37874 38009 2881090 37874->38009 37877 2866dbe wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 37877->37655 38141 2869ea0 37879->38141 37881 2866f67 37882 2866f8c 37881->37882 37883 2869ea0 42 API calls 37881->37883 37884 2866fb1 37882->37884 37885 2869ea0 42 API calls 37882->37885 37883->37882 37886 2869ea0 42 API calls 37884->37886 37887 2866fd6 37884->37887 37885->37884 37886->37887 37888 2869ea0 42 API calls 37887->37888 37890 2866ffb 37887->37890 37888->37890 37889 2867020 37892 2867045 37889->37892 37893 2869ea0 42 API calls 37889->37893 37890->37889 37891 2869ea0 42 API calls 37890->37891 37891->37889 38155 286b0b0 37892->38155 37893->37892 37895 286708f 37896 286bd40 42 API calls 37895->37896 37897 286709d MultiByteToWideChar MultiByteToWideChar 37896->37897 37898 28670f7 37897->37898 37899 2874f50 _fltout2 7 API calls 37898->37899 37900 2867131 37899->37900 37900->37657 37901->37597 37902->37607 37903->37607 37904->37607 37914 2876968 37905->37914 37929 288f148 37908->37929 37910 2868cd1 GetProcAddress 37911 2868cef GetSystemInfo 37910->37911 37912 2868ceb GetNativeSystemInfo 37910->37912 37913 2868cf5 RegOpenKeyExW RegQueryValueExW 37911->37913 37912->37913 37913->37753 37913->37754 37915 28769c3 37914->37915 37916 287697c 37914->37916 37927 2875894 38 API calls __getgmtimebuf 37915->37927 37916->37915 37919 2876986 37916->37919 37918 28769bb 37928 287c634 DecodePointer _invalid_parameter_noinfo 37918->37928 37925 287684c 50 API calls 4 library calls 37919->37925 37922 28769aa 37923 28757db 37922->37923 37926 2875894 38 API calls __getgmtimebuf 37922->37926 37923->37749 37925->37922 37926->37918 37927->37918 37928->37923 37930 288f14f 37929->37930 37931->37772 37932->37784 37933->37779 37934->37771 37936 286807b OpenProcessToken 37935->37936 37937 286809f _close_nolock 37935->37937 37936->37937 37938 28680b2 37936->37938 37937->37789 37950 2867ea0 37938->37950 37941 28680f0 SysStringLen 37942 28680fb 37941->37942 37944 286810b 37941->37944 37943 2868103 SysStringLen 37942->37943 37942->37944 37943->37944 37945 28755f8 std::_Facet_Register 42 API calls 37944->37945 37946 2868124 ctype _close_nolock 37944->37946 37945->37946 37947 28681b2 37946->37947 37949 28681ac SysFreeString 37946->37949 37947->37937 37948 28681e9 SysFreeString 37947->37948 37948->37937 37949->37947 37971 28666b0 37950->37971 37952 2867ee6 37953 28666b0 44 API calls 37952->37953 37954 2867ef5 37953->37954 37955 2867f00 GetTokenInformation 37954->37955 37968 2867fdb free 37954->37968 37956 2867f54 GetTokenInformation 37955->37956 37958 2867f20 realloc 37955->37958 37959 2867fd9 37956->37959 37960 2867f7c LookupAccountSidW 37956->37960 37957 2874f50 _fltout2 7 API calls 37961 286802c 37957->37961 37965 2867f2f GetProcessHeap HeapAlloc 37958->37965 37958->37968 37962 2868006 GetProcessHeap 37959->37962 37959->37968 37963 2867fdf 37960->37963 37967 2867fb6 realloc 37960->37967 37961->37941 37961->37944 37962->37968 37964 28666b0 44 API calls 37963->37964 37966 2867fec 37964->37966 37965->37956 37965->37968 37969 28666b0 44 API calls 37966->37969 37967->37968 37970 28757e0 _amsg_exit 38 API calls 37967->37970 37968->37957 37969->37959 37970->37959 37972 28666d4 37971->37972 37976 286670d SysFreeString 37972->37976 37977 2866713 37972->37977 37978 2866767 37972->37978 37973 28755f8 std::_Facet_Register 42 API calls 37974 286673a 37973->37974 37975 2866747 SysAllocString 37974->37975 37974->37978 37975->37978 37976->37977 37977->37973 37978->37952 37980 2869bef GetLogicalDriveStringsW 37979->37980 37981 2869be8 37979->37981 37982 2869cdd lstrcpyW 37980->37982 37990 2869c2a 37980->37990 37983 2874f50 _fltout2 7 API calls 37981->37983 37982->37981 37984 2869d1b 37983->37984 37984->37811 37985 2869c46 lstrcmpiW 37986 2869c65 lstrcmpiW 37985->37986 37985->37990 37987 2869c79 QueryDosDeviceW 37986->37987 37986->37990 37987->37981 37988 2869caa lstrlenW 37987->37988 37992 2875f14 40 API calls 2 library calls 37988->37992 37990->37982 37990->37985 37991 2869d26 lstrcpyW lstrcatW 37990->37991 37991->37981 37992->37990 37994 2877e30 memcpy_s 37993->37994 37995 28676ec CreateToolhelp32Snapshot 37994->37995 37996 2867700 Process32FirstW 37995->37996 38000 286775a _close_nolock 37995->38000 37999 286771a 37996->37999 37996->38000 37997 2874f50 _fltout2 7 API calls 37998 2867775 37997->37998 37998->37849 37999->38000 38001 286774b Process32NextW 37999->38001 38000->37997 38001->37999 38001->38000 38002->37851 38003->37851 38004->37851 38005->37855 38006->37868 38007->37865 38008->37868 38010 287e21c __getgmtimebuf 38 API calls 38009->38010 38011 288109b 38010->38011 38012 28810a3 38011->38012 38014 2876543 38011->38014 38052 287aa60 38 API calls 2 library calls 38011->38052 38012->38014 38051 2875894 38 API calls __getgmtimebuf 38012->38051 38014->37877 38016 2876210 38014->38016 38017 2876232 38016->38017 38018 287624d memcpy_s 38016->38018 38061 2875894 38 API calls __getgmtimebuf 38017->38061 38018->38017 38021 2876262 38018->38021 38020 2876237 38062 287c634 DecodePointer _invalid_parameter_noinfo 38020->38062 38023 2876268 38021->38023 38025 2876285 38021->38025 38063 2875894 38 API calls __getgmtimebuf 38023->38063 38053 2880ca4 38025->38053 38032 28764e8 38033 2881090 __getgmtimebuf 38 API calls 38032->38033 38035 2876543 38033->38035 38037 2876558 38035->38037 38039 2876210 _localtime64 45 API calls 38035->38039 38037->37877 38038 28762bd 38040 2876329 38038->38040 38041 28762c9 38038->38041 38039->38037 38085 2880d10 38 API calls 3 library calls 38040->38085 38082 2880d10 38 API calls 3 library calls 38041->38082 38044 2876334 38050 2876243 38044->38050 38086 2880ce0 38 API calls 2 library calls 38044->38086 38045 28762e0 38045->38050 38083 2880ce0 38 API calls 2 library calls 38045->38083 38048 28762f9 38048->38050 38084 2880d10 38 API calls 3 library calls 38048->38084 38050->37877 38051->38014 38052->38012 38054 287628a 38053->38054 38055 2880cb1 38053->38055 38064 2880fe0 38054->38064 38056 2882f3c _lock 38 API calls 38055->38056 38057 2880cbb 38056->38057 38060 2880cca 38057->38060 38087 28802a4 38057->38087 38120 2882e3c LeaveCriticalSection 38060->38120 38061->38020 38062->38050 38063->38050 38065 2880fe9 38064->38065 38069 2876293 38064->38069 38135 2875894 38 API calls __getgmtimebuf 38065->38135 38067 2880fee 38136 287c634 DecodePointer _invalid_parameter_noinfo 38067->38136 38069->38032 38070 2881010 38069->38070 38071 2881019 38070->38071 38072 28762a4 38070->38072 38137 2875894 38 API calls __getgmtimebuf 38071->38137 38072->38032 38076 2881040 38072->38076 38074 288101e 38138 287c634 DecodePointer _invalid_parameter_noinfo 38074->38138 38077 2881049 38076->38077 38078 28762b5 38076->38078 38139 2875894 38 API calls __getgmtimebuf 38077->38139 38078->38032 38078->38038 38080 288104e 38140 287c634 DecodePointer _invalid_parameter_noinfo 38080->38140 38082->38045 38083->38048 38084->38050 38085->38044 38086->38050 38088 2882f3c _lock 38 API calls 38087->38088 38089 28802d4 __tzset 38088->38089 38090 2881040 _get_daylight 38 API calls 38089->38090 38091 28802ea 38090->38091 38092 2880fe0 _get_daylight 38 API calls 38091->38092 38118 2880679 __tzset 38091->38118 38093 28802ff 38092->38093 38094 2881010 _get_daylight 38 API calls 38093->38094 38093->38118 38095 2880314 38094->38095 38095->38118 38121 287a9f0 38095->38121 38099 2880402 GetTimeZoneInformation 38105 2880418 WideCharToMultiByte 38099->38105 38110 288051c __tzset 38099->38110 38100 2880392 _cftof_l 38130 287aa60 38 API calls 2 library calls 38100->38130 38101 2875500 free 38 API calls 38102 28803fb 38101->38102 38102->38099 38103 2880348 type_info::operator== 38103->38100 38109 2875500 free 38 API calls 38103->38109 38103->38110 38115 28803ce 38103->38115 38107 28804c9 WideCharToMultiByte 38105->38107 38107->38110 38109->38100 38132 2882e3c LeaveCriticalSection 38110->38132 38111 28803a3 _cftof_l 38111->38110 38131 287bcb0 38 API calls 2 library calls 38111->38131 38115->38099 38115->38101 38115->38110 38118->38060 38122 287e2a0 _getptd 38 API calls 38121->38122 38123 287a9f9 38122->38123 38124 287aa1c 38123->38124 38133 287f60c 38 API calls 5 library calls 38123->38133 38126 2887890 38124->38126 38127 28878b2 38126->38127 38129 28878c5 __wtomb_environ _cftof_l 38126->38129 38127->38129 38134 2888b2c 42 API calls 3 library calls 38127->38134 38129->38103 38130->38111 38131->38115 38133->38124 38134->38129 38135->38067 38136->38069 38137->38074 38138->38072 38139->38080 38140->38078 38142 2869f1e 38141->38142 38146 2869ebd 38141->38146 38143 2869f3a 38142->38143 38161 287282c 39 API calls 2 library calls 38142->38161 38147 2869f54 ctype 38143->38147 38162 2869fb0 42 API calls _RunAllParam 38143->38162 38146->38142 38148 2869eea 38146->38148 38147->37881 38149 286a176 38148->38149 38163 2872888 39 API calls 2 library calls 38148->38163 38151 286a19d 38149->38151 38164 287282c 39 API calls 2 library calls 38149->38164 38154 286a1b7 ctype 38151->38154 38165 2869fb0 42 API calls _RunAllParam 38151->38165 38154->37881 38157 286b0f1 ctype 38155->38157 38156 286b148 38157->38156 38166 286b2b0 7 API calls _fltout2 38157->38166 38159 286b122 38159->38156 38167 286b2b0 7 API calls _fltout2 38159->38167 38161->38143 38162->38147 38163->38149 38164->38151 38165->38154 38166->38159 38167->38159 38168 286e997 38169 286e9a0 38168->38169 38170 286e9a9 38168->38170 38174 286ec90 38169->38174 38171 286ec90 115 API calls 38170->38171 38173 286e9a7 38171->38173 38175 28755f8 std::_Facet_Register 42 API calls 38174->38175 38176 286ecb1 memcpy_s 38175->38176 38177 286ecc4 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 38176->38177 38178 286ed25 GetWindowTextW 38177->38178 38179 286ed38 38177->38179 38178->38179 38180 2867150 10 API calls 38179->38180 38181 286ed44 38180->38181 38184 286ee40 7 API calls 38181->38184 38183 286ed81 ctype 38183->38173 38185 286eeec 38184->38185 38186 286eef9 GetSystemMetrics 38184->38186 38187 286ef82 8 API calls 38185->38187 38188 286ef14 GetSystemMetrics 38186->38188 38189 286ef62 GetSystemMetrics 38186->38189 38190 286f0be memcpy_s 38187->38190 38188->38187 38189->38187 38191 286f0ce GetDIBits 38190->38191 38192 286f101 memcpy_s ctype 38191->38192 38193 28755f8 std::_Facet_Register 42 API calls 38192->38193 38194 286f16b 38193->38194 38204 286f2e0 GlobalAlloc GlobalLock 38194->38204 38197 286f1a0 _RunAllParam 38198 286f1b4 ReleaseDC 38197->38198 38203 286f1c7 38198->38203 38199 286f20a ctype _RunAllParam 38201 286f257 ReleaseDC 38199->38201 38200 2874f50 _fltout2 7 API calls 38202 286f2b0 38200->38202 38201->38203 38202->38183 38203->38200 38231 2874f80 38204->38231 38206 286f34a GlobalUnlock CreateStreamOnHGlobal 38207 286f5f3 GlobalFree 38206->38207 38210 286f370 _lock _RunAllParam 38206->38210 38226 286f4a3 _RunAllParam 38207->38226 38208 2874f50 _fltout2 7 API calls 38209 286f19c 38208->38209 38209->38197 38209->38199 38233 286c7d0 38210->38233 38212 286f3ce 38213 286f3d6 GdipCreateBitmapFromStream 38212->38213 38224 286f55b _lock _RunAllParam 38212->38224 38214 286f405 GdipDisposeImage 38213->38214 38215 286f410 38213->38215 38214->38224 38238 286ca90 GdipGetImagePixelFormat 38215->38238 38218 286f431 CreateStreamOnHGlobal 38219 286f450 38218->38219 38218->38224 38283 286ceb0 38219->38283 38222 286f486 GlobalFree 38222->38226 38223 286f4aa GlobalSize 38227 286f4bd ctype 38223->38227 38224->38207 38226->38208 38319 2870470 42 API calls 2 library calls 38227->38319 38229 286f545 GlobalUnlock 38229->38224 38230 286f4ed _RunAllParam 38230->38229 38232 2874f8c 38231->38232 38232->38206 38232->38232 38234 286c7e4 _RunAllParam 38233->38234 38235 286c7dd 38233->38235 38236 286c802 GdiplusStartup 38234->38236 38237 286c83f _lock 38234->38237 38235->38212 38236->38237 38237->38212 38239 286cad9 GdipGetImageHeight 38238->38239 38241 286cb47 GdipGetImageWidth 38239->38241 38242 286cb42 38239->38242 38243 286cb60 38241->38243 38242->38241 38320 286c930 38243->38320 38246 286cc35 38249 2874f50 _fltout2 7 API calls 38246->38249 38247 286cb90 GdipGetImagePaletteSize 38250 286cba6 38247->38250 38248 286ccc9 38251 286ce01 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 38248->38251 38252 286ccde GdipBitmapLockBits 38248->38252 38253 286ce91 GdipDisposeImage 38249->38253 38254 286cbc0 38250->38254 38334 286c340 7 API calls 2 library calls 38250->38334 38256 286cdd6 38251->38256 38255 286cd11 38252->38255 38271 286cd64 38252->38271 38253->38218 38253->38224 38257 286cbfe 38254->38257 38258 286cd5a 38254->38258 38267 286cbc4 _ftelli64 38254->38267 38255->38246 38265 2875500 free 38 API calls 38255->38265 38256->38246 38264 2875500 free 38 API calls 38256->38264 38261 2875540 malloc 38 API calls 38257->38261 38336 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 38258->38336 38259 286cdbf GdipBitmapUnlockBits 38259->38256 38261->38267 38264->38256 38265->38255 38266 286cdf5 38340 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 38266->38340 38268 286cc20 38267->38268 38269 286cc3f GdipGetImagePalette 38267->38269 38268->38246 38278 2875500 free 38 API calls 38268->38278 38275 286cc54 38269->38275 38271->38259 38271->38266 38272 286cdea 38271->38272 38276 286cde0 38271->38276 38337 2876a28 38 API calls 4 library calls 38271->38337 38339 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 38272->38339 38277 286cd3a 38275->38277 38279 286cc73 38275->38279 38338 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 38276->38338 38277->38246 38281 2875500 free 38 API calls 38277->38281 38278->38268 38335 286d1b0 CreateCompatibleDC SelectObject SetDIBColorTable SelectObject DeleteDC 38279->38335 38281->38277 38284 286c7d0 GdiplusStartup 38283->38284 38285 286cede 38284->38285 38286 286cee6 GdipGetImageEncodersSize 38285->38286 38315 286cf90 38285->38315 38287 286cefc 38286->38287 38286->38315 38289 286cf10 38287->38289 38342 286c340 7 API calls 2 library calls 38287->38342 38288 2874f50 _fltout2 7 API calls 38290 286cfd1 GetHGlobalFromStream GlobalLock 38288->38290 38292 286cf56 38289->38292 38293 286d197 38289->38293 38299 286cf14 _ftelli64 38289->38299 38290->38222 38290->38223 38295 2875540 malloc 38 API calls 38292->38295 38343 2861220 DeleteCriticalSection RaiseException std::_Facet_Register 38293->38343 38295->38299 38297 286cf97 GdipGetImageEncoders 38300 286cfa9 38297->38300 38303 286cfe1 38297->38303 38298 286cf7a 38301 2875500 free 38 API calls 38298->38301 38298->38315 38299->38297 38299->38298 38302 2875500 free 38 API calls 38300->38302 38300->38315 38301->38298 38302->38300 38304 286d07c 38303->38304 38305 286d09a 38303->38305 38308 2875500 free 38 API calls 38304->38308 38304->38315 38306 286d11a GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 38305->38306 38307 286d0aa GdipCreateBitmapFromScan0 GdipSaveImageToStream 38305->38307 38310 286d175 GdipDisposeImage 38306->38310 38311 286d149 GdipDisposeImage 38306->38311 38309 286d0f6 GdipDisposeImage 38307->38309 38307->38310 38308->38304 38313 286d105 38309->38313 38309->38315 38312 286d180 38310->38312 38310->38315 38314 286d158 38311->38314 38311->38315 38312->38315 38316 2875500 free 38 API calls 38312->38316 38313->38315 38317 2875500 free 38 API calls 38313->38317 38314->38315 38318 2875500 free 38 API calls 38314->38318 38315->38288 38316->38312 38317->38313 38318->38314 38319->38230 38321 2875540 malloc 38 API calls 38320->38321 38322 286c968 38321->38322 38323 286c980 38322->38323 38326 286c99c memcpy_s 38322->38326 38324 2875500 free 38 API calls 38323->38324 38330 286c995 38323->38330 38324->38323 38325 286c9e2 CreateDIBSection 38327 286ca24 38325->38327 38331 286ca02 38325->38331 38326->38325 38341 286d280 8 API calls _fltout2 38327->38341 38329 2875500 free 38 API calls 38329->38331 38330->38246 38330->38247 38330->38248 38331->38329 38331->38330 38332 286ca3a 38332->38330 38333 2875500 free 38 API calls 38332->38333 38333->38332 38334->38254 38335->38248 38337->38271 38341->38332 38342->38289 38344 7ff6609080e0 38361 7ff6609098b0 38344->38361 38346 7ff66090810c SleepEx 38347 7ff660909128 73 API calls 38346->38347 38348 7ff66090812a 38347->38348 38349 7ff660908137 38348->38349 38350 7ff660903230 10 API calls 38348->38350 38351 7ff660909128 73 API calls 38349->38351 38350->38349 38352 7ff660908149 38351->38352 38353 7ff660906f70 75 API calls 38352->38353 38356 7ff66090815e 38352->38356 38353->38356 38354 7ff6609092d0 62 API calls _amsg_exit 38354->38356 38355 7ff660908285 SleepEx 38355->38356 38356->38354 38356->38355 38357 7ff6609082d8 CreateEventA 38356->38357 38360 7ff660903390 79 API calls 38356->38360 38359 7ff660903860 75 API calls 38357->38359 38358 7ff66090832d SleepEx WaitForSingleObject CloseHandle CloseHandle 38358->38356 38359->38358 38360->38356 38362 7ff66090cf20 38361->38362 38363 286db90 38364 286dbbf RegOpenKeyExW 38363->38364 38366 286dc19 38363->38366 38365 286dbf3 RegQueryValueExW 38364->38365 38364->38366 38365->38366 38367 2863370 ResetEvent timeGetTime socket 38368 28633ff lstrlenW WideCharToMultiByte 38367->38368 38376 28633f8 38367->38376 38369 2872914 38368->38369 38371 286344a lstrlenW WideCharToMultiByte gethostbyname 38369->38371 38370 2874f50 _fltout2 7 API calls 38373 286365b 38370->38373 38372 2863491 38371->38372 38374 286349e htons connect 38372->38374 38372->38376 38375 28634e4 setsockopt setsockopt setsockopt setsockopt 38374->38375 38374->38376 38377 28635e7 38375->38377 38378 2863598 WSAIoctl 38375->38378 38376->38370 38379 28759ec 42 API calls 38377->38379 38378->38377 38380 2863611 38379->38380 38381 28759ec 42 API calls 38380->38381 38381->38376 38382 2863670 38389 28636a0 ctype 38382->38389 38383 2863758 38385 2874f50 _fltout2 7 API calls 38383->38385 38384 28636f0 select 38384->38383 38384->38389 38387 2863790 38385->38387 38386 2863718 recv 38388 2863799 38386->38388 38386->38389 38392 2863bb0 48 API calls ctype 38388->38392 38389->38383 38389->38384 38389->38386 38391 2875894 38 API calls _errno 38389->38391 38391->38389 38392->38389
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen$QueryValue$Open
    • String ID: Console$IpDate$bb:$bd:$bh:$bz:$cl:$dd:$dl:$fz:$jp:$kl:$ll:$o1:$o2:$o3:$p1:$p2:$p3:$sh:$sx:$t1:$t2:$t3:$|p1:156.224.26.128|o1:6666|t1:1|p2:156.224.26.128|o2:8888|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:
    • API String ID: 1772312705-3286395973
    • Opcode ID: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
    • Instruction ID: 4611781327194c36e819747db63e7db66c9d3620679cb2f9ee178d696aaea46f
    • Opcode Fuzzy Hash: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
    • Instruction Fuzzy Hash: AD72F261F1D51AF6EA158B1494446B9B373FF48754F80A239C90F8E793EE7CA989C380

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 237 28667a0-286686d call 28755f8 call 2877e30 * 2 gethostname gethostbyname 244 2866873-28668bd inet_ntoa call 2876574 * 2 237->244 245 2866911-2866a5b MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 2868d20 GetSystemInfo wsprintfW call 2868430 call 28686f0 GetForegroundWindow 237->245 244->245 255 28668bf 244->255 259 2866a73-2866ab0 lstrlenW call 28685c0 245->259 260 2866a5d-2866a6d GetWindowTextW 245->260 257 28668c2-286690f inet_ntoa call 2876574 * 2 255->257 257->245 266 2866ab2-2866ac5 call 28757e0 259->266 267 2866aca-2866b08 call 28757e0 lstrlenW call 28685c0 259->267 260->259 266->267 273 2866b22-2866b59 call 2877e30 RegOpenKeyExW 267->273 274 2866b0a-2866b1d call 28757e0 267->274 278 2866c73-2866cb1 call 288f148 GetProcAddress 273->278 279 2866b5f-2866b97 RegQueryValueExW 273->279 274->273 288 2866cb7 GetSystemInfo 278->288 289 2866cb3-2866cb5 GetNativeSystemInfo 278->289 281 2866bbf-2866bc2 279->281 282 2866b99-2866bba call 28757e0 RegCloseKey 279->282 283 2866c68-2866c6d RegCloseKey 281->283 284 2866bc8-2866c50 GetLocalTime wsprintfW lstrlenW RegSetValueExW 281->284 282->283 283->278 284->283 287 2866c52-2866c63 call 28757e0 284->287 287->283 292 2866cbd-2866cc9 288->292 289->292 293 2866ccb-2866cd3 292->293 294 2866cd9 292->294 293->294 295 2866cd5-2866cd7 293->295 296 2866cde-2866d3c wsprintfW call 2868220 GetCurrentProcessId call 2869d50 call 2867d40 294->296 295->296 303 2866d45-2866e5c call 28757e0 call 2867150 call 2867b10 call 28677a0 call 2875c88 GetTickCount call 28765f0 call 287652c wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 296->303 304 2866d3e 296->304 319 2866e5e-2866e67 303->319 320 2866e69 303->320 304->303 321 2866e72-2866edf call 2866ee0 call 2874f2c call 2874f50 319->321 320->321
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Infowsprintf$ByteCharMultiSystemWide$lstrlen$CloseCountCurrentTickValueWindow_errnoinet_ntoa$AddressDirectoryForegroundHandleInputLastLocalLocaleModuleNativeOpenProcProcessProfileQueryTextTime_invalid_parameter_noinfo_localtime64gethostbynamegethostnamemalloc
    • String ID: %4d.%2d.%2d-%2d:%2d:%2d$%d min$1.0$2024.12.22$AppEvents$GROUP$GetNativeSystemInfo$INSTALLTIME$Network$REMARK$X64$X64 %s$d$kernel32.dll$x64$x86
    • API String ID: 2649121426-1201274903
    • Opcode ID: ebf27855cbf1da67cac5b0d59773e5e39c8b06264da9a0268aece5b0ef446386
    • Instruction ID: b9f1ae5f5e5e15238f7455eda653e2ebd234e69d7676c60b21b9d4005b5fff3e
    • Opcode Fuzzy Hash: ebf27855cbf1da67cac5b0d59773e5e39c8b06264da9a0268aece5b0ef446386
    • Instruction Fuzzy Hash: 9C12803A301A8296EB24DF64E8483ED77B5F794748F808116DB4E97B68EF38C659C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 329 2871790-2871802 call 2877e30 GetVersionExW 332 2871804-2871809 329->332 333 287180b-2871840 LoadLibraryA GetProcAddress SetProcessMitigationPolicy 329->333 332->333 334 2871842-2871866 call 2876718 call 288f450 332->334 333->334 339 2871897-287189e 334->339 340 2871868-2871891 call 28755f8 call 28759ec call 288f430 334->340 341 28718a5-2871944 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 28759ec call 288f430 call 28755f8 339->341 342 28718a0 call 2868f30 339->342 340->339 355 2871946-2871951 call 2863210 341->355 356 2871953 341->356 342->341 357 2871956-287196a call 28755f8 355->357 356->357 362 287196c-287196f call 286c400 357->362 363 2871979 357->363 366 2871974-2871977 362->366 365 287197c 363->365 367 2871983-287199b call 28631f0 365->367 366->365 370 287199d-28719c8 call 28757e0 * 2 367->370 371 28719ca-28719ee call 28757e0 * 2 367->371 380 28719f5-2871a1d 370->380 371->380 381 2871a1f-2871a62 call 28631f0 call 28757e0 * 2 380->381 382 2871a69-2871a73 380->382 381->382 384 2871a75-2871a7a 382->384 385 2871a81-2871a9a 382->385 384->385 386 2871a9c-2871ab8 EnumWindows 385->386 387 2871ae9-2871b15 call 2876718 385->387 386->387 390 2871aba 386->390 401 2871b27-2871bf8 call 2876718 CreateEventA call 28757e0 RegOpenKeyExW 387->401 402 2871b17-2871b22 call 288f450 387->402 393 2871ac0-2871ae7 call 288f450 EnumWindows 390->393 393->387 410 2871c0c 401->410 411 2871bfa-2871c06 call 286fe20 401->411 402->367 413 2871c10-2871c1a 410->413 414 2871c0b 411->414 415 2871ca2-2871cb8 call 28667a0 413->415 416 2871c20-2871c63 call 288f450 RegOpenKeyExW 413->416 414->410 421 2871ccc-2871cd3 415->421 422 2871cba-2871cc7 415->422 423 2871c65-2871c8a RegQueryValueExW 416->423 424 2871c90-2871c95 416->424 426 2871cd5-2871cf6 call 28759ec 421->426 427 2871cf9-2871cfc 421->427 431 2871da2-2871dbd call 288f430 422->431 423->424 424->413 425 2871c9b 424->425 425->415 426->427 430 2871d00-2871d07 427->430 433 2871d5c-2871d70 430->433 434 2871d09-2871d0e call 288f450 430->434 431->367 441 2871d87-2871da1 call 2876718 call 288f450 433->441 442 2871d72-2871d81 WaitForSingleObject call 288f430 433->442 439 2871d14-2871d19 434->439 439->430 440 2871d1b-2871d22 439->440 440->433 443 2871d24-2871d37 440->443 441->431 442->441 450 2871d4e-2871d5a call 288f450 443->450 451 2871d39-2871d48 WaitForSingleObject call 288f430 443->451 450->431 451->450
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Sleep$CloseHandle$Enum$ObjectOpenQuerySingleValueWaitWindows$AddressCreateEventExceptionFilterInfoLibraryLoadLocalMitigationPolicyProcProcessTimeUnhandledVersionwsprintf
    • String ID: %4d.%2d.%2d-%2d:%2d:%2d$127.0.0.1$156.224.26.128$156.224.26.128$156.224.26.128$6666$6666$8888$Console$Console\1$IpDatespecial$SetProcessMitigationPolicy$kernel32.dll
    • API String ID: 1083268199-3636297361
    • Opcode ID: 0dd27b8a1ad55d9f117150914b3ddba7ddd8d4c5dfe5985ab6a0316a85d3c4e6
    • Instruction ID: 1bb7fdafe248ec5aefdf79cad3d34ff82bdb37b573c1f6987cfa788b61d11170
    • Opcode Fuzzy Hash: 0dd27b8a1ad55d9f117150914b3ddba7ddd8d4c5dfe5985ab6a0316a85d3c4e6
    • Instruction Fuzzy Hash: A9F13F3E612B80D6EB20DF25E84839977A5F784B49FC48116DA4E87BA4DF3CC649CB41

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 455 2872280-28722f5 call 2884020 call 2872914 call 2877e30 462 28722fc 455->462 463 2872303-287231f call 288f450 SleepEx 462->463 466 28723f6 call 2872140 463->466 467 2872325-287234a GetTickCount OpenClipboard GetClipboardData 463->467 471 28723fb-28723fd 466->471 469 28723f0 CloseClipboard 467->469 470 2872350-287236c GlobalSize GlobalLock 467->470 469->466 472 28723e0-28723e9 GlobalUnlock 470->472 473 287236e-2872374 470->473 474 28723ff-2872406 call 2872080 471->474 475 287240b-2872415 471->475 472->469 473->472 476 2872376-2872381 473->476 474->475 479 2872417-2872433 475->479 480 287243b-2872447 475->480 478 2872384-287238e 476->478 481 2872390-2872396 478->481 482 2872398-287239a 478->482 479->480 483 287244d 480->483 484 28725ea-28725fc lstrlenW 480->484 481->478 481->482 482->472 485 287239c-28723db call 2874f80 wsprintfW call 2872080 call 2877e30 482->485 487 2872450-287245d 483->487 484->463 486 2872602-2872621 call 2872080 484->486 485->472 486->462 490 2872460-287246b 487->490 491 2872471-2872477 490->491 492 28725ac-28725bc 490->492 495 287257e-2872581 491->495 496 287247d-2872480 491->496 492->490 497 28725c2-28725e1 492->497 502 2872583-2872586 495->502 503 2872588-28725a5 wsprintfW 495->503 500 2872482-287248f GetKeyState 496->500 501 28724af-28724b2 496->501 497->487 504 28725e7 497->504 506 28724a2-28724ad 500->506 507 2872491-2872495 500->507 508 2872555-287257c wsprintfW 501->508 509 28724b8-28724bb 501->509 502->492 502->503 503->492 504->484 511 28724c7-28724ce 506->511 507->506 510 2872497-28724a0 507->510 508->492 509->508 512 28724c1 509->512 510->511 513 2872514-2872516 511->513 514 28724d0-28724e7 lstrlenW 511->514 512->511 515 2872536-287253d 513->515 516 2872518-287252f lstrlenW 513->516 517 28724ee-28724f5 514->517 518 28724e9-28724ec 514->518 520 2872540-2872553 wsprintfW 515->520 516->515 519 2872531-2872534 516->519 521 28724f7-2872507 lstrlenW 517->521 522 287250e-2872512 517->522 518->520 519->520 520->492 521->522 523 2872509-287250c 521->523 522->520 523->520
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlenwsprintf$ClipboardGlobal$Sleep$CloseCountDataLockOpenSizeStateTickUnlock
    • String ID: [$%s%s$%s%s$%s%s$)$)$5$5$9$[esc]$f
    • API String ID: 1110909968-2084089848
    • Opcode ID: f4c5d78ff3645bfeab57f0ca3db130f032e8f751affedc270cde83f38a5ffa6c
    • Instruction ID: 645a28769ea0d1921edf648c6bc91d772cec2f57c0f0cedc3d60decadc8660b9
    • Opcode Fuzzy Hash: f4c5d78ff3645bfeab57f0ca3db130f032e8f751affedc270cde83f38a5ffa6c
    • Instruction Fuzzy Hash: 6E91DE3D611B4186EB54CF25E8683A937A5F748B88F88C026DE4E97B6CEF38C145C741

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 585 7ff660906860-7ff66090687c 586 7ff660906882-7ff66090688e 585->586 587 7ff660906c6c-7ff660906c76 585->587 588 7ff660906894-7ff6609068cf RegOpenKeyExW 586->588 589 7ff660906b26-7ff660906b8b call 7ff660908b00 VirtualAlloc call 7ff660908b00 call 7ff660908aac 586->589 590 7ff6609068d5-7ff660906910 RegQueryValueExW 588->590 591 7ff6609069ca-7ff6609069d8 588->591 616 7ff660906b91-7ff660906bdd call 7ff660908b00 * 2 RegCreateKeyW 589->616 617 7ff660906c2e 589->617 594 7ff6609069bf-7ff6609069c4 RegCloseKey 590->594 595 7ff660906916-7ff660906969 call 7ff660908aac call 7ff66090b7c0 RegQueryValueExW 590->595 593 7ff6609069e0-7ff6609069ea 591->593 597 7ff6609069f4-7ff6609069f6 593->597 598 7ff6609069ec-7ff6609069f2 593->598 594->591 614 7ff66090696b-7ff6609069b2 call 7ff660908b00 VirtualAlloc call 7ff660908b00 595->614 615 7ff6609069b7 595->615 602 7ff660906c30-7ff660906c62 call 7ff6609094dc SleepEx call 7ff660903310 597->602 603 7ff6609069fc-7ff660906a06 597->603 598->593 598->597 619 7ff660906c64 602->619 606 7ff660906a1d-7ff660906b03 call 7ff66090b7c0 * 3 call 7ff660908aac call 7ff660908b00 603->606 607 7ff660906a08-7ff660906a16 VirtualFree 603->607 638 7ff660906b05-7ff660906b15 call 7ff660903860 606->638 639 7ff660906b19-7ff660906b21 call 7ff660908ab4 606->639 607->606 614->615 615->594 632 7ff660906bdf-7ff660906c13 RegDeleteValueW RegSetValueExW 616->632 633 7ff660906c19-7ff660906c29 RegCloseKey call 7ff6609095d0 616->633 617->602 619->587 632->633 633->617 638->639 639->619
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Value$Virtual$AllocCloseQuery$CreateDeleteFreeOpenSleep
    • String ID: .$Console\1$c9cb53ecfed9c0deec10651b37c64103$d33f351a4aeea5e608853d1a56661059$l$n
    • API String ID: 544495302-326781106
    • Opcode ID: 4aba7daaff96ba61096fd5a04ae9774ed3b6344a7a79354cfc8832202cbca9d2
    • Instruction ID: ff942c6091819d6198a66f566b6e890825fb416ea836f9f62cd44a5567b5361e
    • Opcode Fuzzy Hash: 4aba7daaff96ba61096fd5a04ae9774ed3b6344a7a79354cfc8832202cbca9d2
    • Instruction Fuzzy Hash: 67B1D121B1DB82E5EB248F21E8407AA3372FB89744F406239DA4E8BB66DF7DD544C740

    Control-flow Graph

    APIs
    • GetCurrentProcessId.KERNEL32 ref: 02868255
    • wsprintfW.USER32 ref: 0286826C
      • Part of subcall function 02868040: GetCurrentProcessId.KERNEL32 ref: 0286805D
      • Part of subcall function 02868040: OpenProcess.KERNEL32 ref: 0286806D
      • Part of subcall function 02868040: OpenProcessToken.ADVAPI32 ref: 02868095
      • Part of subcall function 02868040: CloseHandle.KERNEL32 ref: 028680A2
    • GetVersionExW.KERNEL32 ref: 0286829B
    • GetCurrentProcess.KERNEL32 ref: 028682C4
    • OpenProcessToken.ADVAPI32 ref: 028682D5
    • GetTokenInformation.ADVAPI32 ref: 028682FF
    • GetLastError.KERNEL32 ref: 02868309
    • LocalAlloc.KERNEL32 ref: 02868323
    • GetTokenInformation.ADVAPI32 ref: 0286834B
    • GetSidSubAuthorityCount.ADVAPI32 ref: 02868359
    • GetSidSubAuthority.ADVAPI32 ref: 02868368
    • LocalFree.KERNEL32 ref: 02868373
    • CloseHandle.KERNEL32 ref: 02868386
    • wsprintfW.USER32 ref: 028683E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
    • String ID: -N/$NO/$None/%s
    • API String ID: 4155081256-3095023699
    • Opcode ID: aa1dc0a71ee852b7543f200892738a0fbeb9d10303c75d0b1296d44c0924ed1f
    • Instruction ID: 2ae48936995d2f3331c3ee716386604fd97c7bf1e5172935c9a2a7cb6c09059d
    • Opcode Fuzzy Hash: aa1dc0a71ee852b7543f200892738a0fbeb9d10303c75d0b1296d44c0924ed1f
    • Instruction Fuzzy Hash: 1B51623D215B81C6DB60CF21F5987AA7360F799B88F8C5015EA4E87A54DF38C149CB00

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
    • String ID: 0u
    • API String ID: 950253168-3203441087
    • Opcode ID: 2ae06a9d799ad217e1939a4cc30cfbc6fb037babddfd49fabee5cbe1934be173
    • Instruction ID: 34636157df6768b354ea023cadbcc63a407f1fa914175586d6f0b33b534a8881
    • Opcode Fuzzy Hash: 2ae06a9d799ad217e1939a4cc30cfbc6fb037babddfd49fabee5cbe1934be173
    • Instruction Fuzzy Hash: 7D715B7A204B8186D720CF65F44435AB7A5FB88B98F908229EB8E47F68DF3CC145CB04

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
    • String ID: 0u
    • API String ID: 950253168-3203441087
    • Opcode ID: 7d394e5f66ba6b850d9984085327fb0713afef9c6993ef69a4f9733b52998f24
    • Instruction ID: 59d08befe585a3221a519983c18d7ce4da6c1aeea92686c01f3c1d8a02c40320
    • Opcode Fuzzy Hash: 7d394e5f66ba6b850d9984085327fb0713afef9c6993ef69a4f9733b52998f24
    • Instruction Fuzzy Hash: 89815C72608B81D6D724CF61F44026BB7A5FB88B94F005239EB9E87B69CF7CD1459B04

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 897 2871e70-2871f30 SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize call 288f430 900 2871f32-2871f35 DeleteFileW 897->900 901 2871f3b-2871f6b ReleaseMutex DirectInput8Create 897->901 900->901 902 2871f74-2871f94 901->902 903 2871f6d-2871f6f 901->903 902->903 907 2871f96-2871fac 902->907 904 2872051-2872071 call 2874f50 903->904 907->903 910 2871fae-2871fc7 907->910 910->903 912 2871fc9-2872000 910->912 912->903 914 2872006-287200d 912->914 915 2872013-2872015 914->915 915->903 916 287201b-2872036 GetTickCount GetKeyState 915->916 917 2872045 916->917 918 2872038-2872043 916->918 919 287204f 917->919 918->917 918->919 919->904
    APIs
    Strings
    • \DisplaySessionContainers.log, xrefs: 02871EB3
    • C:\ProgramData\DisplaySessionContainers.log, xrefs: 02871E98
    • <, xrefs: 02871FE6
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeStateTickWaitlstrcat
    • String ID: <$C:\ProgramData\DisplaySessionContainers.log$\DisplaySessionContainers.log
    • API String ID: 1095970075-2401377312
    • Opcode ID: bb6a7608012b94c4c6d922e8e9e914e6b01070625297e575aa239041ff6539ab
    • Instruction ID: 386884721d72c806e2b964c3708545bbe05f615962a2237f4f3ab0e40235fb0e
    • Opcode Fuzzy Hash: bb6a7608012b94c4c6d922e8e9e914e6b01070625297e575aa239041ff6539ab
    • Instruction Fuzzy Hash: 6951593D701A4186FB10CF26E85875A37A4F799B98F848116DE5E87B28DF3DC589C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 951 28802a4-28802ec call 2882f3c call 2881088 call 2881040 958 28806fd-2880711 call 287c590 951->958 959 28802f2-2880301 call 2880fe0 951->959 964 2880712-2880721 958->964 965 28806e9-28806f8 call 287c590 959->965 966 2880307-2880316 call 2881010 959->966 965->958 970 288031c-2880353 call 287a9f0 call 2887890 966->970 971 28806d5-28806e4 call 287c590 966->971 977 2880359-288035c 970->977 978 28803ea-28803f4 970->978 971->965 977->978 981 2880362-288036c 977->981 979 2880402-2880412 GetTimeZoneInformation 978->979 980 28803f6-28803fb call 2875500 978->980 985 2880418-2880440 979->985 986 2880539 979->986 980->979 982 288036e-288037b call 287bc00 981->982 983 2880392-28803ad call 2877660 call 287aa60 981->983 982->986 998 2880381-288038b 982->998 983->986 1011 28803b3-28803d0 call 2877660 call 287bcb0 983->1011 991 2880450-2880458 985->991 992 2880442-2880449 985->992 989 288053e-2880574 call 2881080 call 2881070 call 2881078 call 2882e3c 986->989 989->964 1025 288057a-2880592 call 28829f4 989->1025 996 288045a-2880462 991->996 997 288047d-2880485 991->997 992->991 996->997 1001 2880464-288047b 996->1001 1002 288048d-28804c7 WideCharToMultiByte 997->1002 998->983 1003 288038d call 2875500 998->1003 1001->1002 1006 28804c9-28804d1 1002->1006 1007 28804dd-28804e1 1002->1007 1003->983 1006->1007 1012 28804d3-28804db 1006->1012 1008 28804e4-288051a WideCharToMultiByte 1007->1008 1013 288051c-2880524 1008->1013 1014 2880531-2880536 1008->1014 1011->989 1024 28803d6-28803e5 call 287c590 1011->1024 1012->1008 1013->1014 1017 2880526-288052f 1013->1017 1014->986 1017->986 1024->978 1029 2880598-288059e 1025->1029 1030 28806c0-28806d4 call 287c590 1025->1030 1031 28805a0-28805a4 1029->1031 1032 28805a7-28805c3 call 2887884 1029->1032 1030->971 1031->1032 1037 28805c6-28805ca 1032->1037 1038 28806b8-28806bb 1037->1038 1039 28805d0-28805d2 1037->1039 1038->1037 1040 28805dd-28805e0 1039->1040 1041 28805d4-28805d7 1039->1041 1042 28805e2-2880603 call 2887884 1040->1042 1043 2880646-2880649 1040->1043 1041->1038 1041->1040 1052 288060d-2880611 1042->1052 1044 288064b-288064e 1043->1044 1045 2880656-2880662 1043->1045 1044->1045 1047 2880692-2880697 1045->1047 1048 2880664-288067b call 28829f4 1045->1048 1050 288069a-28806b6 call 2881080 call 2881070 1047->1050 1048->1050 1059 288067d-2880691 call 287c590 1048->1059 1050->964 1053 2880613-2880616 1052->1053 1054 2880605-2880608 1052->1054 1053->1043 1057 2880618-2880636 call 2887884 1053->1057 1054->1053 1060 288060a 1054->1060 1067 2880640-2880644 1057->1067 1059->1047 1060->1052 1067->1043 1068 2880638-288063b 1067->1068 1068->1043 1069 288063d 1068->1069 1069->1067
    APIs
    • _lock.LIBCMT ref: 028802CF
      • Part of subcall function 02882F3C: _amsg_exit.LIBCMT ref: 02882F66
    • _get_daylight.LIBCMT ref: 028802E5
      • Part of subcall function 02881040: _errno.LIBCMT ref: 02881049
      • Part of subcall function 02881040: _invalid_parameter_noinfo.LIBCMT ref: 02881054
    • _get_daylight.LIBCMT ref: 028802FA
      • Part of subcall function 02880FE0: _errno.LIBCMT ref: 02880FE9
      • Part of subcall function 02880FE0: _invalid_parameter_noinfo.LIBCMT ref: 02880FF4
    • _get_daylight.LIBCMT ref: 0288030F
      • Part of subcall function 02881010: _errno.LIBCMT ref: 02881019
      • Part of subcall function 02881010: _invalid_parameter_noinfo.LIBCMT ref: 02881024
    • ___lc_codepage_func.LIBCMT ref: 0288031C
      • Part of subcall function 0287A9F0: _getptd.LIBCMT ref: 0287A9F4
      • Part of subcall function 02887890: __wtomb_environ.LIBCMT ref: 028878C0
    • free.LIBCMT ref: 0288038D
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    • free.LIBCMT ref: 028803F6
    • GetTimeZoneInformation.KERNEL32 ref: 02880409
    • WideCharToMultiByte.KERNEL32 ref: 028804BF
    • WideCharToMultiByte.KERNEL32 ref: 02880512
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_get_daylight_invalid_parameter_noinfo$ByteCharMultiWidefree$ErrorFreeHeapInformationLastTimeZone___lc_codepage_func__wtomb_environ_amsg_exit_getptd_lock
    • String ID: Eastern Standard Time$Eastern Summer Time
    • API String ID: 2532449802-239921721
    • Opcode ID: 7be99dbbe7bd35314df4901e9ab7b07cb3c0379838c0e6ee7fd2d91ba5def4a4
    • Instruction ID: c30e306c5d4b51908f3a9047e46f08f46e34630c999a67afb02366f16e3c1d18
    • Opcode Fuzzy Hash: 7be99dbbe7bd35314df4901e9ab7b07cb3c0379838c0e6ee7fd2d91ba5def4a4
    • Instruction Fuzzy Hash: C5B1E47E2057C08AE734EF29E85471A7BA6F785784F848126DA8DE3B25DF38C456CB01

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1070 28677a0-2867812 call 2877e30 call 2876124 1075 2867814-286781e 1070->1075 1076 2867893-28678be CoCreateInstance 1070->1076 1077 2867821-2867824 call 28676b0 1075->1077 1078 28678c4-2867914 1076->1078 1079 2867a8a-2867a95 lstrlenW 1076->1079 1083 2867829-286782b 1077->1083 1090 2867a7a-2867a82 1078->1090 1091 286791a-2867932 1078->1091 1081 2867a97-2867aa7 lstrcatW 1079->1081 1082 2867aa8-2867ab0 1079->1082 1081->1082 1085 2867ab2 1082->1085 1086 2867ab8-2867aea call 2874f50 1082->1086 1088 2867871-2867891 call 2876124 1083->1088 1089 286782d-2867837 call 286a7b0 1083->1089 1085->1086 1088->1076 1088->1077 1099 2867853-286786b lstrcatW * 2 1089->1099 1100 2867839-2867840 call 286ab60 1089->1100 1090->1079 1095 2867a84 1090->1095 1091->1090 1101 2867938 1091->1101 1095->1079 1099->1088 1100->1099 1106 2867842-286784c call 286a860 1100->1106 1103 2867940-28679e2 call 2877e30 wsprintfW RegOpenKeyExW 1101->1103 1109 28679e4-2867a30 call 2877e30 RegQueryValueExW 1103->1109 1110 2867a5c-2867a6b 1103->1110 1106->1099 1115 286784e call 286aa60 1106->1115 1116 2867a52-2867a56 RegCloseKey 1109->1116 1117 2867a32-2867a4c lstrcatW * 2 1109->1117 1114 2867a72-2867a74 1110->1114 1114->1090 1114->1103 1115->1099 1116->1110 1117->1116
    APIs
    • lstrcatW.KERNEL32 ref: 0286785B
    • lstrcatW.KERNEL32 ref: 0286786B
      • Part of subcall function 0286AB60: GetCurrentProcess.KERNEL32 ref: 0286AB77
      • Part of subcall function 0286AB60: OpenProcessToken.ADVAPI32 ref: 0286AB88
      • Part of subcall function 0286AB60: LookupPrivilegeValueW.ADVAPI32 ref: 0286ABA8
      • Part of subcall function 0286AB60: AdjustTokenPrivileges.ADVAPI32 ref: 0286ABD0
      • Part of subcall function 0286AB60: GetLastError.KERNEL32 ref: 0286ABD6
      • Part of subcall function 0286AB60: CloseHandle.KERNEL32 ref: 0286ABE6
      • Part of subcall function 0286A860: CreateToolhelp32Snapshot.KERNEL32 ref: 0286A897
    • CoCreateInstance.OLE32 ref: 028678B6
    • wsprintfW.USER32 ref: 028679B3
    • RegOpenKeyExW.ADVAPI32 ref: 028679DA
    • RegQueryValueExW.ADVAPI32 ref: 02867A28
    • lstrcatW.KERNEL32 ref: 02867A3C
    • lstrcatW.KERNEL32 ref: 02867A4C
    • RegCloseKey.ADVAPI32 ref: 02867A56
      • Part of subcall function 028676B0: CreateToolhelp32Snapshot.KERNEL32 ref: 028676F1
      • Part of subcall function 028676B0: Process32FirstW.KERNEL32 ref: 02867710
      • Part of subcall function 028676B0: Process32NextW.KERNEL32 ref: 02867750
      • Part of subcall function 028676B0: CloseHandle.KERNEL32 ref: 0286775D
    • lstrlenW.KERNEL32 ref: 02867A8D
    • lstrcatW.KERNEL32 ref: 02867AA1
      • Part of subcall function 0286A7B0: GetModuleHandleA.KERNEL32 ref: 0286A7BD
      • Part of subcall function 0286A7B0: GetProcAddress.KERNEL32 ref: 0286A7D5
      • Part of subcall function 0286A7B0: GetProcAddress.KERNEL32 ref: 0286A7EC
      • Part of subcall function 0286A7B0: GetProcAddress.KERNEL32 ref: 0286A803
    Strings
    • CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}, xrefs: 028679A8
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrcat$AddressCloseCreateHandleProc$OpenProcessProcess32SnapshotTokenToolhelp32Value$AdjustCurrentErrorFirstInstanceLastLookupModuleNextPrivilegePrivilegesQuerylstrlenwsprintf
    • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}
    • API String ID: 1729154408-4035668053
    • Opcode ID: 87d92d43499c7525a60042b981ac11658ec4cafe16c756d136ae682597cb2c07
    • Instruction ID: 49d575e516a307c6e5963a205cf9c84ce4ca8a5c7f0cc68aae052e31817d7436
    • Opcode Fuzzy Hash: 87d92d43499c7525a60042b981ac11658ec4cafe16c756d136ae682597cb2c07
    • Instruction Fuzzy Hash: 1D917D7A700B808AEB10CF65E8447AD7BB2F788B98F944116DE4D97B28DF38C555CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1119 2867ea0-2867efa call 28666b0 * 2 1124 2867f00-2867f1e GetTokenInformation 1119->1124 1125 286801a 1119->1125 1126 2867f54-2867f76 GetTokenInformation 1124->1126 1127 2867f20-2867f29 call 288f438 1124->1127 1128 286801c-2868039 call 2874f50 1125->1128 1131 2868001-2868004 1126->1131 1132 2867f7c-2867fb4 LookupAccountSidW 1126->1132 1127->1125 1140 2867f2f-2867f4e GetProcessHeap HeapAlloc 1127->1140 1131->1125 1135 2868006-2868014 GetProcessHeap call 288f498 1131->1135 1136 2867fb6-2867fc1 call 288f438 1132->1136 1137 2867fdf-2867ffc call 28666b0 * 2 1132->1137 1135->1125 1144 2867fc3-2867fd9 call 28757e0 1136->1144 1145 2867fdb-2867fdd 1136->1145 1137->1131 1140->1125 1140->1126 1144->1131 1145->1128
    APIs
      • Part of subcall function 028666B0: SysFreeString.OLEAUT32 ref: 0286670D
      • Part of subcall function 028666B0: SysAllocString.OLEAUT32 ref: 02866759
    • GetTokenInformation.ADVAPI32 ref: 02867F16
    • GetLastError.KERNEL32 ref: 02867F20
    • GetProcessHeap.KERNEL32 ref: 02867F33
    • HeapAlloc.KERNEL32 ref: 02867F42
    • GetTokenInformation.ADVAPI32 ref: 02867F6E
    • LookupAccountSidW.ADVAPI32 ref: 02867FAC
    • GetLastError.KERNEL32 ref: 02867FB6
    • GetProcessHeap.KERNEL32 ref: 02868006
    • HeapFree.KERNEL32 ref: 02868014
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountLookup
    • String ID: NONE_MAPPED$Network
    • API String ID: 1972796461-3150097737
    • Opcode ID: 8113f941a4de608807758112df11e72a60d86c4884b026946c1f4e66eb8542e5
    • Instruction ID: 1975085d689a9c1d69c0998f41fbab6972064ebf189f74531db21a2448b47223
    • Opcode Fuzzy Hash: 8113f941a4de608807758112df11e72a60d86c4884b026946c1f4e66eb8542e5
    • Instruction Fuzzy Hash: 08419F2E305A8186EB109F55F8487AAB3A5FB89B89F948521DB4D87B14EF3DC449CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateEvent$CountCriticalInitializeSectionSpinTimetime
    • String ID: <$<
    • API String ID: 4111701721-213342407
    • Opcode ID: 71aba28c82a38994b348574f9f59d4c9b61d547acce44c6443545729c696c839
    • Instruction ID: 4498978ab4d058ed65b842b0282d27372764391c367ce77cdbdf4bf7d91bdbbe
    • Opcode Fuzzy Hash: 71aba28c82a38994b348574f9f59d4c9b61d547acce44c6443545729c696c839
    • Instruction Fuzzy Hash: 61817932615B92D6E7488F34E8447AD32BAFB44F48F08523DEE498E799CF788155CB50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStringslstrcatlstrlen
    • String ID: A:\$B:\
    • API String ID: 1889997506-1009255891
    • Opcode ID: 195c15b6208fbb33efc9ae23a30a98022802357f617ac369b918550c39e8a5e0
    • Instruction ID: 6441adcd8c2c5a26db9991909316c6a49c3c71768022a82c3cb3d821f1ce48ac
    • Opcode Fuzzy Hash: 195c15b6208fbb33efc9ae23a30a98022802357f617ac369b918550c39e8a5e0
    • Instruction Fuzzy Hash: C8316E6E704A81C5EB709B15F8483AB63A5F798B89F849111DE8E87B98EF7CC145CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen$Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
    • String ID:
    • API String ID: 3551332608-0
    • Opcode ID: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
    • Instruction ID: 625eb9fb99ca038de03077731bc382c68d16cebd485ed85c37edc4ef0751dff1
    • Opcode Fuzzy Hash: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
    • Instruction Fuzzy Hash: 47014020F18942E2F708EB71BC1956A33B7BF88B15B446274D44EC9372DE7C640A9200
    APIs
    • GetDriveTypeW.KERNEL32 ref: 0286849A
    • GetDiskFreeSpaceExW.KERNEL32 ref: 028684BE
    • GlobalMemoryStatusEx.KERNEL32 ref: 02868525
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DiskDriveFreeGlobalMemorySpaceStatusType
    • String ID: %sFree%d Gb $:$@$HDD:%d
    • API String ID: 3475944273-3501811827
    • Opcode ID: 1e499d2353234789bc0f3bbbd974805f3cb9744872628ca8bd1c944a6ef7e3b2
    • Instruction ID: f5cd74b01277286fed59a5f5d44795f735485d7911731f0eb9b6760125a07a83
    • Opcode Fuzzy Hash: 1e499d2353234789bc0f3bbbd974805f3cb9744872628ca8bd1c944a6ef7e3b2
    • Instruction Fuzzy Hash: 0E31173A209B8486D760DB15B84479BB3A4F389798F945116EACD83B18DF38C45ACB40
    APIs
    • GetForegroundWindow.USER32 ref: 0287216F
    • GetWindowTextW.USER32 ref: 0287218C
    • lstrlenW.KERNEL32 ref: 028721C6
    • GetLocalTime.KERNEL32 ref: 028721D5
    • wsprintfW.USER32 ref: 02872225
      • Part of subcall function 02872080: WaitForSingleObject.KERNEL32 ref: 02872097
      • Part of subcall function 02872080: CreateFileW.KERNEL32 ref: 028720C9
      • Part of subcall function 02872080: SetFilePointer.KERNEL32 ref: 028720EE
      • Part of subcall function 02872080: lstrlenW.KERNEL32 ref: 028720F7
      • Part of subcall function 02872080: WriteFile.KERNEL32 ref: 02872115
      • Part of subcall function 02872080: CloseHandle.KERNEL32 ref: 0287211E
      • Part of subcall function 02872080: ReleaseMutex.KERNEL32 ref: 0287212B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: File$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
    • String ID: [
    • API String ID: 3163932117-4056885943
    • Opcode ID: 4a0902b76c87c20fdb2e3105c81e170fc1e3dc222144a48b5715cacb2e30ad74
    • Instruction ID: 1c902aacf525c8bc1d40069f2497ddbdd740a5804f6f7f994c69911d2666289b
    • Opcode Fuzzy Hash: 4a0902b76c87c20fdb2e3105c81e170fc1e3dc222144a48b5715cacb2e30ad74
    • Instruction Fuzzy Hash: 34318E29229A5085EB10CF56F85837AB3A6FB94744F84C116E98E82A68EF3CC448CF41
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
    • String ID:
    • API String ID: 1789362936-0
    • Opcode ID: 478adfaa53224f4c646a90ac3974a5860d44690c717c694f81840881146ffb29
    • Instruction ID: 4fbe7f7e372e46f84a6fdecaa5270dc0ee0c663a0f4f5e280384a9a9461cbc66
    • Opcode Fuzzy Hash: 478adfaa53224f4c646a90ac3974a5860d44690c717c694f81840881146ffb29
    • Instruction Fuzzy Hash: 5531766D315A8185DB20CB29E81977AB361FB48BB8F848316EE7A437D8EF38C555C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$recvselect
    • String ID:
    • API String ID: 4102763267-0
    • Opcode ID: 0209d1afcfec4bbf66b436d0a2968ceaa8cc84d20af26958721757647a73e531
    • Instruction ID: 5f1408e4048b0de4e9fd3f98930e5bd5ea95fd3793d215b2e79b995c95e5a221
    • Opcode Fuzzy Hash: 0209d1afcfec4bbf66b436d0a2968ceaa8cc84d20af26958721757647a73e531
    • Instruction Fuzzy Hash: C1316DBE214A8082DB309B69E95876E73A2F789F89F844275CB5D87B58DF38C0448B05
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateFactory
    • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
    • API String ID: 1145517477-257307503
    • Opcode ID: fa8402bfd6ce440d6ff4b8cf1932907d5849ae49a8771a0e948cbd0e09370c9a
    • Instruction ID: 379db8999fcea133f550d0ead7c934de4036c75e16a9c9b7968ea98d788c31b7
    • Opcode Fuzzy Hash: fa8402bfd6ce440d6ff4b8cf1932907d5849ae49a8771a0e948cbd0e09370c9a
    • Instruction Fuzzy Hash: B4D1C37E715A8486DF10CF66E4482AE7362F784BE8F544611DE6EA7B98CF38C449C700

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$DisposeFreeFromImageLock$AllocBitmapDeleteGdiplusObjectShutdownUnlock
    • String ID:
    • API String ID: 562715702-0
    • Opcode ID: 6b4c91a67da076fc5ed7ed7d3bbb601d668363ccad180db4f24a8162a4e7ad9d
    • Instruction ID: ea1b0a1126f8da68a6564e692726fd3d0cb770698b0915d4004322e30ec941b4
    • Opcode Fuzzy Hash: 6b4c91a67da076fc5ed7ed7d3bbb601d668363ccad180db4f24a8162a4e7ad9d
    • Instruction Fuzzy Hash: 48910A3A705B408AEB20EB65E8583AD33B5F754BA8F808615CE5E57EA8DF38C519C740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 644 286ceb0-286cee0 call 286c7d0 647 286cee6-286cef6 GdipGetImageEncodersSize 644->647 648 286cfc0 644->648 647->648 650 286cefc-286cf07 647->650 649 286cfc5-286cfe0 call 2874f50 648->649 652 286cf43-286cf50 650->652 653 286cf09-286cf12 call 286c340 650->653 656 286cf56-286cf62 call 2875540 652->656 657 286d197-286d1a1 call 2861220 652->657 661 286cf14-286cf1e 653->661 662 286cf40 653->662 665 286cf64-286cf66 656->665 666 286cf68-286cf72 656->666 667 286cf20 661->667 668 286cf2a-286cf3e call 2884020 661->668 662->652 669 286cf75-286cf78 665->669 666->669 667->668 668->669 671 286cf97-286cfa7 GdipGetImageEncoders 669->671 672 286cf7a-286cf7d 669->672 676 286cfe1-286cff1 671->676 677 286cfa9-286cfac 671->677 674 286cf90-286cf95 672->674 675 286cf7f 672->675 674->649 680 286cf80-286cf8e call 2875500 675->680 678 286cff3 676->678 679 286d03a 676->679 677->648 681 286cfae 677->681 682 286d000-286d017 678->682 684 286d041-286d054 679->684 680->674 685 286cfb0-286cfbe call 2875500 681->685 686 286d02a-286d02c 682->686 687 286d019-286d024 682->687 689 286d056-286d061 684->689 690 286d073-286d075 684->690 685->648 694 286d02f-286d031 686->694 687->686 693 286d026-286d028 687->693 689->690 695 286d063-286d065 689->695 692 286d078-286d07a 690->692 697 286d07c-286d07f 692->697 698 286d09a-286d0a8 692->698 693->694 699 286d067-286d071 694->699 700 286d033-286d038 694->700 695->692 697->648 701 286d085-286d093 call 2875500 697->701 702 286d11a-286d147 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 698->702 703 286d0aa-286d0f4 GdipCreateBitmapFromScan0 GdipSaveImageToStream 698->703 699->684 700->679 700->682 714 286d095 701->714 706 286d175-286d17e GdipDisposeImage 702->706 707 286d149-286d152 GdipDisposeImage 702->707 705 286d0f6-286d0ff GdipDisposeImage 703->705 703->706 705->648 712 286d105-286d113 call 2875500 705->712 710 286d190-286d192 706->710 711 286d180-286d18e call 2875500 706->711 707->648 708 286d158 707->708 713 286d160-286d16e call 2875500 708->713 710->649 711->710 721 286d115 712->721 722 286d170 713->722 714->648 721->648 722->648
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Gdip$Image$free$Dispose$BitmapCreateEncodersFromSaveStream$Scan0Sizemalloc
    • String ID: &
    • API String ID: 1890951399-3042966939
    • Opcode ID: cae27d6bd8201d0dc58153021ad5c4c411b490ebb8ed088c6c7b76cf93af3724
    • Instruction ID: 6f9250bc32a0cf990ce523ce32283a0ed16c4339e93c85f527424bf6f4491161
    • Opcode Fuzzy Hash: cae27d6bd8201d0dc58153021ad5c4c411b490ebb8ed088c6c7b76cf93af3724
    • Instruction Fuzzy Hash: DF71A46E3016819AEF149F35D80C7B96365F758B9CF888622DF5D8BB98EF68C145C340

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 803 286ca90-286cad7 GdipGetImagePixelFormat 804 286cade-286cafc 803->804 805 286cad9 803->805 806 286cb10-286cb15 804->806 807 286cafe-286cb0c 804->807 805->804 808 286cb17-286cb28 806->808 809 286cb2c-286cb40 GdipGetImageHeight 806->809 807->806 808->809 810 286cb47-286cb5e GdipGetImageWidth 809->810 811 286cb42 809->811 812 286cb65-286cb7c call 286c930 810->812 813 286cb60 810->813 811->810 816 286cb82-286cb8a 812->816 817 286cd50-286cd55 812->817 813->812 819 286cb90-286cba4 GdipGetImagePaletteSize 816->819 820 286cccd-286ccd8 816->820 818 286ce82-286ceaa call 2874f50 817->818 822 286cba6 819->822 823 286cbab-286cbb6 819->823 824 286ce01-286ce5e GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 820->824 825 286ccde-286cd0f GdipBitmapLockBits 820->825 822->823 827 286cbea-286cbf8 823->827 828 286cbb8-286cbc2 call 286c340 823->828 831 286ce64-286ce67 824->831 829 286cd65-286cd7e 825->829 830 286cd11-286cd19 825->830 832 286cbfe-286cc0a call 2875540 827->832 833 286cd5a-286cd64 call 2861220 827->833 828->827 852 286cbc4-286cbcb 828->852 834 286cd80-286cd93 call 2876a28 829->834 835 286cdbf-286cdd0 GdipBitmapUnlockBits 829->835 837 286cd30-286cd35 830->837 838 286cd1b 830->838 839 286ce80 831->839 840 286ce69 831->840 855 286cc11-286cc17 832->855 856 286cc0c-286cc0f 832->856 833->829 857 286cd95-286cd98 834->857 858 286cda9-286cdbd 834->858 835->831 842 286cdd6-286cddb 835->842 837->818 847 286cd20-286cd2e call 2875500 838->847 839->818 841 286ce70-286ce7e call 2875500 840->841 841->839 842->831 847->837 859 286cbd7-286cbe8 call 2884020 852->859 860 286cbcd 852->860 863 286cc1b-286cc1e 855->863 856->863 864 286cdf6-286ce00 call 2861220 857->864 865 286cd9a-286cd9d 857->865 858->834 858->835 859->863 860->859 867 286cc20-286cc23 863->867 868 286cc3f-286cc52 GdipGetImagePalette 863->868 864->824 870 286cd9f-286cda2 865->870 871 286cdeb-286cdf5 call 2861220 865->871 874 286cc35-286cc3a 867->874 875 286cc25-286cc33 call 2875500 867->875 877 286cc54 868->877 878 286cc59-286cc62 868->878 870->871 872 286cda4-286cda7 870->872 871->864 872->858 879 286cde0-286cdea call 2861220 872->879 874->818 875->874 877->878 880 286cd3a-286cd3d 878->880 881 286cc68-286cc6d 878->881 879->871 880->817 884 286cd3f 880->884 881->880 885 286cc73-286cc78 881->885 888 286cd40-286cd4e call 2875500 884->888 889 286cc7a-286cc85 885->889 890 286ccbb-286ccc9 call 286d1b0 885->890 888->817 893 286cc90-286ccb9 889->893 890->820 893->890 893->893
    APIs
    • GdipGetImagePixelFormat.GDIPLUS ref: 0286CACF
    • GdipGetImageHeight.GDIPLUS ref: 0286CB38
    • GdipGetImageWidth.GDIPLUS ref: 0286CB56
    • GdipGetImagePaletteSize.GDIPLUS ref: 0286CB9C
    • malloc.LIBCMT ref: 0286CC02
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • free.LIBCMT ref: 0286CC2B
    • GdipGetImagePalette.GDIPLUS ref: 0286CC4A
    • GdipBitmapLockBits.GDIPLUS ref: 0286CD07
    • free.LIBCMT ref: 0286CD26
    • GdipCreateBitmapFromScan0.GDIPLUS ref: 0286CE1F
    • GdipGetImageGraphicsContext.GDIPLUS ref: 0286CE34
    • GdipDrawImageI.GDIPLUS ref: 0286CE4C
    • GdipDeleteGraphics.GDIPLUS ref: 0286CE55
    • GdipDisposeImage.GDIPLUS ref: 0286CE5E
    • free.LIBCMT ref: 0286CD46
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    • memcpy_s.LIBCMT ref: 0286CD8C
    • GdipBitmapUnlockBits.GDIPLUS ref: 0286CDC8
    • free.LIBCMT ref: 0286CE76
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Gdip$Image$free$Bitmap_errno$BitsGraphicsHeapPalette$AllocContextCreateDeleteDisposeDrawErrorFormatFreeFromHeightLastLockPixelScan0SizeUnlockWidth_callnewhmallocmemcpy_s
    • String ID:
    • API String ID: 1886978121-0
    • Opcode ID: 65f0a3a14f119414638e25c4c10bd3a856a8312b62936d53a4a41eaeb62985e8
    • Instruction ID: aac2562407ffc9b6dd38f3be6c4fcff0d3b889a3e20039f25e410e78d760881f
    • Opcode Fuzzy Hash: 65f0a3a14f119414638e25c4c10bd3a856a8312b62936d53a4a41eaeb62985e8
    • Instruction Fuzzy Hash: 49B1797E3006808AEB20DF25D44CBA93BA5F748BD8F858526DE9E8BB54DF38D145C744

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateMutex$Sleep$ConsoleErrorHandleLastModuleWindowlstrcmplstrlen
    • String ID: 2024.12.22$key$open
    • API String ID: 4141083079-4017660554
    • Opcode ID: f911b2afd73dc9504530b06ff46ad50bcc204ae388924bb075476682b1ac500a
    • Instruction ID: 41db5e5d8561bcd9e1bba20d14efa2088a1ffeec4a5414398b66dcb44886f728
    • Opcode Fuzzy Hash: f911b2afd73dc9504530b06ff46ad50bcc204ae388924bb075476682b1ac500a
    • Instruction Fuzzy Hash: 9B31317D611A42D2FB54AB24F85C7BA7361FB94709FC4C026D64E82964DF3CC149CB41
    APIs
    • LoadLibraryW.KERNEL32 ref: 02868D35
    • GetProcAddress.KERNEL32 ref: 02868D51
    • FreeLibrary.KERNEL32 ref: 02868E7D
      • Part of subcall function 028757BC: _vswprintf_s_l.LIBCMT ref: 028757D6
      • Part of subcall function 02868CA0: GetModuleHandleW.KERNEL32 ref: 02868CCB
      • Part of subcall function 02868CA0: GetProcAddress.KERNEL32 ref: 02868CDB
      • Part of subcall function 02868CA0: GetNativeSystemInfo.KERNEL32 ref: 02868CEB
    • RegOpenKeyExW.ADVAPI32 ref: 02868E17
    • RegQueryValueExW.ADVAPI32 ref: 02868E42
    • RegCloseKey.ADVAPI32 ref: 02868E67
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValue_vswprintf_s_l
    • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
    • API String ID: 1477497710-3190923360
    • Opcode ID: 9a6095186e03b76efae6a3eae714c10ad3fa5ee1170803ccf761aa8016e5e9c0
    • Instruction ID: f430e0186ae0cc2a3bfda231f70723f6262d409611caf17b45941d6ba73c08c2
    • Opcode Fuzzy Hash: 9a6095186e03b76efae6a3eae714c10ad3fa5ee1170803ccf761aa8016e5e9c0
    • Instruction Fuzzy Hash: 3F31A53E21678186DB60CB15F44476A7361F789BE8F848211EE9E47B58EF3CC549CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Sleep$CloseCreateEventHandle_errno$ObjectSingleStartupWait_invalid_parameter_noinfomalloc
    • String ID: 156.224.26.128$6666
    • API String ID: 407272786-1480230661
    • Opcode ID: 13c9adc974c42543c4138414809006d942cbbcd1fe96e939a7d0cf87f8cfa7a0
    • Instruction ID: 4a690725ad1da380f0d6ba215481166fe19d483d2aa96c77f8049645f6f69872
    • Opcode Fuzzy Hash: 13c9adc974c42543c4138414809006d942cbbcd1fe96e939a7d0cf87f8cfa7a0
    • Instruction Fuzzy Hash: 37614A31A2C642F5E6149B20E8402BA6376FF89790F406339E95ECB7A6DF3CE955C340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
    • String ID: IpDates_info$SOFTWARE
    • API String ID: 864241144-2243437601
    • Opcode ID: 7273320449914747eef314da4b35d0b3e2dae11081ca32cb48a94620bb4d36a9
    • Instruction ID: 9798693b298f1ad9a88031f2290c8cb4fcb6a82360eb373ba8f3188d46248237
    • Opcode Fuzzy Hash: 7273320449914747eef314da4b35d0b3e2dae11081ca32cb48a94620bb4d36a9
    • Instruction Fuzzy Hash: AD313231B2CA02E2E7548B11E84466A33B7EF88794F402234E55ECA7A6DF7CE589C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: String$CloseHandleProcess$FreeOpen$CurrentToken
    • String ID:
    • API String ID: 3697972778-0
    • Opcode ID: d65573670d91d4a2319d9bf601b7591871b764b4696a34e88597c2945c6666e4
    • Instruction ID: 91d1fc67ab332e77c1a3bc676f190d942634110b2f5cc0dd830e1b199d7122b2
    • Opcode Fuzzy Hash: d65573670d91d4a2319d9bf601b7591871b764b4696a34e88597c2945c6666e4
    • Instruction Fuzzy Hash: FD41632E206B8082EF25DF55E85837A7361FB84B99F888625CE9E87B54DF3CC449C741
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit$CommandInitializeLine__wsetargv_cinit
    • String ID:
    • API String ID: 2949660345-0
    • Opcode ID: bc546b9b31afb54ae0084185d84276419e05a16c241d08c8ffe122babf2c2063
    • Instruction ID: 3eb9d5b54a46f594e811938b236e3ce806246cbd3c3c2d58b33657f53c2f2244
    • Opcode Fuzzy Hash: bc546b9b31afb54ae0084185d84276419e05a16c241d08c8ffe122babf2c2063
    • Instruction Fuzzy Hash: 0731C421E1D603E6FB506B6495512B922B7EF91744F00733DD66ECE3D3EE2CA84086D1
    APIs
    • RegOpenKeyExW.ADVAPI32 ref: 02867B79
    • RegQueryInfoKeyW.ADVAPI32 ref: 02867BD4
    • RegEnumKeyExW.ADVAPI32 ref: 02867C69
    • lstrlenW.KERNEL32 ref: 02867C73
    • lstrlenW.KERNEL32 ref: 02867C82
      • Part of subcall function 02876188: _errno.LIBCMT ref: 028761A7
      • Part of subcall function 02876188: _invalid_parameter_noinfo.LIBCMT ref: 028761B3
      • Part of subcall function 02876188: _errno.LIBCMT ref: 028761FD
    • RegCloseKey.ADVAPI32 ref: 02867CCB
    • lstrlenW.KERNEL32 ref: 02867CE8
    Strings
    • Software\Tencent\Plugin\VAS, xrefs: 02867B5D
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen$_errno$CloseEnumInfoOpenQuery_invalid_parameter_noinfo
    • String ID: Software\Tencent\Plugin\VAS
    • API String ID: 47975445-3343197220
    • Opcode ID: 83177f2e4f272b9abf8fd471bf99554f254f381e64807105df55b77755f485f0
    • Instruction ID: 5803119369623710f9349123bfef6b21d9b37dfa1081a65b05cd48a8b4094580
    • Opcode Fuzzy Hash: 83177f2e4f272b9abf8fd471bf99554f254f381e64807105df55b77755f485f0
    • Instruction Fuzzy Hash: A351523A614B819AE760CF25F8947AEB3A6F78874CF904126DB8D97E58DF38C145CB40
    APIs
    Strings
    • C:\ProgramData\DisplaySessionContainers.log, xrefs: 028720A9
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
    • String ID: C:\ProgramData\DisplaySessionContainers.log
    • API String ID: 4202892810-820907713
    • Opcode ID: e66edca27f0b4b472a47d301f0d453ed1a843aabc931c6e442c329c9c8bb1688
    • Instruction ID: d40ac78a1433ec359e721419d28961f1d3c620cb58b6c02791f92aae3966711b
    • Opcode Fuzzy Hash: e66edca27f0b4b472a47d301f0d453ed1a843aabc931c6e442c329c9c8bb1688
    • Instruction Fuzzy Hash: 8D115E79215A4082FB508F55F80C7697360F798BB8FD48311DA6A03BA9CF7CC049CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Window$CountForegroundInfoInputLastTextTickmallocwsprintf
    • String ID: %d min
    • API String ID: 4179731349-1947832151
    • Opcode ID: 5ee87d7f40671d848751d3e95bac82712995824589b493fa2cb3551ae09538af
    • Instruction ID: 982fcd554040f4675011dc880df93639837ca7a0ed332afa5fae5886a4ce6d8f
    • Opcode Fuzzy Hash: 5ee87d7f40671d848751d3e95bac82712995824589b493fa2cb3551ae09538af
    • Instruction Fuzzy Hash: 2141C57E31468096DB24DF2AE4987AEB761FB85B88F844125DF4E87B58DF38C515CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateFreeInitializeInstanceStringUninitialize
    • String ID: FriendlyName$Network
    • API String ID: 841178590-1437807293
    • Opcode ID: 85724eb1235deb858d208dd5baec3e034e629cdd9d5c200151cad6a771ccc146
    • Instruction ID: 7a47f3f41696a2d798c1ee190cc9d6a39649715353027a251f96ec4574bcd42f
    • Opcode Fuzzy Hash: 85724eb1235deb858d208dd5baec3e034e629cdd9d5c200151cad6a771ccc146
    • Instruction Fuzzy Hash: 6731FD3A304A8692DB20CF75E44479A7760F7D8F98F958012DB8E87B28DF38C589CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoSystem$AddressHandleModuleNativeProc
    • String ID: GetNativeSystemInfo$kernel32.dll
    • API String ID: 3433367815-192647395
    • Opcode ID: 13fcd9e8e1cc8ddc9bbf0ad522e0ae51a73a5c5d350313a27b70b9d8622c7569
    • Instruction ID: 6ab3bf27d8315a94a099998b6bf5952996ad791f7cf460f931eff0ee7f9df30a
    • Opcode Fuzzy Hash: 13fcd9e8e1cc8ddc9bbf0ad522e0ae51a73a5c5d350313a27b70b9d8622c7569
    • Instruction Fuzzy Hash: F9F03C3D616F8586DB619B10F85836A73A1F798704FD44129D6CF83B54EF3CC2998B10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocCurrentFreeThread
    • String ID:
    • API String ID: 1155560630-0
    • Opcode ID: 4b852a1b5dd8efe1026821f14150178db2e8c6b99ec0c6da190b714437e6e122
    • Instruction ID: 2da2e8c2ca25592d44eb9bd89994024a44ed67bc081fb622f29eff00437531b7
    • Opcode Fuzzy Hash: 4b852a1b5dd8efe1026821f14150178db2e8c6b99ec0c6da190b714437e6e122
    • Instruction Fuzzy Hash: 29717932718A81EBE65C8B35A140769B3B6FB44784F509238DB9EC7746DF38E4A5CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Close$OpenQueryValuelstrcmp
    • String ID:
    • API String ID: 4288439342-0
    • Opcode ID: 8270887b47fe0bbc6353c8e6efe7337fff00ec0666d6931bc69347773c267aa0
    • Instruction ID: b16fbfc00ffd34104400706e2ca88fc0a243ec977659c15f73734689acbc4f53
    • Opcode Fuzzy Hash: 8270887b47fe0bbc6353c8e6efe7337fff00ec0666d6931bc69347773c267aa0
    • Instruction Fuzzy Hash: DA214439315A4085EB60CB15FC8C76BB360FB98B98F905225EA5D83B99DF3CC449CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 3283625137-0
    • Opcode ID: 6f9f1b3579f94cfaebc6fbf0fcd5291c4895944225407b78114679f626bf50e4
    • Instruction ID: 1559a4e5a0e97397cc405aea552aaee7d08a60d5562a7ca53b465867d56baca7
    • Opcode Fuzzy Hash: 6f9f1b3579f94cfaebc6fbf0fcd5291c4895944225407b78114679f626bf50e4
    • Instruction Fuzzy Hash: 5C21A13D60578086DB14EBAAA94075EF291FB84BE4F888235AF6983B94DF3CC054CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 3283625137-0
    • Opcode ID: 3cde405814183ac50174b4c7b06ee0a655b453fe3172371e7738c2e9b2a32393
    • Instruction ID: dceb2789fbbf88cfb4fe330d47c6b549f31ca67de383ab1ffd07ad22e4d0ab10
    • Opcode Fuzzy Hash: 3cde405814183ac50174b4c7b06ee0a655b453fe3172371e7738c2e9b2a32393
    • Instruction Fuzzy Hash: 9C218621B0C781D5EA15DB66A9402AAB2B6FF44B90F445339EE5E8B7D7DF3CE0118740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$recvselect
    • String ID:
    • API String ID: 4102763267-0
    • Opcode ID: a9cf800f0c082130cbe65a746388d6a607d03ee4f2f85c36c10afcc355ff1771
    • Instruction ID: 451a0c89dffb2a9a4396a1e13adab7e6557c708bfdd6b2c789fae7dec6c7f462
    • Opcode Fuzzy Hash: a9cf800f0c082130cbe65a746388d6a607d03ee4f2f85c36c10afcc355ff1771
    • Instruction Fuzzy Hash: 9B31A7B271C681E1E7745B35E40477A72B6EB44B84F446339DA4E8BB86DF3CD0008B41
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
    • String ID:
    • API String ID: 1789362936-0
    • Opcode ID: 6d084133aede52ac398ad07cdf42d3340ba2a72bb8a60b58af00913f837ec5e4
    • Instruction ID: 0fe79e25173c19485a5cd800e283923c4363723608a287967b09e0f95cde0f33
    • Opcode Fuzzy Hash: 6d084133aede52ac398ad07cdf42d3340ba2a72bb8a60b58af00913f837ec5e4
    • Instruction Fuzzy Hash: 0A21933D21568185DB64CB25E44C37AB7A1FB88B9CF848325DA5E86B58EF3CC105CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: OpenQueryValue
    • String ID: Console$IpDatespecial
    • API String ID: 4153817207-1840232981
    • Opcode ID: 9808f5570271f1bcc43127ee74aea5a2611a74c26f443a315a67f81ca2b01fbe
    • Instruction ID: 0dc3818f7cd4b6c4e7a8d08530fdd6460a299f964ab096eac0750d2b1c48a829
    • Opcode Fuzzy Hash: 9808f5570271f1bcc43127ee74aea5a2611a74c26f443a315a67f81ca2b01fbe
    • Instruction Fuzzy Hash: D621C23B719AA099E3208B61F8447AD77A5F74879CF848126EE8813A48CF38C19AC700
    APIs
    • _callnewh.LIBCMT ref: 00007FF660909136
    • malloc.LIBCMT ref: 00007FF660909142
      • Part of subcall function 00007FF660909070: _FF_MSGBANNER.LIBCMT ref: 00007FF6609090A0
      • Part of subcall function 00007FF660909070: HeapAlloc.KERNEL32(?,?,4E00000000000000,00007FF66090C050,?,?,ceil,00007FF66090D951,?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951), ref: 00007FF6609090C5
      • Part of subcall function 00007FF660909070: _callnewh.LIBCMT ref: 00007FF6609090DE
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090E9
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090F4
    • std::exception::exception.LIBCMT ref: 00007FF6609091AF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
    • String ID: bad allocation
    • API String ID: 2837191506-2104205924
    • Opcode ID: 4f08dc12cc9b3052129dc1c476ad1ada57a0f8fd3b1b96a9833c9c367f9ae114
    • Instruction ID: 30a9019c45a02aa4396789dba68a50cff9a5c998750958fe9b60bd68d8f2f8bc
    • Opcode Fuzzy Hash: 4f08dc12cc9b3052129dc1c476ad1ada57a0f8fd3b1b96a9833c9c367f9ae114
    • Instruction Fuzzy Hash: 7E01F761B1C607E0EA54AB10E8501B563B7EF94340F842639E95ECA7A3EE7CE155C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcess$FileImageNameOpen
    • String ID:
    • API String ID: 93767460-0
    • Opcode ID: f9ca6d39da2e8c6a3f8d5f910570484524346d4c253cc5b6543d40e07020b5bd
    • Instruction ID: ffad153d02d010558dd5ca80cb2f385257bafbd8961d4eaa5de5ea027dcb9d25
    • Opcode Fuzzy Hash: f9ca6d39da2e8c6a3f8d5f910570484524346d4c253cc5b6543d40e07020b5bd
    • Instruction Fuzzy Hash: 660112AD31578182EF24DB25F45C36662A1BB59BC8F848135CE4D87B48EF3DD045C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Thread$CurrentErrorExitLast_freefls
    • String ID:
    • API String ID: 217443660-0
    • Opcode ID: c1032e5ba32211df7021af190faab52d392a270f38cd16aa57ea7f747e353cbe
    • Instruction ID: 9b40b17ae35c10df3fb41bb5365db6ca894e5f8bd80b488298d70fb8c3b02df1
    • Opcode Fuzzy Hash: c1032e5ba32211df7021af190faab52d392a270f38cd16aa57ea7f747e353cbe
    • Instruction Fuzzy Hash: A4011D24E0DB56E5EA046B71D4452BD23BAEF09B84F146638CD0ECF363EE7DA4458390
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CancelEventclosesocketsetsockopt
    • String ID:
    • API String ID: 852421847-0
    • Opcode ID: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
    • Instruction ID: fb92add6df132b9c446cf6421dea208e5182d820b0e7c70cfd64aa0a9a25dfb2
    • Opcode Fuzzy Hash: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
    • Instruction Fuzzy Hash: F5F06D36604B81D7D7148F25E45436AB336FB88BA0F540335DBAD4B7A4CF79D0698700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ObjectSingleWait$Sleep
    • String ID:
    • API String ID: 2961732021-0
    • Opcode ID: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
    • Instruction ID: 71a35b6224632fd37fe5f7deb727bb04432697bfa682b607b8bac291f78800ba
    • Opcode Fuzzy Hash: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
    • Instruction Fuzzy Hash: 7AF03472B04A48D6E744CF76D8042A93376FB8DB24F641730CA3D8A3E4CF7884898320
    APIs
    • RegQueryInfoKeyW.ADVAPI32 ref: 0286FE96
    • RegEnumValueW.ADVAPI32 ref: 0286FF47
      • Part of subcall function 028755F8: malloc.LIBCMT ref: 02875612
      • Part of subcall function 028755F8: _callnewh.LIBCMT ref: 02875606
      • Part of subcall function 028755F8: std::exception::exception.LIBCMT ref: 0287567F
    • RegCloseKey.ADVAPI32 ref: 02870110
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseEnumInfoQueryValue_callnewhmallocstd::exception::exception
    • String ID:
    • API String ID: 1242514309-0
    • Opcode ID: 21b6ffa531e1fb87080f36f12b0947fb1935bc3c292b2138ac1d3d5bf68f2f64
    • Instruction ID: e63b8c96bfd204421a5ba7baab3c4a17bc1d7b02a8292c92a8cbeb8f23034914
    • Opcode Fuzzy Hash: 21b6ffa531e1fb87080f36f12b0947fb1935bc3c292b2138ac1d3d5bf68f2f64
    • Instruction Fuzzy Hash: 3C817E3A301B408ADB00DF69E88479D73A9F788B98F458226EF6D87B64EF34C555C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: 772ceebf875e37336e87943166f2de9f2810a96974fdecb1bd8079b0e36f7ae3
    • Instruction ID: 852a20171916048d16edd348fbc7244a387bd6c83b5ba33be5f8f0473ec1986d
    • Opcode Fuzzy Hash: 772ceebf875e37336e87943166f2de9f2810a96974fdecb1bd8079b0e36f7ae3
    • Instruction Fuzzy Hash: 48617232A18A52D6DB149B29D04CA6F73BAFB48B84F015239DA4E8B795DF38E445C780
    APIs
    • EnterCriticalSection.KERNEL32 ref: 0286C7F0
    • GdiplusStartup.GDIPLUS ref: 0286C82C
    • LeaveCriticalSection.KERNEL32 ref: 0286C846
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterGdiplusLeaveStartup
    • String ID:
    • API String ID: 389129658-0
    • Opcode ID: da60f929d78d2f63b72fb7356355eb002dbfafbd2e5e2885638b90ebbc7f88c4
    • Instruction ID: cfa74c1f74a51750b774949265f4389f5ee32d805930394590c6d721d966857d
    • Opcode Fuzzy Hash: da60f929d78d2f63b72fb7356355eb002dbfafbd2e5e2885638b90ebbc7f88c4
    • Instruction Fuzzy Hash: 4A01313A615B81D2EB109F15F848795B3F5F7A5744FC85107E68943964DFBCC159CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Heap$CreateInformationVersion
    • String ID:
    • API String ID: 3563531100-0
    • Opcode ID: 7cfbc3600ba10913be0d99bf369f62085571deb7fe8177c71bd152516bdef674
    • Instruction ID: eed4d6f22158ba834efa06aee8fb9b654b1a6202fa45a570ca78bb4a8c4214ad
    • Opcode Fuzzy Hash: 7cfbc3600ba10913be0d99bf369f62085571deb7fe8177c71bd152516bdef674
    • Instruction Fuzzy Hash: F6E0DF3C612A84C2FB945B65F84D7552222F798788FD0D01BEA4E43B54DF3CC0868B10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Heap$CreateInformationVersion
    • String ID:
    • API String ID: 3563531100-0
    • Opcode ID: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
    • Instruction ID: aea53cb257df5f67807302197e4a85b4195b82f2bb51540dff08e2c67a905fcd
    • Opcode Fuzzy Hash: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
    • Instruction Fuzzy Hash: 63E09234B29A43D2FB895710A81577A227AFF98384F802638E90EC6756DF7CE445CB84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AllocLibraryLoadVirtual
    • String ID:
    • API String ID: 3550616410-0
    • Opcode ID: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
    • Instruction ID: 24d84e8ac275bd997bf27c43daa18495dda9ede40f3c276e1b525ba48bca8d8f
    • Opcode Fuzzy Hash: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
    • Instruction Fuzzy Hash: 87B1B539614E0A8BCB2C9E69C8856B5B3E4FB54319B15413DEC8EC7291EB74E8D2C7C1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: String$AllocFree
    • String ID:
    • API String ID: 344208780-0
    • Opcode ID: 37c7eda1fc14ccb20b40b4972395f454460bfd1e1c29be7e040f8245d3cdd862
    • Instruction ID: 8d3ace924d0ef5217a006104939b296bdac78484a378f2e905e6874f0e4f69bd
    • Opcode Fuzzy Hash: 37c7eda1fc14ccb20b40b4972395f454460bfd1e1c29be7e040f8245d3cdd862
    • Instruction Fuzzy Hash: F321563D202B9181EF199F55E1583386268AF50BA8F1C47398F6D8BB94FF7DC4118740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: send
    • String ID:
    • API String ID: 2809346765-0
    • Opcode ID: d0ae4d2fbc79c699570b411c092e8fac233cba77cf9ac9c238a55a0d91b9a40b
    • Instruction ID: a5eb0760b933473dccb9b3d30625467cc90667d16b110776f5081429cb048644
    • Opcode Fuzzy Hash: d0ae4d2fbc79c699570b411c092e8fac233cba77cf9ac9c238a55a0d91b9a40b
    • Instruction Fuzzy Hash: 5211262E704BD141E3209B26F88873A7A54F788FD8F542161EF5AD3B54EBB9C0928701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: send
    • String ID:
    • API String ID: 2809346765-0
    • Opcode ID: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
    • Instruction ID: 0c15599e246cb9ef836b232113abeb97a6fc8dc367b00561e92427016f38b72d
    • Opcode Fuzzy Hash: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
    • Instruction Fuzzy Hash: 8A210B22B0CA9290E3605B26B84577A7669FB84BD8F046235DF5ED7B53EEBCD4428340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateHeapfree
    • String ID:
    • API String ID: 2345683253-0
    • Opcode ID: 5355ca0c2c7f68d72ca0deb5608f946a487617abf1cba7d6c45117941fe628d7
    • Instruction ID: 0f6e99e47257aaeb4530e41128888a1ad90a3f87a10ffa5b24fec424fc3ab6ba
    • Opcode Fuzzy Hash: 5355ca0c2c7f68d72ca0deb5608f946a487617abf1cba7d6c45117941fe628d7
    • Instruction Fuzzy Hash: D0115BBA521760CAE754CF28E48031977B8F748F48F64911AEB4997B18CB78C492CB84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateHeapfree
    • String ID:
    • API String ID: 2345683253-0
    • Opcode ID: d06350443261b5c44dc0382cd6166cd32f98e0a7bcc8923f0c5a309339592e20
    • Instruction ID: 97edbeff3d5c72eb7e646a2e042c8a7aeb056bed934f25fc68b61a090aa12035
    • Opcode Fuzzy Hash: d06350443261b5c44dc0382cd6166cd32f98e0a7bcc8923f0c5a309339592e20
    • Instruction Fuzzy Hash: 74115172A15760C6E744CF24E48021936FDFB48F48F25513AEB499B759CF78D482CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: SleepTimetime
    • String ID:
    • API String ID: 346578373-0
    • Opcode ID: 8ba189807d10781ce9f7bbddadc3a74c6f7bd83e01ef95e7953e346e1cdbb878
    • Instruction ID: 777df05bb9c1c0be199ed794b9f1b4cabfbaa6542df38b6a0809c20ff0f84f8d
    • Opcode Fuzzy Hash: 8ba189807d10781ce9f7bbddadc3a74c6f7bd83e01ef95e7953e346e1cdbb878
    • Instruction Fuzzy Hash: 81018B3AB14680C7E7288B69E68C37C2771F748F89F845265DB5A83B90CFB8C4A5C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: SleepTimetime
    • String ID:
    • API String ID: 346578373-0
    • Opcode ID: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
    • Instruction ID: 9628f92da19bc8e75538870529063452b89af69eb2aeab54389d27eeb7bb5b4c
    • Opcode Fuzzy Hash: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
    • Instruction Fuzzy Hash: DA018022A0C645E7E7648B34D18473D2672FB44B84F04A378DB5F8AB91CF78D4A5C741
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateObjectSingleThreadWait
    • String ID:
    • API String ID: 1891408510-0
    • Opcode ID: fe1e6dd7a0d7d9773822c04724471c00a9c4c89ee4f5eb478abf33e2b4483c6e
    • Instruction ID: 5684edeb92a5664e044e88a0e1e57799cae13f1f1a3b221194b6102cae30138c
    • Opcode Fuzzy Hash: fe1e6dd7a0d7d9773822c04724471c00a9c4c89ee4f5eb478abf33e2b4483c6e
    • Instruction Fuzzy Hash: B2E0483DD11A4081FBA0DB64BC4D3553695F7A4354F90C226D54D82B64FF3CC0558704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 26e2137525513526dd013d54ad7f142b8e6e46a3c1df15383bd1b51481be757a
    • Instruction ID: fe3775e0aa619ac003ebf98b0996a487b04c0ae17f97ad527a9e779c7ccfb0ee
    • Opcode Fuzzy Hash: 26e2137525513526dd013d54ad7f142b8e6e46a3c1df15383bd1b51481be757a
    • Instruction Fuzzy Hash: CF41153270CA8597D74DCA2AE45056AB3A6FB85BC8F049238EA4A8B759DF38D541C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: a7907fc47371d8ea5bd45931dab553867b38b76e3d69a2c4af86bce9e67ffd8b
    • Instruction ID: c187a0cab08aed18895beb186fe09a85776d8aa2227c4c9c274cea291e8dfbdb
    • Opcode Fuzzy Hash: a7907fc47371d8ea5bd45931dab553867b38b76e3d69a2c4af86bce9e67ffd8b
    • Instruction Fuzzy Hash: 7F21A13A715A408BD744CB2AE544719B3A1F788B84F549521EB5AD3B08EF38D8E28B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 95b57b51fc333e6316162f6326f5110e0a83f6deb2dcaf3171337f97a5765aa6
    • Instruction ID: db5705a5e9aa23ef14b0f34b65255b926e6de1a09c70dfef67482a4b6cf1fbe2
    • Opcode Fuzzy Hash: 95b57b51fc333e6316162f6326f5110e0a83f6deb2dcaf3171337f97a5765aa6
    • Instruction Fuzzy Hash: 8721B632B18941D7DB48CB2EE14021973B6FB49B84F549235EA5AD7749DF38E8D28B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: f1a96c915ccf0ad4eed1430c910f3da438602d1a86d24f0baeb0599d625581a0
    • Instruction ID: ce1a4240d6c3450c8e38b92b6cac439b181cebce41baaa77ee740db3f9c14078
    • Opcode Fuzzy Hash: f1a96c915ccf0ad4eed1430c910f3da438602d1a86d24f0baeb0599d625581a0
    • Instruction Fuzzy Hash: 6F11C439721B848ADB58CF3AB544719F3A5E788BC4F58D125DA4AD3718EF38C892CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Startup
    • String ID:
    • API String ID: 724789610-0
    • Opcode ID: 69ce0e59409c3ed63e01fee79cb91035653ccaefa39d6bbe4741f0a49fc59aaf
    • Instruction ID: 1e9b3ded4e6473acbfafc760840e8fc4b8f0b2379be032bc68d2af76b1995000
    • Opcode Fuzzy Hash: 69ce0e59409c3ed63e01fee79cb91035653ccaefa39d6bbe4741f0a49fc59aaf
    • Instruction Fuzzy Hash: E4F05E35B18A86EEE700DF20D8150A973BAFB48304F849636E99DCB756DE3CE114CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExitThread_amsg_exit_getptd
    • String ID:
    • API String ID: 449628364-0
    • Opcode ID: 556d5509b120e02cdcca8f06fb680f1e7bbffed6d54eb6d90fa9cde67232f795
    • Instruction ID: 16fdf7879a33fa640da4a2e406cdad392736c1857f3667a42fd6da941108be80
    • Opcode Fuzzy Hash: 556d5509b120e02cdcca8f06fb680f1e7bbffed6d54eb6d90fa9cde67232f795
    • Instruction Fuzzy Hash: 24C01212F4B241D2DE08737184AA6BC12B2EFCAB00F40A278E10F87383CD2C945A8280
    APIs
      • Part of subcall function 00007FF66090B9B0: GetLastError.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9BA
      • Part of subcall function 00007FF66090B9B0: FlsGetValue.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9C8
      • Part of subcall function 00007FF66090B9B0: FlsSetValue.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9F4
      • Part of subcall function 00007FF66090B9B0: GetCurrentThreadId.KERNEL32 ref: 00007FF66090BA08
      • Part of subcall function 00007FF66090B9B0: SetLastError.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090BA20
    • ExitThread.KERNEL32 ref: 00007FF660909428
      • Part of subcall function 00007FF66090BB8C: FlsGetValue.KERNEL32(?,?,?,00007FF660909426), ref: 00007FF66090BBA5
      • Part of subcall function 00007FF66090BB8C: FlsSetValue.KERNEL32(?,?,?,00007FF660909426), ref: 00007FF66090BBB6
      • Part of subcall function 00007FF66090BB8C: _freefls.LIBCMT ref: 00007FF66090BBBF
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Value$ErrorLastThread$CurrentExit_freefls
    • String ID:
    • API String ID: 1216290073-0
    • Opcode ID: c93bf5a72a887f659e3f866e1ba6ff3216b61a395110430233b074b26d48111d
    • Instruction ID: 72c641242e5ddc0bb407fe7cac5cf2924874119faaa592e12c672d31db8b0d9a
    • Opcode Fuzzy Hash: c93bf5a72a887f659e3f866e1ba6ff3216b61a395110430233b074b26d48111d
    • Instruction Fuzzy Hash: 77C00260F1D616E2EE196771255547922765F58740E083A3CDA1F8E393ED7CA4458290
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process$AddressLibraryLoadProc$AllocCreateCurrentDirectoryFileMemoryModuleNameOpenSystemVirtualWrite
    • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
    • API String ID: 675209239-4110464286
    • Opcode ID: 52ee398f02bbc98b8c9999d93ed425826fb6b28bff95aa8a10a5d848b399f8ca
    • Instruction ID: c0fcbf5bcfbfe69dd7ffa15777847ab4fbbd796d8f76d75803a7dac2a3db866b
    • Opcode Fuzzy Hash: 52ee398f02bbc98b8c9999d93ed425826fb6b28bff95aa8a10a5d848b399f8ca
    • Instruction Fuzzy Hash: 57913A39315B8186EB21CF61F8187AA73A5FB99B88FC48025DA4D57B58EF3DC249C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch$BitmapBitsDesktopModeSelectWindowmalloc
    • String ID: $gfff$gfff
    • API String ID: 1524144516-4202476792
    • Opcode ID: 8066b90c8a4dc953b84e640f8476b70301ba565c68af8a82491631fbe9cac30a
    • Instruction ID: 13e5ea65c434561d29b974adc7afa1576a703f1e2b29b61fda6cbfdad377aca4
    • Opcode Fuzzy Hash: 8066b90c8a4dc953b84e640f8476b70301ba565c68af8a82491631fbe9cac30a
    • Instruction Fuzzy Hash: 2EC1B03A715B408AE705DF76E44836D73B2BB59B88F418225DE0AABB58EF38C455C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: 67f0b5eaeb3921740e190712f335f91ecce0bd6accc88dea46569f73dd5c7a4a
    • Instruction ID: b6c2ce812d424c4b14db8b60671dad5bf82610915810c35b545979590574a2a9
    • Opcode Fuzzy Hash: 67f0b5eaeb3921740e190712f335f91ecce0bd6accc88dea46569f73dd5c7a4a
    • Instruction Fuzzy Hash: AA02E03E205A8586DB21EF29E44436EB761F784B48F984116EB8EC7B68DF3DC445CB11
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: 059fcb8d0d384e491ef6770d9f73524f45f969136b4973030bd1143b1e84cbf4
    • Instruction ID: 0a139ae1aef6ed05d4284d072eadaa0a1c8a0d395d91ac79e72bf12a69ac7249
    • Opcode Fuzzy Hash: 059fcb8d0d384e491ef6770d9f73524f45f969136b4973030bd1143b1e84cbf4
    • Instruction Fuzzy Hash: FA12C422A1C642E6EB208F25D44437A6776FB84B44F146239EA4ECB796EF3DE445CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: d243f7bfa6fd055a53a23daff3e65f4d6fa7b73664807df99c45da9877ccf527
    • Instruction ID: 4d4512041e3992fe8511d0fc565a733b6613ffa6297f4e654d29bf449b8eb8d2
    • Opcode Fuzzy Hash: d243f7bfa6fd055a53a23daff3e65f4d6fa7b73664807df99c45da9877ccf527
    • Instruction Fuzzy Hash: 8F52C3A2E0C656E5FB248B14944427E66B3BF45744F146A3ADA4FCE7D6CF3CE8408B90
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: 03ac5d1bdc9301c8ca3c9df34c87bf5f3fb9feeef272702db5c9e1564eaafe61
    • Instruction ID: 0947d6551c6532def4a837db9ad10d9ff0e27ae5b783a62c02ece42c9cee6c67
    • Opcode Fuzzy Hash: 03ac5d1bdc9301c8ca3c9df34c87bf5f3fb9feeef272702db5c9e1564eaafe61
    • Instruction Fuzzy Hash: CF42247F60869486EB258B6AD54437EBBA1F79579CF285006DF8ECBE64CB38C440CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: c7796815577772ce18d3e5aab90d9a5c4550496c256c24ff41890e78ec68314e
    • Instruction ID: b0d5bf4755d3f236cdd199938e6fbaf77b51d256b775776191da7993da486335
    • Opcode Fuzzy Hash: c7796815577772ce18d3e5aab90d9a5c4550496c256c24ff41890e78ec68314e
    • Instruction Fuzzy Hash: 874267BE61868486EB24CB69D54437E6B71FB45B8CF185017DF5ECBAA8DB78C441CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: 658b0638e96a2018847d66b84efea279705a0a6da686782ae5e0afd207c87506
    • Instruction ID: 7d300196fee459ace5d602c9caff3859fef4ce16387efef6ae78b36e95db241d
    • Opcode Fuzzy Hash: 658b0638e96a2018847d66b84efea279705a0a6da686782ae5e0afd207c87506
    • Instruction Fuzzy Hash: 9952D162A1C642E6FB658B18945037E6AB2BF41784F142639DA4FCE7D6CF3DE940C780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Locale$Info$Valid$CodeDefaultPageUser_amsg_exit_getptd_itow_s
    • String ID: ACP$Norwegian-Nynorsk$OCP
    • API String ID: 1236750932-4064345498
    • Opcode ID: 9a2c596c094c2287d6757c1580c0f3a5b9abb677b0832c662cd382cd010940e6
    • Instruction ID: f4770be1faee562d97b31488070c58bbdb6a7a88040e527e03d5897b1b059d52
    • Opcode Fuzzy Hash: 9a2c596c094c2287d6757c1580c0f3a5b9abb677b0832c662cd382cd010940e6
    • Instruction Fuzzy Hash: A571BE7E3007A186EB25BF25E4487A923A9FB44B48F888526CF0D87688EF7CD845C741
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
    • String ID: $"%1$%s\shell\open\command$WinSta0\Default$h
    • API String ID: 1783372451-2159495357
    • Opcode ID: e70bed83e782989fc0487152cab15a78fd48d91328039faaa8541382b054b103
    • Instruction ID: 212f48d1805dabb83c4e0be8e86315976dcfc3eba67978cda53d53447108fc63
    • Opcode Fuzzy Hash: e70bed83e782989fc0487152cab15a78fd48d91328039faaa8541382b054b103
    • Instruction Fuzzy Hash: EF51833E311A8595EB20DF65E8583E97366FB9874CF844025CB4E87E68EF38C246CB41
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AddressProc$File$CloseCreateHandleLibraryLoadWrite
    • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$wininet.dll
    • API String ID: 933684181-1032619545
    • Opcode ID: d6150c431756500377e6d13ee1469ee8492a15e05ab10de94b05086a6ef9d668
    • Instruction ID: da3c7773f4649d2d042a911f8001328ba2d1052cb0f9df0b9f3fde1a67e4264d
    • Opcode Fuzzy Hash: d6150c431756500377e6d13ee1469ee8492a15e05ab10de94b05086a6ef9d668
    • Instruction Fuzzy Hash: 7D41A32D31565646EF20CF62F818B666360FB89BE8F949126DE4E47B94DF3CC14A8B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: bdc9c5b48201d5cab8793ea432b9ced24bb94fac02a96976a29fb9171e5abc2b
    • Instruction ID: 6bf4ad0085ea32dba5deeb45afb35f1423c83d7155c774af854aa5089f0fe6ad
    • Opcode Fuzzy Hash: bdc9c5b48201d5cab8793ea432b9ced24bb94fac02a96976a29fb9171e5abc2b
    • Instruction Fuzzy Hash: ED221839218A498BD72ADF6CC8457BAB3E1FB85704F54065EE88BC3155DB74E842CBC2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointerwrite_multi_char$_errno_invalid_parameter_noinfo$_getptdfreewrite_char
    • String ID:
    • API String ID: 3562693915-0
    • Opcode ID: d58751d878f3980e8ae9990ffb1ed5ef57901bb55af9d072bad2d2e8a0fde4ef
    • Instruction ID: 8603538d9800548b4b23365d71336d86b6840e5114856ba9a0efba10b19bbdd8
    • Opcode Fuzzy Hash: d58751d878f3980e8ae9990ffb1ed5ef57901bb55af9d072bad2d2e8a0fde4ef
    • Instruction Fuzzy Hash: 6842E27E60868486EB24AB69D44837E7BB2F781798F18451ADF4EC7B94DF79C442CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Close$OpenQueryValuelstrcpy
    • String ID: %08X
    • API String ID: 2032971926-3773563069
    • Opcode ID: d4dcac77e52b290c5c99e958f3a08ee84a86dd612c1d2329fd870c9631bd3da2
    • Instruction ID: 6cf591655e6a20ca693fd055706917daa93fd092053c2574b4659800d2ed8ef0
    • Opcode Fuzzy Hash: d4dcac77e52b290c5c99e958f3a08ee84a86dd612c1d2329fd870c9631bd3da2
    • Instruction Fuzzy Hash: 4D51827A319A8086EB60CB15F48876BB361F7D9794F945125EB8E83F68DF38C146CB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
    • String ID: %s%s$@$Windows\System32\svchost.exe$h
    • API String ID: 4033188109-2160973000
    • Opcode ID: f9087cf5fae0cee7d505e30a2631e8a65dd45cc2cab60f045d47eef95fa297c2
    • Instruction ID: 4ef771d4c516bce8c72f528b13d6c50c21e3b313d2feb680281c38d2170b0e6b
    • Opcode Fuzzy Hash: f9087cf5fae0cee7d505e30a2631e8a65dd45cc2cab60f045d47eef95fa297c2
    • Instruction Fuzzy Hash: 46419F7A204BC185EB20CF65E8447AAB7A5F788B88F844015DB8D9BE68DF7DC255CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
    • String ID: %s%s$@$Windows\System32\tracerpt.exe$h
    • API String ID: 4033188109-528786837
    • Opcode ID: ccbe77caa5910820af2e6a65459cec20809b89b451be36ee65506754dcdfb72f
    • Instruction ID: 6aa163169cfdd629af8be38e126b262c921dc7e1d247424853ad1a97f04be1db
    • Opcode Fuzzy Hash: ccbe77caa5910820af2e6a65459cec20809b89b451be36ee65506754dcdfb72f
    • Instruction Fuzzy Hash: BC41303260CA82D5E720CF21E8407AA73B6FB88B44F446139DA8D8BB5ADF7DD555CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process$HandleOpenToken$AddressAdjustCloseCurrentLookupModulePrivilegePrivilegesProcValue
    • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
    • API String ID: 2787840106-1577477132
    • Opcode ID: d7562ad186f9c76f12a185dc633e30c61f1f79ca552b767149f0c40940437c0f
    • Instruction ID: 4435a1dfed2fe14412d8ab3aa9c71dbad64319f9c9aa266cbf64e3dbc0fbc544
    • Opcode Fuzzy Hash: d7562ad186f9c76f12a185dc633e30c61f1f79ca552b767149f0c40940437c0f
    • Instruction Fuzzy Hash: E421507A316B4186EB10DB61F41C36AB3A1FB99B48FC44116DA4E47B54EF7CC18ACB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CreateEvent$CountCriticalInitializeSectionSpinTimetime
    • String ID: <$<
    • API String ID: 4111701721-213342407
    • Opcode ID: 50d1c9d799ae0883ac624c27727ad0547cbe81534f72b6f884d53c983f92a473
    • Instruction ID: aabc164531cfd7d8402cf857ae631e9e550b3a94410a73894a34866b8d79b2bf
    • Opcode Fuzzy Hash: 50d1c9d799ae0883ac624c27727ad0547cbe81534f72b6f884d53c983f92a473
    • Instruction Fuzzy Hash: B181797A211B9186E744CF34E85879D33A9F744F48F58823ADF598B798CF798051CB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $ceil
    • API String ID: 2183313154-2708072404
    • Opcode ID: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
    • Instruction ID: e6eb3e5bac654839e34024f92357f80c02c597e67cb5b61d9d27824c310a8c9e
    • Opcode Fuzzy Hash: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
    • Instruction Fuzzy Hash: CD51E321B1C642E1F624D725A8156BA62B7FF84780F406339EE5FCAB97DF3CE5058680
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointerwrite_multi_char$_errno$_getptd_invalid_parameter_noinfofreewrite_char
    • String ID:
    • API String ID: 1806013980-0
    • Opcode ID: 3782c11b08637887bbe0001277ea22891da8fc78fac2bcefdce39dbaa47e7f8d
    • Instruction ID: 2b9e86fc6205e13a495600775cd0c86aaa615b91b0ae7d2839ff160e0938a8e3
    • Opcode Fuzzy Hash: 3782c11b08637887bbe0001277ea22891da8fc78fac2bcefdce39dbaa47e7f8d
    • Instruction Fuzzy Hash: C742E17F60868486EB258B69D4403BEBBB1FB81B88F185416DF4ED7BA4DB79C440CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: File_set_error_mode$HandleModuleNameWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 1085760375-4022980321
    • Opcode ID: e5986bc7307d270abcff6f1ccec38af2cc00fd336f8f20fecfb491107040158e
    • Instruction ID: 91862472f9fc432717ae4636d202ecb13b58fda21904bc22bab61ab1b5e2bac1
    • Opcode Fuzzy Hash: e5986bc7307d270abcff6f1ccec38af2cc00fd336f8f20fecfb491107040158e
    • Instruction Fuzzy Hash: BA51F12D314B9082EB24DB2AB85876A7396F789B84F988527DE5D83B44EF3CC105CB05
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1457502553-0
    • Opcode ID: d0b0b07664f7923d28e5a94db292f98a3d0de7146a782759a966602d04d626a2
    • Instruction ID: 2b612f9e46aa2dba66310e0e126a42e1c5bb3f3a61a82743230abffff232edf0
    • Opcode Fuzzy Hash: d0b0b07664f7923d28e5a94db292f98a3d0de7146a782759a966602d04d626a2
    • Instruction Fuzzy Hash: 9BA1E639760A094BDB5CEF3CC8992B576D2FB58306B84817FE806CA695EF78C4858B41
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1457502553-0
    • Opcode ID: a70f963267a58262a1adff73ee213b64dec8076670613ca4b6e4b64573aef9ec
    • Instruction ID: 47a648d09f91883e2ea3444c180b34b69256853162cc05e01154dff3cf019c19
    • Opcode Fuzzy Hash: a70f963267a58262a1adff73ee213b64dec8076670613ca4b6e4b64573aef9ec
    • Instruction Fuzzy Hash: F881D5BA710B5587DB68DF39C95576967AAE754788F049036DF0DCBB48FB38D0018B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
    • String ID: SeShutdownPrivilege
    • API String ID: 3435690185-3733053543
    • Opcode ID: e0d185422709b0f3b431866f5e592452b7913cc4dbfaabb4369ff8a97e2ecd24
    • Instruction ID: cb8b463c90778c2e171852b40677e1476a1115e572f6265a39081da3406a0c4c
    • Opcode Fuzzy Hash: e0d185422709b0f3b431866f5e592452b7913cc4dbfaabb4369ff8a97e2ecd24
    • Instruction Fuzzy Hash: D711917A226A41C6E750DF24F85976A73B0FB98B44FD09016EA8E86A24DF3CC085CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
    • String ID: gfffffff
    • API String ID: 1282097019-1523873471
    • Opcode ID: e40ebfce44de0193f49e8945cf09baf4b1bed02b34854e78f2b7ff374fd64eef
    • Instruction ID: e5e0a249f9068ecd50ac9273faf80e900320baaaf177bddcea7efb89c67ac95c
    • Opcode Fuzzy Hash: e40ebfce44de0193f49e8945cf09baf4b1bed02b34854e78f2b7ff374fd64eef
    • Instruction Fuzzy Hash: 5AA1426F7047C88ADB19DB29C6403AD7BA5E7117A8F188622CF5A877D5E739D015C301
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
    • String ID: gfffffff
    • API String ID: 1282097019-1523873471
    • Opcode ID: c07b627f99c2cd4ae9dd9b17e96f21b7b9fb9e47b31fd93882c95997571751ba
    • Instruction ID: 5546514789b20108174a3abb30253d604444a4855a97daea44120582ca3e702f
    • Opcode Fuzzy Hash: c07b627f99c2cd4ae9dd9b17e96f21b7b9fb9e47b31fd93882c95997571751ba
    • Instruction Fuzzy Hash: 88B16B63B08386E6EB11DB2585403AD6BBAEB12794F149771CB5D8B7D7DE3CA821C300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID: ceil
    • API String ID: 1239891234-3069211559
    • Opcode ID: 3144257c3ae2fa2d6dbd42b967809008da2bff6455cce039acfe86bdf2b0df6d
    • Instruction ID: 6a0b8e90a73c96f8b005c550ada112e5cb83ac44cd06f674f1005b9f057fe2fc
    • Opcode Fuzzy Hash: 3144257c3ae2fa2d6dbd42b967809008da2bff6455cce039acfe86bdf2b0df6d
    • Instruction Fuzzy Hash: FB317332608B81E6DB20CF25E4402AE73B5FB94794F501239EA9D87B96DF7CD545CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: MemoryProcessVirtualWrite$AllocCreateFreeObjectRemoteSingleThreadWait
    • String ID: @
    • API String ID: 1392168757-2766056989
    • Opcode ID: 1d0e15d9e6b6db6943f3edc044253c50b2dda0163e44e70869125fe5ad0bacd3
    • Instruction ID: 0994459e5bac08c364ed85218b8fa4f57077cdbadc72bd67ff21bb7191aa5860
    • Opcode Fuzzy Hash: 1d0e15d9e6b6db6943f3edc044253c50b2dda0163e44e70869125fe5ad0bacd3
    • Instruction Fuzzy Hash: 6031183A205B8486E724CB25F808B5AB7A4F799B94F948225EBCC43F68DF3CC111CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
    • String ID: SeDebugPrivilege
    • API String ID: 3398352648-2896544425
    • Opcode ID: f912f805f90fedc5f3d9f29b34704b1a31fd86a9546a1cec50171bf6703898f4
    • Instruction ID: bda7cfea4822efa4a7453f938aac0e7852233ed91add65d264bb6f6d2a6d80ca
    • Opcode Fuzzy Hash: f912f805f90fedc5f3d9f29b34704b1a31fd86a9546a1cec50171bf6703898f4
    • Instruction Fuzzy Hash: 8201527A216B46C6EB00CF25F84875A77B1F798B44FD49116EA8E43A28DF7CC059CB40
    APIs
    • RtlCaptureContext.KERNEL32 ref: 0287BA43
    • RtlLookupFunctionEntry.KERNEL32 ref: 0287BA62
    • RtlVirtualUnwind.KERNEL32 ref: 0287BAAE
    • IsDebuggerPresent.KERNEL32 ref: 0287BB20
    • SetUnhandledExceptionFilter.KERNEL32 ref: 0287BB38
    • UnhandledExceptionFilter.KERNEL32 ref: 0287BB45
    • GetCurrentProcess.KERNEL32 ref: 0287BB5E
    • TerminateProcess.KERNEL32 ref: 0287BB6C
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
    • String ID:
    • API String ID: 3778485334-0
    • Opcode ID: 2aa89304d9d681174ee0ff907444ba6424267dead1d14bc8b1f46d942951e3dd
    • Instruction ID: 95dae1b1b53f6a8dc958dc20855aed8427feaabb78b7d9b107b50feb355ee5fd
    • Opcode Fuzzy Hash: 2aa89304d9d681174ee0ff907444ba6424267dead1d14bc8b1f46d942951e3dd
    • Instruction Fuzzy Hash: F131D73D106B84C5EB50DB54F85836AB3B5F789759F918126DA8E83B64EFBCC094CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
    • String ID:
    • API String ID: 3778485334-0
    • Opcode ID: a174535eb0d5241deb48ece9e46a2be905d6ec3f467502f47f0e199c436921ae
    • Instruction ID: 79155b3d1b45a7cedfbec9527305e14a065738f8c028883cece194ec7a458c8a
    • Opcode Fuzzy Hash: a174535eb0d5241deb48ece9e46a2be905d6ec3f467502f47f0e199c436921ae
    • Instruction Fuzzy Hash: 2F312C35A1CB46E9EB509B10F45436A73B6FB84794F50223AD98D8AB67DFBCE044C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocalefree$ErrorLastSleep
    • String ID:
    • API String ID: 3746651342-0
    • Opcode ID: c13859b603e604d7dd6b6c796a500a98c745365b111dbd1df3118129deea9de9
    • Instruction ID: 14c6e73cb8c2718593739eb86988f09fefc3d6cdf87f1700f048b6c790a54e23
    • Opcode Fuzzy Hash: c13859b603e604d7dd6b6c796a500a98c745365b111dbd1df3118129deea9de9
    • Instruction Fuzzy Hash: BC41152FB1574442EB75AB25A91473AA296BB98BC9F808025CE4DC7B14EF3CC401CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Event$ClearCloseOpen
    • String ID: Application$Security$System
    • API String ID: 1391105993-2169399579
    • Opcode ID: 96663923b0ee05f66fc94d5c4e2f229e10f6e7c594b8d536ad0441e8402e872b
    • Instruction ID: 7464eecfd61ea567b7cd196d0812ab2b4a4a2bdb7b0210904fa912ce48de893f
    • Opcode Fuzzy Hash: 96663923b0ee05f66fc94d5c4e2f229e10f6e7c594b8d536ad0441e8402e872b
    • Instruction Fuzzy Hash: 19F04F3E602B80C9EB159B25F8087A573A4FB58758F848136DE5D43B14EF38C1D6D300
    APIs
    • RtlCaptureContext.KERNEL32 ref: 0287C4B1
    • RtlLookupFunctionEntry.KERNEL32 ref: 0287C4C9
    • RtlVirtualUnwind.KERNEL32 ref: 0287C503
    • IsDebuggerPresent.KERNEL32 ref: 0287C539
    • SetUnhandledExceptionFilter.KERNEL32 ref: 0287C543
    • UnhandledExceptionFilter.KERNEL32 ref: 0287C54E
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID:
    • API String ID: 1239891234-0
    • Opcode ID: 78c7d4cd206edf1b6561dabf2e90c836c4c6f27cb28aca6aab5a030fd30f2f43
    • Instruction ID: 46f9efddd286f45aee803d7347166694d777d603129237ea12d14202d93bec53
    • Opcode Fuzzy Hash: 78c7d4cd206edf1b6561dabf2e90c836c4c6f27cb28aca6aab5a030fd30f2f43
    • Instruction Fuzzy Hash: 2431963A204F8186DB20DF29E8447AE73A4F789758F900126EB9D83B58DF38C545CB00
    APIs
    • GetCurrentProcess.KERNEL32 ref: 028690C3
    • OpenProcessToken.ADVAPI32 ref: 028690D6
    • LookupPrivilegeValueW.ADVAPI32 ref: 02869105
    • AdjustTokenPrivileges.ADVAPI32 ref: 0286914A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
    • String ID: SeDebugPrivilege
    • API String ID: 2349140579-2896544425
    • Opcode ID: 54d9294af7c7f8491c8ebf4ea155e670f436f307aa670cb1e1a1b6be12c31483
    • Instruction ID: a915281231e35378461c60490ae813b4a4895758cfb5ff2db241ad28aed6c637
    • Opcode Fuzzy Hash: 54d9294af7c7f8491c8ebf4ea155e670f436f307aa670cb1e1a1b6be12c31483
    • Instruction Fuzzy Hash: B6112E7A209B8186EB50DF65F45935AB3B0F799748FD4401AEA8E87B18DF7DD019CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: d02a2a73f8a004f25326808967a150621f58b1e4c2b4bce21b140e42ef69546e
    • Instruction ID: b09e86796d7a72ffd1c23bab44a6f96c060139228db1a3863d7cae86016d9cb9
    • Opcode Fuzzy Hash: d02a2a73f8a004f25326808967a150621f58b1e4c2b4bce21b140e42ef69546e
    • Instruction Fuzzy Hash: D091BF7E300A849BDB19DF2AD198B6977A6F744F88F408529DB0AC7B14DF34D4A1CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: 4ff45d25d52f66431eb5be40b81c55b6477ffb433d7455a93790e8431ec41cdf
    • Instruction ID: 6cb059e88cca6e391f5011658fba02abaff181d60f2777147210aa45ea8b6699
    • Opcode Fuzzy Hash: 4ff45d25d52f66431eb5be40b81c55b6477ffb433d7455a93790e8431ec41cdf
    • Instruction Fuzzy Hash: A591E17A310A458BDB18CF29D198B7D73A6F744B88F848529DB0AC7B18DF38D5A1C780
    APIs
    • _getptd.LIBCMT ref: 02885FF3
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    • GetLocaleInfoA.KERNEL32 ref: 02886028
    • GetLocaleInfoA.KERNEL32 ref: 02886080
    • GetLocaleInfoA.KERNEL32 ref: 02886174
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocale$_amsg_exit_getptd
    • String ID:
    • API String ID: 3133215516-0
    • Opcode ID: 1ac9af4ac5f84c1ac2db0ee65c74d4854ca8eaddeb5a6752524009ef227a59e5
    • Instruction ID: 5bc01f4114f0d6ccd70ce130cac98eb784b6d447e373ad4990c299a3cb6ce24f
    • Opcode Fuzzy Hash: 1ac9af4ac5f84c1ac2db0ee65c74d4854ca8eaddeb5a6752524009ef227a59e5
    • Instruction Fuzzy Hash: 62618D3E710A85D7DB19EF65DA447EAB3A5F78874AF44402AC71ACB705EB38E064CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocale$ByteCharMultiWidefree
    • String ID:
    • API String ID: 40707599-0
    • Opcode ID: 11f3d4f53239f0c4f39ff4503c8ebb60816277d2ad75e44c7ab8db5b0185f449
    • Instruction ID: 01d50eb7c32af1ec7d0412898720fcf3182f23b56a5b23b0b6483d2fe3e37a68
    • Opcode Fuzzy Hash: 11f3d4f53239f0c4f39ff4503c8ebb60816277d2ad75e44c7ab8db5b0185f449
    • Instruction Fuzzy Hash: 3731427E211A4086DB11AF29D80075AB7A6F758BE8FA84616DB6D87B94DF38C501C700
    APIs
    • _getptd.LIBCMT ref: 0287B379
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
      • Part of subcall function 0287B104: _getptd.LIBCMT ref: 0287B13E
      • Part of subcall function 0287AA60: malloc.LIBCMT ref: 0287AA8B
      • Part of subcall function 0287AA60: Sleep.KERNEL32 ref: 0287AA9E
    • free.LIBCMT ref: 0287B5D6
    • free.LIBCMT ref: 0287B60D
    • free.LIBCMT ref: 0287B61A
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_getptd$Sleep_amsg_exitmalloc
    • String ID:
    • API String ID: 1310838139-0
    • Opcode ID: 1dc8cd8ae9f8e08abec6e49b415cb2c8d0129041e61a27614cfd938455c6127e
    • Instruction ID: f6a4e22a61bd1087b65d142aff6733c81889dea653a2cb52a32ff4765a83697e
    • Opcode Fuzzy Hash: 1dc8cd8ae9f8e08abec6e49b415cb2c8d0129041e61a27614cfd938455c6127e
    • Instruction Fuzzy Hash: 5991D17E3016849ADB24DF2AE5847AAB7A6F78878CF544126DF4D87B14EF38D055CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 0-2761157908
    • Opcode ID: e04492fe7783e9350fb6ad516c2b891bc40bfb42d811b819843ac43adcea1734
    • Instruction ID: 32e39e84cec21a21c2210027b8ea0362713c4c6e4d280ae7f4fde98c7918a5a9
    • Opcode Fuzzy Hash: e04492fe7783e9350fb6ad516c2b891bc40bfb42d811b819843ac43adcea1734
    • Instruction Fuzzy Hash: 0962E577F18252DAF7248F748010BBD37BABB54348F40A675DE09ABB86DE38A915C740
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 0-2761157908
    • Opcode ID: 7df000bd44c2d7560c978c0048061725c1add1b8a1df7d99afdefb37d4ab0dba
    • Instruction ID: 3aedd2be26b133dd98e3222d35bf0d80478a1403911a45c6382a4d3695e75841
    • Opcode Fuzzy Hash: 7df000bd44c2d7560c978c0048061725c1add1b8a1df7d99afdefb37d4ab0dba
    • Instruction Fuzzy Hash: 8852D17FB242558BE728EFB9C010BAD37B2B75478CB44901ADE0AA7E48E7348515CB64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExecuteShelllstrlen
    • String ID: runas
    • API String ID: 1628651668-4000483414
    • Opcode ID: 03c83d6ad0da52786a385f4ff622b1f094f52ef991941f4b5a3df462a20804f7
    • Instruction ID: c49bb082f7ac6256a6cd1732ab93f5b1e0ca644785dafae8ab74a5610f0db0e3
    • Opcode Fuzzy Hash: 03c83d6ad0da52786a385f4ff622b1f094f52ef991941f4b5a3df462a20804f7
    • Instruction Fuzzy Hash: EF11A52970468182DF14DB19F4093AAA361E789BD8F998225DF6D8BB98EF3DC1458B04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 243fa11f22f8bdf27a2221707ecb54d1361e1111186494d5edbf34577f52ae8c
    • Instruction ID: f6d836c26efbe610657dc4c70cc07bbfad3b90c9ad806d8c3bb777f5a91942d2
    • Opcode Fuzzy Hash: 243fa11f22f8bdf27a2221707ecb54d1361e1111186494d5edbf34577f52ae8c
    • Instruction Fuzzy Hash: 86815A35764C0E0FD70D9E2C8C6A3B436C6E7E8316718927EE84BCF7A6EA34D4468641
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 2fde4e05e0105f80059fa488bb3d222ec5cec105b56ed491c952f13e4f7ac73a
    • Instruction ID: 95225541f16dcf4dac87e930102d3a902287e293b00dd5c795e3f635eea57357
    • Opcode Fuzzy Hash: 2fde4e05e0105f80059fa488bb3d222ec5cec105b56ed491c952f13e4f7ac73a
    • Instruction Fuzzy Hash: 81611BABB116494BCB1C9B28DD51364A656A7D8744F48D236EA09CFBD8F73CE6018740
    APIs
    • _fileno.LIBCMT ref: 0288390A
      • Part of subcall function 02882C08: _errno.LIBCMT ref: 02882C11
      • Part of subcall function 02882C08: _invalid_parameter_noinfo.LIBCMT ref: 02882C1C
    • ReadFile.KERNEL32 ref: 028839F7
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: FileRead_errno_fileno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1416837532-0
    • Opcode ID: a41427fd89fcf87a3ba39a7780490a73b7d354980b6212fe82374946e61b6ed5
    • Instruction ID: ad01b961e4211c3f3d0bf26cf7d7e550350ec13ca9bb94167ac5c77bad827553
    • Opcode Fuzzy Hash: a41427fd89fcf87a3ba39a7780490a73b7d354980b6212fe82374946e61b6ed5
    • Instruction Fuzzy Hash: F5710F6E305BC88AEB21FF25D5843A96B65F700FD8F48559ADE4D83B98DB38C482C700
    APIs
    • _getptd.LIBCMT ref: 028862BE
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    • GetLocaleInfoA.KERNEL32 ref: 028862F3
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocale_amsg_exit_getptd
    • String ID:
    • API String ID: 488165793-0
    • Opcode ID: 971ec5c8b3d1054b5cb36a7d5b7c52b067c4aa6ec322e4142c4c8dd05412ca27
    • Instruction ID: 37f8bd2b5340b9dbb3dba5d7c3a39fabe408bb868d0467d8b6f2e359ee1f6500
    • Opcode Fuzzy Hash: 971ec5c8b3d1054b5cb36a7d5b7c52b067c4aa6ec322e4142c4c8dd05412ca27
    • Instruction Fuzzy Hash: 5C217E3A314AC1D7DB28EB65D9447EAB3A2F788749F844026972AC7644EF38E464CB01
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: malloc
    • String ID: $gfff$gfff
    • API String ID: 2803490479-4202476792
    • Opcode ID: c3e908681918788f643dfaf2f53a5c456d5ccb5fda57e6a8831e1b144d632076
    • Instruction ID: daed600a83c486256930f96ec7afa465ec317ccd32e4cc68f92c638e9fb708cf
    • Opcode Fuzzy Hash: c3e908681918788f643dfaf2f53a5c456d5ccb5fda57e6a8831e1b144d632076
    • Instruction Fuzzy Hash: B3D1C534A24B0C8FD759EF7CD44936977E2FF5C305F10422AA84AD7295DB349856CB81
    APIs
      • Part of subcall function 028250C9: malloc.LIBCMT ref: 028250E3
      • Part of subcall function 02826045: _errno.LIBCMT ref: 02826063
      • Part of subcall function 02826045: _invalid_parameter_noinfo.LIBCMT ref: 0282606F
      • Part of subcall function 02826045: _errno.LIBCMT ref: 028260B1
    • _localtime64.LIBCMT ref: 0281688A
      • Part of subcall function 028252B1: _errno.LIBCMT ref: 028252D0
      • Part of subcall function 028252B1: _invalid_parameter_noinfo.LIBCMT ref: 028252DC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$_localtime64malloc
    • String ID: d
    • API String ID: 3448128200-2564639436
    • Opcode ID: cfb5ec3b757334179c745541fa8331162734935ea313afeefcc79cfe94a5bac1
    • Instruction ID: d4f8988077d79a45c9a242966b3bfb9bed39d1693c1a594cc8d8bc9aecc571fb
    • Opcode Fuzzy Hash: cfb5ec3b757334179c745541fa8331162734935ea313afeefcc79cfe94a5bac1
    • Instruction Fuzzy Hash: 13228539618A198FDB19EF28DC95AEAB7E5FB54301F10462ED44BC3190EF34E645CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: 4f06327e431c14d4e28563d6f0fcc8eedea745598733e2efd600a7036ac67516
    • Instruction ID: a592b764c9f55a859eaac3e555d2f051695300c72f38c94e6fd9af86cc2e1af6
    • Opcode Fuzzy Hash: 4f06327e431c14d4e28563d6f0fcc8eedea745598733e2efd600a7036ac67516
    • Instruction Fuzzy Hash: 8922007FB042898EEB24AF69D0507EC3762B79478CF84401ADF4AE7B95D739854AC701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: 83054cf6376330cdffa8c0059fbe92ae39825d7729f5d374ebb6e6e75b54dafc
    • Instruction ID: 87e490d43297585b83997cb37ce60d7fd114234f111c0508d65f8e82768bf249
    • Opcode Fuzzy Hash: 83054cf6376330cdffa8c0059fbe92ae39825d7729f5d374ebb6e6e75b54dafc
    • Instruction Fuzzy Hash: 1032C376F08242EAF7648E6580407BC27BBBB14348F966276CE499B7C6CE3DA945C341
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _get_daylight
    • String ID:
    • API String ID: 4143689357-0
    • Opcode ID: a7799652e9771fadd063df120e63502b2c124946250e25ebb5e0f696f08c898f
    • Instruction ID: e4116e78905961fb899d042ba0fac1b7ed45a30eb8748cde5fc9aaa4d99e526e
    • Opcode Fuzzy Hash: a7799652e9771fadd063df120e63502b2c124946250e25ebb5e0f696f08c898f
    • Instruction Fuzzy Hash: 1B9137797186054FC70DDE28DC926B573DAE799208F18D13ED887CB695EA30E50287C2
    APIs
    • _set_error_mode.LIBCMT ref: 0282BC72
    • _set_error_mode.LIBCMT ref: 0282BC83
      • Part of subcall function 02825C59: _errno.LIBCMT ref: 02825C78
      • Part of subcall function 02825C59: _invalid_parameter_noinfo.LIBCMT ref: 02825C84
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _set_error_mode$_errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1239817535-0
    • Opcode ID: e5986bc7307d270abcff6f1ccec38af2cc00fd336f8f20fecfb491107040158e
    • Instruction ID: 16befc9308deb146c85e5a37c82ffa364d77c08363af95e82f12ba11cb00fa5a
    • Opcode Fuzzy Hash: e5986bc7307d270abcff6f1ccec38af2cc00fd336f8f20fecfb491107040158e
    • Instruction Fuzzy Hash: F851D43C7189184B972CEF2CA85577A73D6EB84308B10852ED45FC3191DF34D58A8B86
    APIs
    • _get_daylight.LIBCMT ref: 02880996
      • Part of subcall function 02881010: _errno.LIBCMT ref: 02881019
      • Part of subcall function 02881010: _invalid_parameter_noinfo.LIBCMT ref: 02881024
    • _get_daylight.LIBCMT ref: 02880A1C
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _get_daylight$_errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 3559991230-0
    • Opcode ID: 693b50c2c61a72bb5be5a43c63dc8e884891f7c57c6b944760cd3464cf5c7f55
    • Instruction ID: f5c2bd24ce901227b9dd3cc3b10e739c3bf3946db6c212b92f0db28d40bc7dd9
    • Opcode Fuzzy Hash: 693b50c2c61a72bb5be5a43c63dc8e884891f7c57c6b944760cd3464cf5c7f55
    • Instruction Fuzzy Hash: 6B81347AB142448BD31CEF28ED517687756F3E8345F58D126DA0ACBB94EB38EA44CB40
    APIs
    • _getptd.LIBCMT ref: 02885E7B
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    • GetLocaleInfoA.KERNEL32 ref: 02885EB0
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocale_amsg_exit_getptd
    • String ID:
    • API String ID: 488165793-0
    • Opcode ID: 72fd4da99e1eca86bf0af2b7fcd366b18db1c26e7bfc871149967434169bcbd1
    • Instruction ID: c31c8be23888425fa9bc6bff8564a9a2f485bcba884ba5939cef56082f8cabe2
    • Opcode Fuzzy Hash: 72fd4da99e1eca86bf0af2b7fcd366b18db1c26e7bfc871149967434169bcbd1
    • Instruction Fuzzy Hash: 56119A3A310B8496DB28DB65E84939AB3A1F388B84F894126CA5D87B14DF3CE565CB40
    APIs
      • Part of subcall function 02868E90: GetModuleFileNameW.KERNEL32 ref: 02868EBB
      • Part of subcall function 02868E90: GetCommandLineW.KERNEL32 ref: 02868EC1
      • Part of subcall function 02868E90: GetStartupInfoW.KERNEL32 ref: 02868ECF
      • Part of subcall function 02868E90: CreateProcessW.KERNEL32 ref: 02868F12
      • Part of subcall function 02868E90: ExitProcess.KERNEL32 ref: 02868F1B
    • ExitProcess.KERNEL32 ref: 0286E2FF
      • Part of subcall function 02869590: GetCurrentProcess.KERNEL32 ref: 028695A7
      • Part of subcall function 02869590: OpenProcessToken.ADVAPI32 ref: 028695BA
      • Part of subcall function 02869590: LookupPrivilegeValueW.ADVAPI32 ref: 028695E5
      • Part of subcall function 02869590: AdjustTokenPrivileges.ADVAPI32 ref: 02869608
      • Part of subcall function 02869590: GetLastError.KERNEL32 ref: 0286960E
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 0286961D
    • ExitWindowsEx.USER32 ref: 0286E315
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 02869638
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process$Exit$CloseHandleToken$AdjustCommandCreateCurrentErrorFileInfoLastLineLookupModuleNameOpenPrivilegePrivilegesStartupValueWindows
    • String ID:
    • API String ID: 2667809516-0
    • Opcode ID: 3c0d1a23d52f457355619f8c4f60c2d13a0e5bbfb86ce9e69f907c3db4830095
    • Instruction ID: ce69ca36bfefc4c9ce8117d21ecf16fe7ca8ab11fc6f7013202d07a5ab9e30e1
    • Opcode Fuzzy Hash: 3c0d1a23d52f457355619f8c4f60c2d13a0e5bbfb86ce9e69f907c3db4830095
    • Instruction Fuzzy Hash: 0CE0263F20004081F329A774B40D3BE6202BB54725F8484378B4A829C0CE3CC0D9C700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: @$h
    • API String ID: 0-1029331998
    • Opcode ID: 356ccbaab360810557ff1889964b79b5fb888c02031f73d35a44d1c4fd0df39d
    • Instruction ID: 50241bca88ae762be536d3d6941675ff40d662bbd530958fc296ea2fab484405
    • Opcode Fuzzy Hash: 356ccbaab360810557ff1889964b79b5fb888c02031f73d35a44d1c4fd0df39d
    • Instruction Fuzzy Hash: 50B18130618B488FEB69EF28D8593AA77E5FB98305F10452EA44AC3150DF78D646CB86
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: <$<
    • API String ID: 0-213342407
    • Opcode ID: 98a197b1dfcb439f9b42374c2483925932d179a832b92e6ab5457db0d87ca901
    • Instruction ID: e6012b8ed667173c8694a33fafb888b0f291d80425f0cb63f7de4e83bded372a
    • Opcode Fuzzy Hash: 98a197b1dfcb439f9b42374c2483925932d179a832b92e6ab5457db0d87ca901
    • Instruction Fuzzy Hash: 0B9129B4654B198FDBA8DF28D4D43953BE5FB48704F1842BEAC0ECE29ADB7484458F90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: $h
    • API String ID: 0-1972213566
    • Opcode ID: 124b82c8d50a204065bd587dc34c92b796fd0174f8e441d9f7b48019000610ec
    • Instruction ID: e75f37734762d4cc9fc3bc899947992f58c0ca1ea29634601a33ccfae48eac72
    • Opcode Fuzzy Hash: 124b82c8d50a204065bd587dc34c92b796fd0174f8e441d9f7b48019000610ec
    • Instruction Fuzzy Hash: ED61D539518B5D8BDB29EF18D8556EE73A5FBA8304F00412AD44BD3190DF38D545CB82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: @$h
    • API String ID: 0-1029331998
    • Opcode ID: 5025959564ab3faa289aa8550610bf0afeee09811a97fb26354f2346fbb6e16f
    • Instruction ID: 53b5dc2312e645ab967a4aee4c41195234fbb7532ededb987704de9e7d326263
    • Opcode Fuzzy Hash: 5025959564ab3faa289aa8550610bf0afeee09811a97fb26354f2346fbb6e16f
    • Instruction Fuzzy Hash: 1951AD34618B888FDB24EF58DC956EAB7E6FB98305F10452EE48AD3150DB78D505CB82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: [RO] %ld bytes
    • API String ID: 0-772938740
    • Opcode ID: 60834e6f4583ff2073803517480cd448bedc657b73e3056a1d09e1ab8287d4ec
    • Instruction ID: 03737e26e84504f90a3a84fb887731af6ff125905704f410730b48f4e26595c1
    • Opcode Fuzzy Hash: 60834e6f4583ff2073803517480cd448bedc657b73e3056a1d09e1ab8287d4ec
    • Instruction Fuzzy Hash: 0142AD7B2092C48FC329CF29A44479EBBA0F355B48F048169DFC587B4ADB78E995CB50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: [RO] %ld bytes
    • API String ID: 0-772938740
    • Opcode ID: 1ed3bb2f404239d74be1f07793ca469e9cb85950aa033daddafdfd33a72f81d3
    • Instruction ID: 209c2666ab2b87c751454eb7ac7870533da766c490b28655aeb934391d5dcd7c
    • Opcode Fuzzy Hash: 1ed3bb2f404239d74be1f07793ca469e9cb85950aa033daddafdfd33a72f81d3
    • Instruction Fuzzy Hash: 1A52BD336092C5CBC369CF28A44069EBBB1F755B48F048139DBCA8BB46DB78E955CB50
    APIs
    • _getptd.LIBCMT ref: 0287B13E
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
      • Part of subcall function 0287BCB0: _errno.LIBCMT ref: 0287BCC8
      • Part of subcall function 0287BCB0: _invalid_parameter_noinfo.LIBCMT ref: 0287BCD4
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1050512615-0
    • Opcode ID: 56d26e3ddcb19a20ffe236ab2256934773d61558547c107b185ec60b1d05a747
    • Instruction ID: 18e93da4b670927c5488fd6672b61f89ffe47d7030fad1e60caaa1b66f8dbcab
    • Opcode Fuzzy Hash: 56d26e3ddcb19a20ffe236ab2256934773d61558547c107b185ec60b1d05a747
    • Instruction Fuzzy Hash: DA519F2E31568586EB64EB66A51076EA796FB95BCCF488421DF49C7B08EF38C046CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: b6433f08f774cc9b7ccbf9f35c9ffbfafaf009a608a4a475b2de2a5dd20ebf61
    • Instruction ID: d88ea642e71709e382bb33f0fbcd1761f4def77e67a3ded7834ca3860ce1fe64
    • Opcode Fuzzy Hash: b6433f08f774cc9b7ccbf9f35c9ffbfafaf009a608a4a475b2de2a5dd20ebf61
    • Instruction Fuzzy Hash: 6001D83E200A84CADB246B29E4407697761F384F88FDA8021EB8EC7B05CF2CC982C745
    APIs
    • EnumSystemLocalesA.KERNEL32 ref: 0288641C
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: 86c6855a89ec0db458ed3bf3d980259346bfaeada53e02e6f2725571e57c10e3
    • Instruction ID: 47616241308cbe05d12c724d9b6b3ba1ff6e8736d67d36eec1f3183d5895c98e
    • Opcode Fuzzy Hash: 86c6855a89ec0db458ed3bf3d980259346bfaeada53e02e6f2725571e57c10e3
    • Instruction Fuzzy Hash: 5201D27E6007158BEB18AF34C1593AE33A1F754B0DF48C015CA0D8228DDBB8C1A4C781
    APIs
    • EnumSystemLocalesA.KERNEL32 ref: 02886499
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: 77f7268211c430a149d89f8c5cb0cfbd65e001ec13637245fec6bc435423f769
    • Instruction ID: 0faf35f93e18ce6a04034fd16c6f157fc4e47f119f39aa25054ae27af357c0e6
    • Opcode Fuzzy Hash: 77f7268211c430a149d89f8c5cb0cfbd65e001ec13637245fec6bc435423f769
    • Instruction Fuzzy Hash: BEF02BAE700A1847FB18AB35C0153AE2396E3D4B0DF58C011CB0DC238DEBBCC1958741
    APIs
      • Part of subcall function 02869590: GetCurrentProcess.KERNEL32 ref: 028695A7
      • Part of subcall function 02869590: OpenProcessToken.ADVAPI32 ref: 028695BA
      • Part of subcall function 02869590: LookupPrivilegeValueW.ADVAPI32 ref: 028695E5
      • Part of subcall function 02869590: AdjustTokenPrivileges.ADVAPI32 ref: 02869608
      • Part of subcall function 02869590: GetLastError.KERNEL32 ref: 0286960E
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 0286961D
    • ExitWindowsEx.USER32 ref: 0286E336
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 02869638
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
    • String ID:
    • API String ID: 681424410-0
    • Opcode ID: 1224073a08023476192b8fdb180ad1ba590ad23baeb0f21c7d276e99a92b5457
    • Instruction ID: 7834796eb007a6e58dcc79f15b52bfd4c623c793be617654acda3c2bf93344ae
    • Opcode Fuzzy Hash: 1224073a08023476192b8fdb180ad1ba590ad23baeb0f21c7d276e99a92b5457
    • Instruction Fuzzy Hash: FFD0123F61548085F366A765B4097A9A611B794765F4441378A5A425C19E3880D5C601
    APIs
      • Part of subcall function 02869590: GetCurrentProcess.KERNEL32 ref: 028695A7
      • Part of subcall function 02869590: OpenProcessToken.ADVAPI32 ref: 028695BA
      • Part of subcall function 02869590: LookupPrivilegeValueW.ADVAPI32 ref: 028695E5
      • Part of subcall function 02869590: AdjustTokenPrivileges.ADVAPI32 ref: 02869608
      • Part of subcall function 02869590: GetLastError.KERNEL32 ref: 0286960E
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 0286961D
    • ExitWindowsEx.USER32 ref: 0286E357
      • Part of subcall function 02869590: CloseHandle.KERNEL32 ref: 02869638
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
    • String ID:
    • API String ID: 681424410-0
    • Opcode ID: 3fc61ff9c0979fd17788cd91d3c036018cd6bdd26dea6f5539fe8350fcd86185
    • Instruction ID: 40094087d627193c6c66ff6797278740c5e4dbd9188e692dd121e921d27ee2ee
    • Opcode Fuzzy Hash: 3fc61ff9c0979fd17788cd91d3c036018cd6bdd26dea6f5539fe8350fcd86185
    • Instruction Fuzzy Hash: F1D05B3F655484C5F366A735F4097F96211B794765F4441378F5E435C1DE3880D5C701
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: 0u
    • API String ID: 0-3203441087
    • Opcode ID: 230c60ee35afb213df79a87b6159f30a0b26ac14629d54ba8f8f21aec2be995b
    • Instruction ID: a4963ab9fa671486fe1d22c1521acc116b2fa9181a827e5996018e88d9f9f2e8
    • Opcode Fuzzy Hash: 230c60ee35afb213df79a87b6159f30a0b26ac14629d54ba8f8f21aec2be995b
    • Instruction Fuzzy Hash: 8E91517061CB488FE768DF68D84576AB7E1FB99714F10492EE48BC3250DB38E446CB86
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 9a8ff2a500159e3ed63b44506368299f85c51e85dfafb5f360626af238714718
    • Instruction ID: 66cba34ca797f9ec9d03733414b0973743c6adcd00fbc65214ecaa7e26089366
    • Opcode Fuzzy Hash: 9a8ff2a500159e3ed63b44506368299f85c51e85dfafb5f360626af238714718
    • Instruction Fuzzy Hash: 21B01252F1D403F1D608AB21DC8106112B36F5C330FD01970C10EC83A1DE6C91DB8700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID: _.,
    • API String ID: 0-2709443920
    • Opcode ID: e31d07fcf6d54c54d03e096f0b8f8fafd2347b123dfff4ee4059f28eda7688d6
    • Instruction ID: 9fed5eeb7fad7f1f39ce1fe14030a245160365094c8d297b1539b911b905afcd
    • Opcode Fuzzy Hash: e31d07fcf6d54c54d03e096f0b8f8fafd2347b123dfff4ee4059f28eda7688d6
    • Instruction Fuzzy Hash: 3841EF3E2006954AEB3CDB35D815B6E3B52E788788F588916DF8EC3A49DF39C541C700
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4a26efb2382bebc86a84c9b0f4c2d4f5d906f26eebd129ee0a5fc2402c688c2c
    • Instruction ID: ba998ecb98c65532fad332ab0152b116a5e5d2036e7418fde820bde26d753210
    • Opcode Fuzzy Hash: 4a26efb2382bebc86a84c9b0f4c2d4f5d906f26eebd129ee0a5fc2402c688c2c
    • Instruction Fuzzy Hash: 47528F346187858FD729CF2C84816A9BBE0FB59700F54896DDCCACB786D770E846CB92
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 69569ac12d3564895eabb157a727b03a37ed29424b7d8047274a8acab6f1ff88
    • Instruction ID: 6bebf5c68d567bedf1122ff2a6c0e50e3dd2b8f34050ff38a9eef90a10b7732e
    • Opcode Fuzzy Hash: 69569ac12d3564895eabb157a727b03a37ed29424b7d8047274a8acab6f1ff88
    • Instruction Fuzzy Hash: F422D577B785504BD71CCB19E892FA977A2F394308749A52CEA17D3F44DA3DEA06CA00
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: fe5c5f6412552521fe62fd147e46515a6ebc7e01adc23d764eccdfe49d4ade41
    • Instruction ID: 92112394cdc5bc8864e5abd586a4d6888d90686da5b8f4a3f7f5d4bc19827479
    • Opcode Fuzzy Hash: fe5c5f6412552521fe62fd147e46515a6ebc7e01adc23d764eccdfe49d4ade41
    • Instruction Fuzzy Hash: AD02A3385186588FE729EF28EC897E977E5FB89301F50422AD44FC71A1DF38A545CB82
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d85790fe404774060850294cd7f9e8d6fe2b40ab218384e9ddc9023300c67734
    • Instruction ID: 4eb33fd42af9cae580a42cd2af064ecf527dc10a99ee9623c74120867b552291
    • Opcode Fuzzy Hash: d85790fe404774060850294cd7f9e8d6fe2b40ab218384e9ddc9023300c67734
    • Instruction Fuzzy Hash: A4B1D038608E098FCB0DEF2CC485A75B3E6FB95305710866DD85AC7699DB30E892CBC1
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5221c24a0aca7a35ce8e6bb95fda48a6eff604485ecec7086a039e45792fa10a
    • Instruction ID: a04704caab6695a38b1350ade94d4cc62b2c76a9cda492280011901ce1bd04ff
    • Opcode Fuzzy Hash: 5221c24a0aca7a35ce8e6bb95fda48a6eff604485ecec7086a039e45792fa10a
    • Instruction Fuzzy Hash: 80B1EF38618E098FDB1DDF2CC485679B3E6FB84305B54862DE85AC7695DB34E892CBC0
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2cc4f5f27ffffb8a2ccb8d492bd126fd03bcc1ac993aa5b4277202d1db652280
    • Instruction ID: 20b942282c0f00f23cfd1731a8af916340eb4ca658fbc11f00850acf84c051a8
    • Opcode Fuzzy Hash: 2cc4f5f27ffffb8a2ccb8d492bd126fd03bcc1ac993aa5b4277202d1db652280
    • Instruction Fuzzy Hash: C9A1AE3451CA488FDB68EF28D885AA9B7F5FB88304F10426EE44ED71A5DB34D946CF81
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7ba8c07e4631684e0d76da1a4f5ad0135142228191c63919e84cd2b37062d56e
    • Instruction ID: 557df867ecfd95b74a6d07f78bc3e5027d3d09466176dea08307d759a55d789d
    • Opcode Fuzzy Hash: 7ba8c07e4631684e0d76da1a4f5ad0135142228191c63919e84cd2b37062d56e
    • Instruction Fuzzy Hash: 1541B43C628A684FDB2DEE39985937B73D2FF44315F55896EC49BC3140DB24C9C98682
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction ID: d7d6dd8f21dd6e6c5b243b6926e85a25733b909815c9fda69e4203557a16b530
    • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction Fuzzy Hash: 9651DD7BB156A18BD72C9F18E444F6C3AA9F794389B61E03ADB16D7F04D776C8508B00
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction ID: 34a9fa0ce148b0145d6029dd30b26951899dac8d898050a3eb86756b8de7d133
    • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction Fuzzy Hash: 1F51F576F182A28BE7588F18E404E683BAAF794341F51E138DB168BF81DE79DC50CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno
    • String ID:
    • API String ID: 2288870239-0
    • Opcode ID: 9aa16b22ebdf764a21f270bcfe908f430863055a3e440207fba421ff0d466c6d
    • Instruction ID: 4733b0fbb7463ddc8571a0d08684253c7256426e72d50627cc4ef284f1ae381c
    • Opcode Fuzzy Hash: 9aa16b22ebdf764a21f270bcfe908f430863055a3e440207fba421ff0d466c6d
    • Instruction Fuzzy Hash: D8A16538121519CFD69EEBACC5E87993353BF8C340F848175884DCAD65CE225CDACB62
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 2c40a6e08a7c301d00fb85a56fb4c9de76b35cbe1190e94064d3f8bc8cf801af
    • Instruction ID: 5ede2eb0354fb7c6d26da3c8faeb5d044d24abcacc9581147475075902f1bfd4
    • Opcode Fuzzy Hash: 2c40a6e08a7c301d00fb85a56fb4c9de76b35cbe1190e94064d3f8bc8cf801af
    • Instruction Fuzzy Hash: F381582E251544C5DB45FF39C8A42AE2323EBC5F44FC44932CE6DDBA35EE29C8458B92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
    • Instruction ID: 2041285450bba21d280aee62d3694cbf7a9bcb425f4560713d32d44a37a44d6e
    • Opcode Fuzzy Hash: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
    • Instruction Fuzzy Hash: 17A1652162E545D1E641BA31C8A53FD133AEFC4B84F449237D94EAE267CE16D846D3D0
    APIs
      • Part of subcall function 028755F8: malloc.LIBCMT ref: 02875612
    • RegOpenKeyExW.ADVAPI32 ref: 0286E492
    • RegDeleteValueW.ADVAPI32 ref: 0286E4A3
    • RegSetValueExW.ADVAPI32 ref: 0286E4CE
    • RegCloseKey.ADVAPI32 ref: 0286E534
    • lstrlenW.KERNEL32 ref: 0286E5C7
    • lstrlenW.KERNEL32 ref: 0286E5D7
    • lstrlenW.KERNEL32 ref: 0286E6BD
    • lstrlenW.KERNEL32 ref: 0286E6CD
      • Part of subcall function 028755F8: _callnewh.LIBCMT ref: 02875606
      • Part of subcall function 028755F8: std::exception::exception.LIBCMT ref: 0287567F
      • Part of subcall function 028757E0: _errno.LIBCMT ref: 028757FF
      • Part of subcall function 028757E0: _invalid_parameter_noinfo.LIBCMT ref: 0287580B
    • lstrlenW.KERNEL32 ref: 0286E7AD
    • lstrlenW.KERNEL32 ref: 0286E7BD
    • RegCloseKey.ADVAPI32 ref: 0286E86C
    • Sleep.KERNEL32 ref: 0286E877
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen$CloseValue$DeleteOpenSleep_callnewh_errno_invalid_parameter_noinfomallocstd::exception::exception
    • String ID: 127.0.0.1$156.224.26.128$156.224.26.128$6666$8888$Console$IpDate$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
    • API String ID: 2396878867-1569059169
    • Opcode ID: 7057c58cfab1a01797e5bb06403753000d21a5d3aa3c9a48ad22ea3845d09b6c
    • Instruction ID: 26195bb187b334c30c626d079b42b78c5f412e4e52f75f74974428aa26f233d8
    • Opcode Fuzzy Hash: 7057c58cfab1a01797e5bb06403753000d21a5d3aa3c9a48ad22ea3845d09b6c
    • Instruction Fuzzy Hash: BEB1FF6D702A5581EB10AF29E54CBB92362F754BCAF84D016CE0E97B65EF3CC18AC341
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL$ceil
    • API String ID: 2643518689-1731902841
    • Opcode ID: 3235768cab9551c74b9773b86dd77190edcad43fb14d3d9bf66f7ba374c6ba15
    • Instruction ID: 3034d2a90fcdf1d5accf7d110e8a2c318c9f6015a348565363807820e6f760f5
    • Opcode Fuzzy Hash: 3235768cab9551c74b9773b86dd77190edcad43fb14d3d9bf66f7ba374c6ba15
    • Instruction Fuzzy Hash: 2B51F524B1EB03F0FE55DB51A81417523BBAF59BD0F442679DC0E8EBA2EE7CA4558280
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
    • API String ID: 2643518689-564504941
    • Opcode ID: dd5ed54e8927234f7e2481a09cd76468ffedfea20d48f418230764cb51715f96
    • Instruction ID: 317747fe2a1d638fe6cdcb560223cc1e452639969b954db9ef0563ef8e789c2b
    • Opcode Fuzzy Hash: dd5ed54e8927234f7e2481a09cd76468ffedfea20d48f418230764cb51715f96
    • Instruction Fuzzy Hash: 9C51F52C613B1591FE25EB52B85872523A5FB49BD5FD884268E1E83B20FF3DC185C311
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 6dec9393c7a0cd143478fb176b74fc95ff16db06971bc2c8717270c6dc5f3db4
    • Instruction ID: 38ebf29c57960cd956275eef9c926a5c2f2d0803b84e034189efe32b54d83c00
    • Opcode Fuzzy Hash: 6dec9393c7a0cd143478fb176b74fc95ff16db06971bc2c8717270c6dc5f3db4
    • Instruction Fuzzy Hash: 0912366E6057C886EB22AF65C4803AD7B72F744B5CFA88605CF6E87795EB78C041C316
    APIs
      • Part of subcall function 02877708: RtlLookupFunctionEntry.KERNEL32 ref: 0287777C
    • __GetUnwindTryBlock.LIBCMT ref: 028799F8
    • __SetUnwindTryBlock.LIBCMT ref: 02879A1F
      • Part of subcall function 028775BC: RaiseException.KERNEL32 ref: 02877637
    • __GetUnwindTryBlock.LIBCMT ref: 02879A29
    • _getptd.LIBCMT ref: 02879A7F
    • _getptd.LIBCMT ref: 02879A92
    • _getptd.LIBCMT ref: 02879A9E
    • _SetThrowImageBase.LIBCMT ref: 02879AB2
    • _getptd.LIBCMT ref: 02879B02
    • _getptd.LIBCMT ref: 02879B15
    • _getptd.LIBCMT ref: 02879B21
    • type_info::operator==.LIBCMT ref: 02879B88
    • std::exception::exception.LIBCMT ref: 02879BC1
    • _getptd.LIBCMT ref: 02879DF4
    • std::exception::exception.LIBCMT ref: 02879E6D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
    • String ID: bad exception$csm$csm$csm
    • API String ID: 1639654010-820278400
    • Opcode ID: 1b0893a1847b0cd35c406b737e4c3956a7af5d342df1b8808b3a7d7b6f68bc1b
    • Instruction ID: cd2afac6480e0bdc746bd57fc9e128cdccdf1a857aae70e7232b7fb3c3eb3b9f
    • Opcode Fuzzy Hash: 1b0893a1847b0cd35c406b737e4c3956a7af5d342df1b8808b3a7d7b6f68bc1b
    • Instruction Fuzzy Hash: 3ED1CE3E600A50CADB24EF7AD5847AE77A2F748B8CF444125DE4E97B18CB34D066CB46
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
    • String ID: bad exception$csm$csm$csm
    • API String ID: 1639654010-820278400
    • Opcode ID: fbe037284dd962ea214ae2f94636b38ee292e4416248e112e6b35bf23fd221be
    • Instruction ID: 336bbb6e9f554fcbeb47da84a88d3852f7949d3e7f883f717dc7046dbc7b3a48
    • Opcode Fuzzy Hash: fbe037284dd962ea214ae2f94636b38ee292e4416248e112e6b35bf23fd221be
    • Instruction Fuzzy Hash: F1E1A226B08642E6EB249B3590402BD37BAFF19B88F446275DE4D8BB87CF38E455C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$std::exception::exception$BaseImageThrowtype_info::operator==
    • String ID: csm$csm$csm
    • API String ID: 3798665358-393685449
    • Opcode ID: e703289ab1681031570886b67bdd3ad2315890cd872d463a38575eff1ac2c734
    • Instruction ID: b8d36873d5ac2e033beb456de41c20f5512815733fad92e01c32bf9d39a3e907
    • Opcode Fuzzy Hash: e703289ab1681031570886b67bdd3ad2315890cd872d463a38575eff1ac2c734
    • Instruction Fuzzy Hash: 7BE1C63C618A288FDF58AF6CD4442A9B3E1FF58315F64426ED84AD3255DB34E489CB83
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: !analyze -v$%s-%04d%02d%02d-%02d%02d%02d.dmp$DbgHelp.dll$MiniDumpWriteDump
    • API String ID: 145871493-3774911088
    • Opcode ID: 480089490ec144e7b2b2c8ce8f4cc6496139fd37b894703ea7d60b2fbab28df8
    • Instruction ID: 2075b31c5a38139937974a86cc01489c196ac76d0f9e98c5ff4c634cedb51615
    • Opcode Fuzzy Hash: 480089490ec144e7b2b2c8ce8f4cc6496139fd37b894703ea7d60b2fbab28df8
    • Instruction Fuzzy Hash: BF414E3260CB81E6E6649B11B44426BB3B6FB89764F401335EA9E87B95DF7CD019DB00
    APIs
    • GetLocalTime.KERNEL32 ref: 0286D7C8
    • wsprintfW.USER32 ref: 0286D810
      • Part of subcall function 02869A90: lstrlenW.KERNEL32 ref: 02869AC2
      • Part of subcall function 02869A90: lstrlenW.KERNEL32 ref: 02869ADC
      • Part of subcall function 02869A90: lstrlenW.KERNEL32 ref: 02869AE8
    • lstrlenW.KERNEL32 ref: 0286D87B
    • lstrlenW.KERNEL32 ref: 0286D88E
    • CreateEventA.KERNEL32 ref: 0286D9FE
    • RegOpenKeyExW.ADVAPI32 ref: 0286DA68
    • CloseHandle.KERNEL32 ref: 0286DAB0
    • Sleep.KERNEL32 ref: 0286DACE
    • CloseHandle.KERNEL32 ref: 0286DAF7
    • CloseHandle.KERNEL32 ref: 0286DB16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen$CloseHandle$CreateEventLocalOpenSleepTimewsprintf
    • String ID: %4d.%2d.%2d-%2d:%2d:%2d$Console\1$o1:$p1:$t1:
    • API String ID: 441366266-1614091359
    • Opcode ID: bd3ac582e7364394dc8e381559bbb6586ab408c141e2616aa4ae67c550a47077
    • Instruction ID: 3946db9edd1d0c4a27b102e5f647ad300cf7662e428be28d9fc444e7eadac737
    • Opcode Fuzzy Hash: bd3ac582e7364394dc8e381559bbb6586ab408c141e2616aa4ae67c550a47077
    • Instruction Fuzzy Hash: D291B17E305B85C6DB209F25E4487BE77A6F785B89F808116DA8E47B58DF38C245CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: VisibleWindow
    • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
    • API String ID: 1208467747-3439171801
    • Opcode ID: 6c83f4f935bc8fd318e5d8867c0384fad16a053bef60207c4fe23fe6007cb213
    • Instruction ID: 5fed9909608ced4e24797c59b35abad8db4baeb81a0571a9c8b57a64e4a80eb1
    • Opcode Fuzzy Hash: 6c83f4f935bc8fd318e5d8867c0384fad16a053bef60207c4fe23fe6007cb213
    • Instruction Fuzzy Hash: 64511A1CB02B1240ED19DF29B95C7749B96EB49798F8CA4719D4E8671AFF2CC1CACB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID:
    • API String ID: 1452528299-0
    • Opcode ID: 3bf04cb684953293119adb09c4abac423c49dbe06895ea3ccbae4e9aa986ae90
    • Instruction ID: 5b840d4f2e8413f8c07589db0fba0f5640e452a712c360f00853b54499f3b5ac
    • Opcode Fuzzy Hash: 3bf04cb684953293119adb09c4abac423c49dbe06895ea3ccbae4e9aa986ae90
    • Instruction Fuzzy Hash: 2DB18C3E312A4086DB14CF26E95876973A6FB48B88F888525CE4E87F54EF3CD595C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlensetsockopt$CreateEventIoctlgethostbynamesocket
    • String ID:
    • API String ID: 2536029566-0
    • Opcode ID: 56f23a7e9dad3717f5929d4e235e4febecae6ecb8fe56b2f3ea6a90b2706ea7f
    • Instruction ID: d081505bd9c62cfcc8946ba94d759d03a650c36ac284d9b1f427bedb55f89aa8
    • Opcode Fuzzy Hash: 56f23a7e9dad3717f5929d4e235e4febecae6ecb8fe56b2f3ea6a90b2706ea7f
    • Instruction Fuzzy Hash: D351407A215B8086E720DF65F84475EB7A5F788BA4F544216EB9A83FA8DF3CC145CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlensetsockopt$CreateEventIoctlgethostbynamesocket
    • String ID:
    • API String ID: 2536029566-0
    • Opcode ID: 45858b67ac74603b6c6b2e22d4f55fb0a5fbbce89fe0b74952fa120c8da17c65
    • Instruction ID: 3a64b309912350f79a5d8a2fad0a461a5994162bd241ac69a6493a75e44ea620
    • Opcode Fuzzy Hash: 45858b67ac74603b6c6b2e22d4f55fb0a5fbbce89fe0b74952fa120c8da17c65
    • Instruction Fuzzy Hash: 0D514172718B41D6E714CF65F84026AB7B6FB88BA4F101235EA9E87BA5CF7CD0458B40
    APIs
    • __free_lconv_mon.LIBCMT ref: 0287F490
      • Part of subcall function 0288572C: free.LIBCMT ref: 0288574A
      • Part of subcall function 0288572C: free.LIBCMT ref: 0288575C
      • Part of subcall function 0288572C: free.LIBCMT ref: 0288576E
      • Part of subcall function 0288572C: free.LIBCMT ref: 02885780
      • Part of subcall function 0288572C: free.LIBCMT ref: 02885792
      • Part of subcall function 0288572C: free.LIBCMT ref: 028857A4
      • Part of subcall function 0288572C: free.LIBCMT ref: 028857B6
      • Part of subcall function 0288572C: free.LIBCMT ref: 028857C8
      • Part of subcall function 0288572C: free.LIBCMT ref: 028857DA
      • Part of subcall function 0288572C: free.LIBCMT ref: 028857EC
      • Part of subcall function 0288572C: free.LIBCMT ref: 02885801
      • Part of subcall function 0288572C: free.LIBCMT ref: 02885816
      • Part of subcall function 0288572C: free.LIBCMT ref: 0288582B
    • free.LIBCMT ref: 0287F484
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    • free.LIBCMT ref: 0287F4A6
    • __free_lconv_num.LIBCMT ref: 0287F4B2
    • free.LIBCMT ref: 0287F4BE
    • free.LIBCMT ref: 0287F4CA
    • free.LIBCMT ref: 0287F4EE
    • free.LIBCMT ref: 0287F502
    • free.LIBCMT ref: 0287F511
    • free.LIBCMT ref: 0287F51D
    • free.LIBCMT ref: 0287F54A
    • free.LIBCMT ref: 0287F572
    • free.LIBCMT ref: 0287F58C
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast__free_lconv_mon__free_lconv_num_errno
    • String ID:
    • API String ID: 518839503-0
    • Opcode ID: a095135cf606bc1f33f2cc914cb62113a5949963045bc9d12005b9f13b61c917
    • Instruction ID: 7b5c1e002920487725403a9d9151bae30ac44c7b352ba28d659fd63cae6f08a7
    • Opcode Fuzzy Hash: a095135cf606bc1f33f2cc914cb62113a5949963045bc9d12005b9f13b61c917
    • Instruction Fuzzy Hash: 8F31E83E602A8485DF25EF6AD4503AC2362FB94B98F885436CF5D8BA64DF28C491C721
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast__free_lconv_mon__free_lconv_num_errno
    • String ID:
    • API String ID: 518839503-0
    • Opcode ID: 578f8deb9b1b94d1822c3a308d3ccdd43089e4846e4b09c0fbd9a79327202c1b
    • Instruction ID: 5571ab014d0d0ffb27ed37af941a754ba4cda4691d1ac3df309bcccb4a91a7cd
    • Opcode Fuzzy Hash: 578f8deb9b1b94d1822c3a308d3ccdd43089e4846e4b09c0fbd9a79327202c1b
    • Instruction Fuzzy Hash: 51418631A1E546D0EF549F11C4603B81376EF84B88F44623AD90F8E793CF6DA581C391
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _fileno$_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 482796045-0
    • Opcode ID: 54bd916b88af1bd575d78faf126a4c9598831ddf2921f80b296b0a36c5fb6732
    • Instruction ID: da8626b85c7b996ab933cc2b1a09324a74f7f0162efddf13e4ba03a0f5f5edda
    • Opcode Fuzzy Hash: 54bd916b88af1bd575d78faf126a4c9598831ddf2921f80b296b0a36c5fb6732
    • Instruction Fuzzy Hash: BF51072C228F5D5B875AAB2CC4D117973D6FF89318BA4072DD46BC31A1F72898528BC6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _fileno$_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 482796045-0
    • Opcode ID: 0a44dc10160c913522ca1b89bfe8ceb34a2fb27583fbc32893239fcdff2a64c1
    • Instruction ID: 6dd6b65741786e8a12b5f1604a9001653d771e17bac2abd19b77c769745897a2
    • Opcode Fuzzy Hash: 0a44dc10160c913522ca1b89bfe8ceb34a2fb27583fbc32893239fcdff2a64c1
    • Instruction Fuzzy Hash: 8D512B2D61468185DB24BF3E859027DAB62FB41BACBA48311DF7EC77E4CF28C4128742
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo
    • String ID: csm
    • API String ID: 4181383844-1018135373
    • Opcode ID: 2863c0b21ae9c87ee342759e37cf71052126b54f7717bdb50064378975811c3c
    • Instruction ID: 52c6361c464663482a956450d7054fa5f62dde2748fed44f6b07aac16285804b
    • Opcode Fuzzy Hash: 2863c0b21ae9c87ee342759e37cf71052126b54f7717bdb50064378975811c3c
    • Instruction Fuzzy Hash: 37415ABC518F199FDBA8EF2C8445BA577E1FB59311F40066ED08DC3611DB30A88A8B86
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo_amsg_exit
    • String ID: csm
    • API String ID: 2825728721-1018135373
    • Opcode ID: cc5a8e4b141e2d87edbd8aac0cfd5ab24d84c27de354049b2028b12f56ffd395
    • Instruction ID: 8df93168e7e39c65ff585d8e9729ab3192b82eff3880abfb0491bae8c0bff1c1
    • Opcode Fuzzy Hash: cc5a8e4b141e2d87edbd8aac0cfd5ab24d84c27de354049b2028b12f56ffd395
    • Instruction Fuzzy Hash: E7414C3E114B82C2CB30AB66E44076EB7A5F798BA8F445225DF9D87B54DF38C0A5CB41
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo_amsg_exit
    • String ID: csm
    • API String ID: 2825728721-1018135373
    • Opcode ID: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
    • Instruction ID: 350a50084069510b83c445aa6c838ae714ccc8db45b16e48a89feeb058ec3cab
    • Opcode Fuzzy Hash: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
    • Instruction Fuzzy Hash: 0F419436609782E6DA709B11E4403BA77B5FB48B94F505335EE8E4BB86DF38D055CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
    • String ID:
    • API String ID: 101574016-0
    • Opcode ID: b7080e46a97cc4befa23429986d0ec0d682f8e2714469100a18a0e0df9c72b2a
    • Instruction ID: f3f89ccaa3e6df0aca0674f0cf6e580559487b1dfb3e0cc936f3ebf87623f82e
    • Opcode Fuzzy Hash: b7080e46a97cc4befa23429986d0ec0d682f8e2714469100a18a0e0df9c72b2a
    • Instruction Fuzzy Hash: AE91B16D702B8081EE15FB2AA91033E6696FB80B98F48C625CE5EC7B94EF38C055C711
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalErrorLastSection$EnterLeave
    • String ID:
    • API String ID: 2124651672-0
    • Opcode ID: aa91ab01f644cac6639e0b83305ceff7e62f4cd5bcc9a19ba73228942fb7bed4
    • Instruction ID: 283a0c866d39d061333da1b152528f532e42295c756621f848a61ace442a6afe
    • Opcode Fuzzy Hash: aa91ab01f644cac6639e0b83305ceff7e62f4cd5bcc9a19ba73228942fb7bed4
    • Instruction Fuzzy Hash: F041903E2006948BD754AF35E84CB2E7369FB48795F819236DA1BD32A0DF38C445CB41
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalErrorLastSection$EnterLeave
    • String ID:
    • API String ID: 2124651672-0
    • Opcode ID: eaf03ce752c4ebeca000e1db7c8d3877467df09bf2b186c4518dfecdb3900678
    • Instruction ID: dec48bce9350534bec9c9a3a49b928df430cb925e1db491e2146e4043c910484
    • Opcode Fuzzy Hash: eaf03ce752c4ebeca000e1db7c8d3877467df09bf2b186c4518dfecdb3900678
    • Instruction Fuzzy Hash: 1C417D32A0C286DAE7549F25984866A73BAFF48751F002239DA1FCB392DF7CE485C740
    APIs
    • EnterCriticalSection.KERNEL32 ref: 028663D4
    • WSASetLastError.WS2_32 ref: 028663E6
    • LeaveCriticalSection.KERNEL32 ref: 028663F0
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: d38135fb4df71e6c80e8ec1e62eecfd2964b8a9f5f980a5a01061e436e37bc9f
    • Instruction ID: 89b2a8244bf0206e4bad9ac9019f7a2ecc38b40d916d81ef5eafef2ab90cf4d9
    • Opcode Fuzzy Hash: d38135fb4df71e6c80e8ec1e62eecfd2964b8a9f5f980a5a01061e436e37bc9f
    • Instruction Fuzzy Hash: 29315E3C3106A482E614AF2AE80C33A6359F79AB95F84D135DE2AC7B99EF3CC445C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: ce80470fa4deb6d6172187dcf98ae3ac5c2e22c2398dc0b25eb93d0e69b03d15
    • Instruction ID: db293f7e4334e357535224717006681656cc175912696b95665feb7356451bd1
    • Opcode Fuzzy Hash: ce80470fa4deb6d6172187dcf98ae3ac5c2e22c2398dc0b25eb93d0e69b03d15
    • Instruction Fuzzy Hash: AD316D20B0C652E2E6145B16A91427A7376EF85FA0F046239DA2FCB7A6DF3CE485D340
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseValue$CreateDeleteOpenlstrlen
    • String ID: AppEvents$Network
    • API String ID: 3197061591-3733486940
    • Opcode ID: 8a321232281fbf681079ab08f7dcd2ccb76e80488ff50b598181f6d6f6baf471
    • Instruction ID: 08eef93266b265d48cbb53a4e6346e16cbfa105d0273fe68c7b2c70c6866216d
    • Opcode Fuzzy Hash: 8a321232281fbf681079ab08f7dcd2ccb76e80488ff50b598181f6d6f6baf471
    • Instruction Fuzzy Hash: 9D113A7A315A8086EB109F12F85875AB3A1F7A4BE5F948121EE5947FA8CF7CC149CB04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorInfoLast
    • String ID:
    • API String ID: 189849726-0
    • Opcode ID: 5d548cc39369a58207a9c943e799f4ab131ac754e7ecf3cfda6414b3f6c95353
    • Instruction ID: acee899610963d6a79ebcf5756c9081eddbe5646e92489645a9e8d00fb903457
    • Opcode Fuzzy Hash: 5d548cc39369a58207a9c943e799f4ab131ac754e7ecf3cfda6414b3f6c95353
    • Instruction Fuzzy Hash: 58B19D3E3056D086CB19CF2AE4943AE77A5F748B88F85412ADAADC7B54EF39C151CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWide$Info
    • String ID:
    • API String ID: 1775632426-0
    • Opcode ID: b15be38474aefe4c9613bb0d4762db6156c76aab2b1b8aacd7baaba64e94ff3e
    • Instruction ID: 73a995646d4f5123b5da21eff8b1dde130f005f2d30fb11e5b2a8032322cc4f2
    • Opcode Fuzzy Hash: b15be38474aefe4c9613bb0d4762db6156c76aab2b1b8aacd7baaba64e94ff3e
    • Instruction Fuzzy Hash: 6891E17F7047849ADB31AF29940436A7B92F744BA8FC88616DE6DD7B84EB38C545C340
    APIs
    • MultiByteToWideChar.KERNEL32 ref: 0287A14A
    • malloc.LIBCMT ref: 0287A1B3
    • MultiByteToWideChar.KERNEL32 ref: 0287A1E7
    • LCMapStringW.KERNEL32 ref: 0287A20E
    • LCMapStringW.KERNEL32 ref: 0287A256
    • malloc.LIBCMT ref: 0287A2B3
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • LCMapStringW.KERNEL32 ref: 0287A2E8
    • WideCharToMultiByte.KERNEL32 ref: 0287A328
    • free.LIBCMT ref: 0287A33C
    • free.LIBCMT ref: 0287A34D
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
    • String ID:
    • API String ID: 1080698880-0
    • Opcode ID: c6ac2012124e5f8258691178878140cf1341e8ec6c1aaf852dfb3bd8c808a96b
    • Instruction ID: b738150eb4e8eab006f5977276da82110ab4e88f1991ebcf288ed6314b3d507c
    • Opcode Fuzzy Hash: c6ac2012124e5f8258691178878140cf1341e8ec6c1aaf852dfb3bd8c808a96b
    • Instruction Fuzzy Hash: F871A53E314B8086DB299F2AD84035E77A6F748BA8F584625EF6E97B94DF38C141C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
    • String ID:
    • API String ID: 1080698880-0
    • Opcode ID: 8864ca2f36b3b28a6e37dacfbbe885c608440c4a788fc07bea0ef3c91e2c5cf3
    • Instruction ID: 0d0621e11b2288e5ee6749ebc55413896349d34367f43c12429eb5099f52bcdb
    • Opcode Fuzzy Hash: 8864ca2f36b3b28a6e37dacfbbe885c608440c4a788fc07bea0ef3c91e2c5cf3
    • Instruction Fuzzy Hash: 9E81E732B08742E6EB249F25984016976BBFB84BE4F441375EA5D8BBD6DFBDE4108700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 2295021086-0
    • Opcode ID: 2c14c3394b2ecc556a6275fb675dc450c69f306080c020ba5b1c371ee03d1d04
    • Instruction ID: 31f19b688dee23e8e23fd62f860fcc900d5cafa3d52387e833c13f4076ff0b77
    • Opcode Fuzzy Hash: 2c14c3394b2ecc556a6275fb675dc450c69f306080c020ba5b1c371ee03d1d04
    • Instruction Fuzzy Hash: 3F41083F6017618AEB21AF64C5403AD7765FB50BACF688125DE5DCBE98EB38C042CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 2295021086-0
    • Opcode ID: bd3480430a4880f8b9bfe9aab1841d67a6c611096bbe8aa784dae63e06954dd0
    • Instruction ID: 1165de3ec412ae5884c5b23c9ac071dbd0dd76d0e8f439889abf113646c4a06e
    • Opcode Fuzzy Hash: bd3480430a4880f8b9bfe9aab1841d67a6c611096bbe8aa784dae63e06954dd0
    • Instruction Fuzzy Hash: 8051B822E4C642E9FB619B2484503BC36B2AF4476CF146339DA5E8EFC7DE3C96458784
    APIs
    • GetStartupInfoW.KERNEL32 ref: 02881F11
      • Part of subcall function 0287AAE0: Sleep.KERNEL32 ref: 0287AB25
    • GetFileType.KERNEL32 ref: 0288207C
    • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 028820BA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
    • String ID: @
    • API String ID: 3473179607-2766056989
    • Opcode ID: 21fc890b1cf6f154f092da3c0a2ad5574b5904b4a85eae7bf654cd8d67533bcf
    • Instruction ID: 2afa6393ed3d64c934785c3219164e976628e64e0892ba466b346da506bf18b0
    • Opcode Fuzzy Hash: 21fc890b1cf6f154f092da3c0a2ad5574b5904b4a85eae7bf654cd8d67533bcf
    • Instruction Fuzzy Hash: 77816C7A301BC586DB149F24D58832976A1F745B78F548325DA7A837E8EF38C456C301
    APIs
    • _lock.LIBCMT ref: 00007FF66090A119
      • Part of subcall function 00007FF66090D9D8: _amsg_exit.LIBCMT ref: 00007FF66090DA02
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF66090A2DD,?,?,00000000,00007FF66090DA07,?,?,00000000,00007FF66090B951), ref: 00007FF66090A14C
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF66090A2DD,?,?,00000000,00007FF66090DA07,?,?,00000000,00007FF66090B951), ref: 00007FF66090A16A
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF66090A2DD,?,?,00000000,00007FF66090DA07,?,?,00000000,00007FF66090B951), ref: 00007FF66090A1AA
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF66090A2DD,?,?,00000000,00007FF66090DA07,?,?,00000000,00007FF66090B951), ref: 00007FF66090A1C4
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF66090A2DD,?,?,00000000,00007FF66090DA07,?,?,00000000,00007FF66090B951), ref: 00007FF66090A1D4
    • ExitProcess.KERNEL32 ref: 00007FF66090A260
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointer$ExitProcess_amsg_exit_lock
    • String ID: ceil
    • API String ID: 3411037476-3069211559
    • Opcode ID: 9a183ae1f03644b8a62f51de8d9c4146bcd30d60da9bb7abc91cae87c8d0ceca
    • Instruction ID: a303b82fb761b4b3a7c3ad9ab895e4c72ae17e3f0cba991a4250c7fe3f7b5eb5
    • Opcode Fuzzy Hash: 9a183ae1f03644b8a62f51de8d9c4146bcd30d60da9bb7abc91cae87c8d0ceca
    • Instruction Fuzzy Hash: E0414D31A1EA42E1E6549B05FC4013972BAFF88784F446239DA5E8B7A7DF7CE451C780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: ZwQueryInformationProcess$ZwQueryObject$ZwQuerySystemInformation$ntdll.dll
    • API String ID: 667068680-3590752221
    • Opcode ID: 8a0be3c6d33e8e2dd6bfebc5c516e81d155b332878859c9dd15496a47ec7d989
    • Instruction ID: caa1a5e89d0cd46ca044e35adea1c4dc64a3fe82169f56138c0ef14b58bd09df
    • Opcode Fuzzy Hash: 8a0be3c6d33e8e2dd6bfebc5c516e81d155b332878859c9dd15496a47ec7d989
    • Instruction Fuzzy Hash: 6111126CA03B4990FF0A8B02F89C32223E0F718708FD8902AC85D467A0EF3C81DAC741
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 4862a53a2d00355b2cdfb6728f68fce1447d9864874779d523ba4aac90f1cc33
    • Instruction ID: af9624a91abb8a2afe8a43f63bfa7611d0e957a54f2c2d8c59ae5ee3dbbea240
    • Opcode Fuzzy Hash: 4862a53a2d00355b2cdfb6728f68fce1447d9864874779d523ba4aac90f1cc33
    • Instruction Fuzzy Hash: CA31F8BD10C7154EE30E6F6C988513DB7D2EB46320F45126DD546C72A1DAB4DC428AD3
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
    • String ID:
    • API String ID: 3019579578-0
    • Opcode ID: dd50ce443d7a7c7a2503f875a105e6cc88d9067b5d064de374ba49bafdefeff6
    • Instruction ID: a55b0781b3503dbc526ceaab8b089ad6717e75b89509e0fd7347cb762d3288d0
    • Opcode Fuzzy Hash: dd50ce443d7a7c7a2503f875a105e6cc88d9067b5d064de374ba49bafdefeff6
    • Instruction Fuzzy Hash: 3441493E2146908BD7309F25E54833EB765F798B58F884216DB9A83B65EF3CE485CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
    • String ID:
    • API String ID: 3019579578-0
    • Opcode ID: 1cc5bff3dd2912bbf840fa48739d8834fcdebc8cdae61fe5ead118e36bb8da40
    • Instruction ID: 59e872662dacb3dccf4bec406a21addef14504cde5d34b28e951a2b2cdedb9e5
    • Opcode Fuzzy Hash: 1cc5bff3dd2912bbf840fa48739d8834fcdebc8cdae61fe5ead118e36bb8da40
    • Instruction Fuzzy Hash: 11412B22A08642D7E7749B15E44023A73B6FB94B50F042239DB9F8BB96DF7CE485C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 851380517a92b732ebc85122174d012e05205685cd47dc9c50f7059f0234a667
    • Instruction ID: 7e8e580bb99820aaa96121585010fffb503715ee15e3828f267d6efbcb454b03
    • Opcode Fuzzy Hash: 851380517a92b732ebc85122174d012e05205685cd47dc9c50f7059f0234a667
    • Instruction Fuzzy Hash: E5210A3EB0028886D716BF699C8033EBA66B7807A4FC94519DE25CB3A1DF7CC441CB12
    APIs
    • SetLastError.KERNEL32 ref: 028660FA
    • TryEnterCriticalSection.KERNEL32 ref: 0286611B
    • TryEnterCriticalSection.KERNEL32 ref: 0286612D
    • SetLastError.KERNEL32 ref: 02866146
    • LeaveCriticalSection.KERNEL32 ref: 02866150
    • LeaveCriticalSection.KERNEL32 ref: 0286615A
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: 7e876657705aafb2821538dd1f535f86e1477a843cf3583b913b0a5c36b37387
    • Instruction ID: 9f5aa0fa3551b6bdcdd7d12e85fa53c93bd906797a89e0288e9b1123737c7db4
    • Opcode Fuzzy Hash: 7e876657705aafb2821538dd1f535f86e1477a843cf3583b913b0a5c36b37387
    • Instruction Fuzzy Hash: 72314D3EA21690C7DB50DF28E84836D37A9FB54B4CF948025DB0AC6665EF3DC88AC740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: 3a839ef8a6bf8d7d73b88de66420fd037dbe664b26c5089cd47badf1e2dfdb2a
    • Instruction ID: 399ecbb5cc0e6bb6c96c7a0febf9b54fe155f62b9302d18cbcc2f59981b4207a
    • Opcode Fuzzy Hash: 3a839ef8a6bf8d7d73b88de66420fd037dbe664b26c5089cd47badf1e2dfdb2a
    • Instruction Fuzzy Hash: 37313932A1C506E6EB548F28D5441AD33B6FB44B48F502235DA1ECA3A6DF39E98AC740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: File$CloseCreateHandleWritelstrlenwsprintf
    • String ID: %s %s
    • API String ID: 2369136734-2939940506
    • Opcode ID: fb82c7389f2e52e8ed19e3e83665f2a219b46dd41d64a773a90c546ccedf99c7
    • Instruction ID: bccc325bea38cbe4f08853d383aa5990ef4bd486af46b7655f0c591640cb5411
    • Opcode Fuzzy Hash: fb82c7389f2e52e8ed19e3e83665f2a219b46dd41d64a773a90c546ccedf99c7
    • Instruction Fuzzy Hash: 4031B33A31498595EB20CF25F8487ABB365F7D4798F8441119B5E87EA8DF3CC549CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: ba147bacc2b5e060ee5a802c7efa88b2d7141a420072347e719a083b69a0ed4b
    • Instruction ID: 390afb26f0f315dba0bf7ac28dd5ee581e36b697982da92ebd2ec49bdbd39ea2
    • Opcode Fuzzy Hash: ba147bacc2b5e060ee5a802c7efa88b2d7141a420072347e719a083b69a0ed4b
    • Instruction Fuzzy Hash: 3041C23C214A0A5BDB5AEF2DC89436877E1FF55318B240719DC5AC319AE764DC92CBC2
    APIs
      • Part of subcall function 02864C70: EnterCriticalSection.KERNEL32 ref: 02864C9E
      • Part of subcall function 02864C70: LeaveCriticalSection.KERNEL32 ref: 02864CF2
    • send.WS2_32 ref: 02864AC3
    • EnterCriticalSection.KERNEL32 ref: 02864AD7
    • LeaveCriticalSection.KERNEL32 ref: 02864AEB
    • HeapFree.KERNEL32 ref: 02864B67
    • WSAGetLastError.WS2_32 ref: 02864BB4
    • EnterCriticalSection.KERNEL32 ref: 02864BC8
    • LeaveCriticalSection.KERNEL32 ref: 02864C16
    • HeapFree.KERNEL32 ref: 02864C54
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
    • String ID:
    • API String ID: 1701177279-0
    • Opcode ID: 0f41ccaa659a3fbdd162dac1c10e9f0415eaaa72adcae5368495915b1afd0a29
    • Instruction ID: db7642d65153ff518c2663844a49cc1ee72a9f45e027d8d12d47c1f6111d2572
    • Opcode Fuzzy Hash: 0f41ccaa659a3fbdd162dac1c10e9f0415eaaa72adcae5368495915b1afd0a29
    • Instruction Fuzzy Hash: 9C517C3E201A808AE774CF6AE4583AD73A1F748B98F508025DB4E87F64DF38D5A5C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
    • String ID:
    • API String ID: 1701177279-0
    • Opcode ID: c1be7f863ec74c84b7929cd5dfa0ec5487756cd30b1768cbd88e9af37da90106
    • Instruction ID: 4fc6b1bf4e4d8ae7ffdec052a7e22137371ff541df39b7d17b2158689f8abc48
    • Opcode Fuzzy Hash: c1be7f863ec74c84b7929cd5dfa0ec5487756cd30b1768cbd88e9af37da90106
    • Instruction Fuzzy Hash: 0B51B172608A81EAE764CF26D4403AD33B6FB54B84F005238DB4E8BB95DF78E595C780
    APIs
    • CreateWaitableTimerW.KERNEL32 ref: 02863F72
      • Part of subcall function 02861370: free.LIBCMT ref: 02861390
      • Part of subcall function 02861370: malloc.LIBCMT ref: 028613BC
    • setsockopt.WS2_32 ref: 0286400D
    • setsockopt.WS2_32 ref: 02864037
    • ResetEvent.KERNEL32 ref: 02864085
    • SetLastError.KERNEL32 ref: 028640B0
    • GetLastError.KERNEL32 ref: 028640C8
      • Part of subcall function 02864D20: GetCurrentThreadId.KERNEL32 ref: 02864D2D
    • SetLastError.KERNEL32 ref: 028640DA
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$CreateCurrentEventResetThreadTimerWaitablefreemalloc
    • String ID:
    • API String ID: 3356772049-0
    • Opcode ID: b62db397012c45f7f6159a48d9087b38499f2d1e65472d174db3c1d68d875640
    • Instruction ID: 2d696b764342f4f72ab956a9a81c4cd66869d90d8d0b8daba98362a1175a13eb
    • Opcode Fuzzy Hash: b62db397012c45f7f6159a48d9087b38499f2d1e65472d174db3c1d68d875640
    • Instruction Fuzzy Hash: DB419D7A601B909BE714CF25E50836E77A0F748748F548126DB8987B54DF7ED069CF40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: 10261713ebaca9735ebdeaa53afc57adbaf780813d6bed4f92c405acd57ecea8
    • Instruction ID: d651ee235fce638edb3ad61ca4e5630efdc24cc2928c8340ab78c37ec3a09522
    • Opcode Fuzzy Hash: 10261713ebaca9735ebdeaa53afc57adbaf780813d6bed4f92c405acd57ecea8
    • Instruction Fuzzy Hash: AF31F63E6156C4C2DB24AF39C68033C37A1FB05798F244615DF6AC7698DB38C4A2DB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Event$CloseCurrentSleepThreadTimeclosesocketsendshutdowntime
    • String ID:
    • API String ID: 929257074-0
    • Opcode ID: d80bd20e404b5833ff99a516d4d3aea9d62cab81a5f619cabeebe738e59a6503
    • Instruction ID: 22ef2823b69911ffb6cb3878c35d02de2e8c9789d3cddfc8ecb01865c51ba77f
    • Opcode Fuzzy Hash: d80bd20e404b5833ff99a516d4d3aea9d62cab81a5f619cabeebe738e59a6503
    • Instruction Fuzzy Hash: 0D31627E61169087D7219F79E84C32C7362F784F69F989225DA6E87A98CF38C885C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Event$CloseCurrentSleepThreadTimeclosesocketsendshutdowntime
    • String ID:
    • API String ID: 929257074-0
    • Opcode ID: e6689e71db0ff1669b26d14558efafb386105a6056d856fa6fa8066e84783edc
    • Instruction ID: d0a25f38af20eaca9daf9012e2f6a608c0a4cad24113a8fcbfd2e4a97337fe46
    • Opcode Fuzzy Hash: e6689e71db0ff1669b26d14558efafb386105a6056d856fa6fa8066e84783edc
    • Instruction Fuzzy Hash: E7313B72A08642D6E7149F25D84017A3377FB44FA5F142335EA5A8A7DACF38D885C780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Message$Peek$CloseDispatchErrorEventHandleLastMultipleObjectsTranslateWait
    • String ID:
    • API String ID: 1713936993-0
    • Opcode ID: 4271cb4c7969a4cce060b49edca004edc8465e505ab8869e0f42c4e3588366c3
    • Instruction ID: 2c0cd9b3cde6cb784377d44e6efcd25a4b2b1b056a0990cf52d2077695831e46
    • Opcode Fuzzy Hash: 4271cb4c7969a4cce060b49edca004edc8465e505ab8869e0f42c4e3588366c3
    • Instruction Fuzzy Hash: 00218E7E621A4187E720DF74E45CB2A33A1FB94708FE49225DB5AC6AA4DF38C449CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Event$HeapReset$CreateCriticalDestroyEnterFreeSection
    • String ID:
    • API String ID: 1658878062-0
    • Opcode ID: b8e90da5e81a1c5bd4b7ea335600b5e9df7185687b6b9f4d8d1a246453650ad8
    • Instruction ID: 819e44934bedd1d433d023e933074fa4b95bee01ba07b9ba149e147b3dab6e38
    • Opcode Fuzzy Hash: b8e90da5e81a1c5bd4b7ea335600b5e9df7185687b6b9f4d8d1a246453650ad8
    • Instruction Fuzzy Hash: C531D732608A82F2E64CDB21D5442ADB379FB48B80F405236DB6E87752CF78A5B9C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Message$Peek$CloseDispatchErrorEventHandleLastMultipleObjectsTranslateWait
    • String ID:
    • API String ID: 1713936993-0
    • Opcode ID: 446e21ef8d1e23cb48fe62aa3044cfdae947c01fbde446d7c73040613798d1b3
    • Instruction ID: c7fac76d3cf3575bdab3006c22232295eb2b536d833ade9dbf88cfe057011a73
    • Opcode Fuzzy Hash: 446e21ef8d1e23cb48fe62aa3044cfdae947c01fbde446d7c73040613798d1b3
    • Instruction Fuzzy Hash: D6218E22A18542E2F7608F24D45477A32B2FF84B44F546238DA5ECA6A5DF7CD8498A40
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 02882E7B
      • Part of subcall function 0287C3BC: _set_error_mode.LIBCMT ref: 0287C3C5
      • Part of subcall function 0287C3BC: _set_error_mode.LIBCMT ref: 0287C3D4
      • Part of subcall function 0287C15C: _set_error_mode.LIBCMT ref: 0287C1A1
      • Part of subcall function 0287C15C: _set_error_mode.LIBCMT ref: 0287C1B2
      • Part of subcall function 0287C15C: GetModuleFileNameW.KERNEL32 ref: 0287C214
      • Part of subcall function 0287BDC8: ExitProcess.KERNEL32 ref: 0287BDD7
      • Part of subcall function 0287BDC8: _amsg_exit.LIBCMT ref: 02882F66
      • Part of subcall function 0287AA60: malloc.LIBCMT ref: 0287AA8B
      • Part of subcall function 0287AA60: Sleep.KERNEL32 ref: 0287AA9E
    • _errno.LIBCMT ref: 02882EBD
    • _lock.LIBCMT ref: 02882ED1
    • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 02882EE7
    • free.LIBCMT ref: 02882EF4
    • _errno.LIBCMT ref: 02882EF9
    • LeaveCriticalSection.KERNEL32 ref: 02882F1C
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_amsg_exit_lockfreemalloc
    • String ID:
    • API String ID: 2779410436-0
    • Opcode ID: b0843a267ec6ba422468d13235b83ff60fcdfb8e34f7d610862d6568bd9aa951
    • Instruction ID: dcf135662695fe3cda244907ab4a091a10da27302162c9d00c764da46fa282b7
    • Opcode Fuzzy Hash: b0843a267ec6ba422468d13235b83ff60fcdfb8e34f7d610862d6568bd9aa951
    • Instruction Fuzzy Hash: 2521BE3D61168482EB25BB65F40872A6266FB85788F889035DE4AC7A98CF3CC440CB16
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 00007FF66090D917
      • Part of subcall function 00007FF66090A56C: _set_error_mode.LIBCMT ref: 00007FF66090A575
      • Part of subcall function 00007FF66090A56C: _set_error_mode.LIBCMT ref: 00007FF66090A584
      • Part of subcall function 00007FF66090A30C: _set_error_mode.LIBCMT ref: 00007FF66090A351
      • Part of subcall function 00007FF66090A30C: _set_error_mode.LIBCMT ref: 00007FF66090A362
      • Part of subcall function 00007FF66090A30C: GetModuleFileNameW.KERNEL32 ref: 00007FF66090A3C4
      • Part of subcall function 00007FF660909F5C: ExitProcess.KERNEL32 ref: 00007FF660909F6B
      • Part of subcall function 00007FF66090C020: malloc.LIBCMT ref: 00007FF66090C04B
      • Part of subcall function 00007FF66090C020: Sleep.KERNEL32(?,?,ceil,00007FF66090D951,?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951,?,?,00000000,00007FF66090BA08), ref: 00007FF66090C05E
    • _errno.LIBCMT ref: 00007FF66090D959
    • _lock.LIBCMT ref: 00007FF66090D96D
    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951,?,?,00000000,00007FF66090BA08,?,?,?,00007FF66090938D), ref: 00007FF66090D983
    • free.LIBCMT ref: 00007FF66090D990
    • _errno.LIBCMT ref: 00007FF66090D995
    • LeaveCriticalSection.KERNEL32(?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951,?,?,00000000,00007FF66090BA08,?,?,?,00007FF66090938D), ref: 00007FF66090D9B8
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
    • String ID:
    • API String ID: 113790786-0
    • Opcode ID: 1cf7f058a8983c64bfdf0fb23590526f2e0664be90d8ed4957796866281ab8dc
    • Instruction ID: a3dbbc99b065f660fb216f6fa1165a660ccf3352ba3bc4f0845397bec269ecd3
    • Opcode Fuzzy Hash: 1cf7f058a8983c64bfdf0fb23590526f2e0664be90d8ed4957796866281ab8dc
    • Instruction Fuzzy Hash: 32213921E1E642E1F754AB10A41477A6276EF80794F046638E59FCEBC3CF7CA44087C1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 79754162f90728ee6296ef0ddc862aca26a0c0dc80cbfdd284a51caaacb4e720
    • Instruction ID: 44f03e741779e455905655ad5d4e0ff87f994be36579aba339701404967e864c
    • Opcode Fuzzy Hash: 79754162f90728ee6296ef0ddc862aca26a0c0dc80cbfdd284a51caaacb4e720
    • Instruction Fuzzy Hash: 02C1C138618A588BC71DDF6CD4942A9B7E1FF58304F54412EE88EC7252DB35D58ACB82
    APIs
    • free.LIBCMT ref: 02862576
    • malloc.LIBCMT ref: 0286265D
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$AllocHeap_callnewhfreemalloc
    • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
    • API String ID: 3198430600-868042568
    • Opcode ID: de8006860ad337ec869959be84dcfe28e187b4c96f07af96b08ed4f7a32076d6
    • Instruction ID: 1056f590b59911a62c502426d3b406211af0b405c0c85c8ecfcf70939319e376
    • Opcode Fuzzy Hash: de8006860ad337ec869959be84dcfe28e187b4c96f07af96b08ed4f7a32076d6
    • Instruction Fuzzy Hash: 73D1D17E6046808BD774CF29E85877A7BA1F384B98F1840A1DF9AC3B59DB38D840CB41
    APIs
    • free.LIBCMT ref: 00007FF6609025A6
    • malloc.LIBCMT ref: 00007FF66090268D
      • Part of subcall function 00007FF660909070: _FF_MSGBANNER.LIBCMT ref: 00007FF6609090A0
      • Part of subcall function 00007FF660909070: HeapAlloc.KERNEL32(?,?,4E00000000000000,00007FF66090C050,?,?,ceil,00007FF66090D951,?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951), ref: 00007FF6609090C5
      • Part of subcall function 00007FF660909070: _callnewh.LIBCMT ref: 00007FF6609090DE
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090E9
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$AllocHeap_callnewhfreemalloc
    • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
    • API String ID: 3198430600-868042568
    • Opcode ID: dda5b54ef822ff448da02969afc54e1d0890a7d0193f906d4744a84604512da3
    • Instruction ID: 9f71e9afad22afefc8dc05c92b6cd443fadcaaa0d549de4569044c896ba94592
    • Opcode Fuzzy Hash: dda5b54ef822ff448da02969afc54e1d0890a7d0193f906d4744a84604512da3
    • Instruction Fuzzy Hash: 0EE1A972A0C682DBE7748B25A45066A77B2FB44744F145235DB9FCB786DE3CE841CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 1a90412cadf6408d59a9c1127363ccd9d752b955525589c9e26a3219661490d0
    • Instruction ID: 652674415b9aee2ae54cc64a43300722ff304ac6ce774c57cd697dfcd7d437ab
    • Opcode Fuzzy Hash: 1a90412cadf6408d59a9c1127363ccd9d752b955525589c9e26a3219661490d0
    • Instruction Fuzzy Hash: 86C1C83E700B5489DB20DF66E484A9E77A5F799788F814926CF9D87B14EF78C205CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
    • String ID:
    • API String ID: 3473179607-0
    • Opcode ID: eff7a9d518b47b5a0bc449bc8e70df270870fd33741806fcd9b591f6a57ce8e5
    • Instruction ID: 126f5e3c3d1c5c6fa4c11fdfb65d6af7d7a098792ab898a130af6ca6bd1ce47d
    • Opcode Fuzzy Hash: eff7a9d518b47b5a0bc449bc8e70df270870fd33741806fcd9b591f6a57ce8e5
    • Instruction Fuzzy Hash: 6D816E62A09B82E6EB148F14D84432937B2EB44B78F546339DA7E8A3D6DF3CE455C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
    • String ID:
    • API String ID: 3058130114-0
    • Opcode ID: 233744dc1db25240e62441a4cfda316594facda456fb24716390902636e45cb6
    • Instruction ID: 04cdd0d1b6148f07a2f9a3afa1df35bb4ef611408d3199c346a6de5b1e131b00
    • Opcode Fuzzy Hash: 233744dc1db25240e62441a4cfda316594facda456fb24716390902636e45cb6
    • Instruction Fuzzy Hash: 1F515D3E201B8186DB609F39A85C36D23A5F748B98F988626DF6EC7B98DF35C444C711
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
    • String ID:
    • API String ID: 3058130114-0
    • Opcode ID: 7b60ca50b3758f1c58badd931637b434e66ff62f720dd5cba929699bab1da5df
    • Instruction ID: d93746e6eafcd8d88999c035de652de02b3517ac2aec3522eecaf710a70f83e5
    • Opcode Fuzzy Hash: 7b60ca50b3758f1c58badd931637b434e66ff62f720dd5cba929699bab1da5df
    • Instruction Fuzzy Hash: CB61B271A08A42E6EB549F24984426A23B6FB14B58F142339EE1FCB7D6DF38E4408740
    APIs
    • _fileno.LIBCMT ref: 0283835C
      • Part of subcall function 028326D9: _errno.LIBCMT ref: 028326E2
      • Part of subcall function 028326D9: _invalid_parameter_noinfo.LIBCMT ref: 028326ED
    • _errno.LIBCMT ref: 0283836C
    • _errno.LIBCMT ref: 0283838A
    • _isatty.LIBCMT ref: 028383EB
    • _getbuf.LIBCMT ref: 028383F7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-3916222277
    • Opcode ID: 3f5d46b04a604bc5b79a1a1652a8fb6aba7d8c85590462c3b1725dfb1c4ad4a1
    • Instruction ID: e605f5750b382acd73cc0c154fcb250033e71d509feb5745a46b4d0a52cd38c0
    • Opcode Fuzzy Hash: 3f5d46b04a604bc5b79a1a1652a8fb6aba7d8c85590462c3b1725dfb1c4ad4a1
    • Instruction Fuzzy Hash: CE41E33D114A098FCB5AEF2CC4C636A77E1FB44324B188259E85ACB399D774C895CBC2
    APIs
      • Part of subcall function 028755F8: malloc.LIBCMT ref: 02875612
      • Part of subcall function 028755F8: _callnewh.LIBCMT ref: 02875606
      • Part of subcall function 028755F8: std::exception::exception.LIBCMT ref: 0287567F
    • RegCreateKeyW.ADVAPI32 ref: 0286DFC4
    • RegDeleteValueW.ADVAPI32 ref: 0286E008
    • RegSetValueExW.ADVAPI32 ref: 0286E028
    • RegCloseKey.ADVAPI32 ref: 0286E03F
    • CloseHandle.KERNEL32 ref: 0286E8D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseValue$CreateDeleteHandle_callnewhmallocstd::exception::exception
    • String ID: Console\1
    • API String ID: 2917754286-1035756066
    • Opcode ID: 79e2d56a9128d92d31829ef0773e95739c522c826726edbe564f461e8648c642
    • Instruction ID: bd02f2b9d38addecfd8beb4cde51e8dfb44acd764e7256bce66348d2129ebbb7
    • Opcode Fuzzy Hash: 79e2d56a9128d92d31829ef0773e95739c522c826726edbe564f461e8648c642
    • Instruction Fuzzy Hash: CB518C3E301B8086DB58DB16E958BAE73A9F788B84F814125DE8E87B54DF38C151CB45
    APIs
    • _fileno.LIBCMT ref: 0288888B
      • Part of subcall function 02882C08: _errno.LIBCMT ref: 02882C11
      • Part of subcall function 02882C08: _invalid_parameter_noinfo.LIBCMT ref: 02882C1C
    • _errno.LIBCMT ref: 0288889B
    • _errno.LIBCMT ref: 028888B9
    • _isatty.LIBCMT ref: 0288891A
    • _getbuf.LIBCMT ref: 02888926
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-3916222277
    • Opcode ID: 47412365dcfa2e42fa8e0b0a19150e860b7c19c74a8c32afa72c73f7cbb34592
    • Instruction ID: 881956e3d4d3988debd04ea86445b9086923551321d75acc08f802a34bbfe094
    • Opcode Fuzzy Hash: 47412365dcfa2e42fa8e0b0a19150e860b7c19c74a8c32afa72c73f7cbb34592
    • Instruction Fuzzy Hash: 1D41B67E610B0886DB28FF2DD84532D7761EB84BA8F544215CE69C73D8EB78C851C782
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: c59bcbb70bdc2dd793f40e48e33bab8fac7fcf3cd1580ce031325b872c95e3c5
    • Instruction ID: 9ef100a68287b2895936dd5a3247b17ba92ad0846edb8f0230496cc55b6c4fa9
    • Opcode Fuzzy Hash: c59bcbb70bdc2dd793f40e48e33bab8fac7fcf3cd1580ce031325b872c95e3c5
    • Instruction Fuzzy Hash: 2E31093D214D194F9768EB2E8894339B1D2FB89334B99476ED82DC71E5CB7488898742
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: 2a3b2a4cd214041c74d131aa7b21a7eccb1e02e7ccffb0f930f8d01a64b21150
    • Instruction ID: b2b745662d9d6dbf13c210a7397033a6689b125ffd5faa673f95352efac544f0
    • Opcode Fuzzy Hash: 2a3b2a4cd214041c74d131aa7b21a7eccb1e02e7ccffb0f930f8d01a64b21150
    • Instruction Fuzzy Hash: D921393C114E594ED718AF3D8C94338B692EB95334B99036DD82BC71E1DB3885DA8742
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointer$ExitProcess_amsg_exit_lock
    • String ID:
    • API String ID: 3411037476-0
    • Opcode ID: 4bb4ea8fb43c9b0b7e49429b916e00b17a5996c68506e0998d6447385f4766d2
    • Instruction ID: d977305682132cf29fd5285be05e82af8f4adafb2cab15ecc0fcf54dc03e8801
    • Opcode Fuzzy Hash: 4bb4ea8fb43c9b0b7e49429b916e00b17a5996c68506e0998d6447385f4766d2
    • Instruction Fuzzy Hash: EA316B3E217B4181EA109F25FC4831977A5F798BD9FA48026DE8E83B24EF78C095C742
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$CreateCurrentEventResetThreadTimerWaitablefreemalloc
    • String ID:
    • API String ID: 3356772049-0
    • Opcode ID: 30a6aa270136fc93e7a2b6b9d1edab1a6bf69228c00d1860cce5d377f71fb7bc
    • Instruction ID: 5c6a6a6fe181376e87aa14bf27bfa589285b81aa60aef1660fcdeb4e33fafc05
    • Opcode Fuzzy Hash: 30a6aa270136fc93e7a2b6b9d1edab1a6bf69228c00d1860cce5d377f71fb7bc
    • Instruction Fuzzy Hash: 68418172A09B42E7E7108F25E50436A77B5FB48748F144239EB8D8BB92CF7DE0658B40
    APIs
      • Part of subcall function 0287BD14: HeapCreate.KERNEL32 ref: 0287BD2A
      • Part of subcall function 0287BD14: GetVersion.KERNEL32 ref: 0287BD3C
      • Part of subcall function 0287BD14: HeapSetInformation.KERNEL32 ref: 0287BD5A
    • _RTC_Initialize.LIBCMT ref: 0287733E
    • GetCommandLineA.KERNEL32 ref: 02877343
      • Part of subcall function 02882630: GetEnvironmentStringsW.KERNEL32 ref: 02882649
      • Part of subcall function 02882630: WideCharToMultiByte.KERNEL32 ref: 028826A0
      • Part of subcall function 02882630: WideCharToMultiByte.KERNEL32 ref: 028826DB
      • Part of subcall function 02882630: free.LIBCMT ref: 028826E8
      • Part of subcall function 02882630: FreeEnvironmentStringsW.KERNEL32 ref: 028826F3
      • Part of subcall function 02881EF0: GetStartupInfoW.KERNEL32 ref: 02881F11
    • __setargv.LIBCMT ref: 0287736C
    • _cinit.LIBCMT ref: 02877380
      • Part of subcall function 0287E13C: FlsFree.KERNEL32 ref: 0287E14B
      • Part of subcall function 0287E13C: DeleteCriticalSection.KERNEL32 ref: 02882DE7
      • Part of subcall function 0287E13C: free.LIBCMT ref: 02882DF0
      • Part of subcall function 0287E13C: DeleteCriticalSection.KERNEL32 ref: 02882E17
      • Part of subcall function 028821C4: free.LIBCMT ref: 02882215
      • Part of subcall function 0287AAE0: Sleep.KERNEL32 ref: 0287AB25
    • FlsSetValue.KERNEL32 ref: 0287741A
    • GetCurrentThreadId.KERNEL32 ref: 0287742E
    • free.LIBCMT ref: 0287743D
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValueVersion__setargv_cinit_errno
    • String ID:
    • API String ID: 125979975-0
    • Opcode ID: 62d3da235f01ba21526005285f6cd45cbae75165d48adf9a6ab2c7e0940372bd
    • Instruction ID: 7be2559b82c07b6faa1ee29a0d2c8487633594ea87a8873bd67c9f077f86b262
    • Opcode Fuzzy Hash: 62d3da235f01ba21526005285f6cd45cbae75165d48adf9a6ab2c7e0940372bd
    • Instruction Fuzzy Hash: AC317E3CA4264286FF28BB78584832E9197AB5535DF98C17ACD19C5294FF38C091CB73
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: e39b6d2089daf4d4073d4d58c1da8825e9c538b0487b3bad0c323805675e4389
    • Instruction ID: 69a5d60aac6d58fd5ccaa06a91af40663ce5ae2575d9a3124876032cadeada42
    • Opcode Fuzzy Hash: e39b6d2089daf4d4073d4d58c1da8825e9c538b0487b3bad0c323805675e4389
    • Instruction Fuzzy Hash: 0321287D618A084EE31E6F5CD89637873C1FB46321F49029DD546C72A2D7A86C4186E3
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 2439d78e238f4b406dbb2099e9f50d018f4921c7879633d4acecbc07e4d2803a
    • Instruction ID: 7b76bbc95f48d9027f524605aa791d8c06d628b3afc6c9723a2e71fa60438958
    • Opcode Fuzzy Hash: 2439d78e238f4b406dbb2099e9f50d018f4921c7879633d4acecbc07e4d2803a
    • Instruction Fuzzy Hash: D721F53D6487484EE31E6B5CD88A33877C2FB46722F49029DD946C71A1D6E86C4186E3
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: 466a3c6f6b967cddcba7308fcb5cac7cf08bdcb7ecb45c03e2a1f3a9014e102e
    • Instruction ID: 08b399eda2a725cc9064923eefacecdb3792ed83fd50a76c0bbe18dc645977b3
    • Opcode Fuzzy Hash: 466a3c6f6b967cddcba7308fcb5cac7cf08bdcb7ecb45c03e2a1f3a9014e102e
    • Instruction Fuzzy Hash: D221286E600A4441DF199B2D9C483396262AB80BB8F589726DA2EC72E5DF3CC441D712
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: 4455c7f436b0a2d8c21ac2de2215c568954be8c117ee4757739655cbea58f595
    • Instruction ID: 4d365dae03467109537b16bd4b56b798f29c483840e9782ae9d7719966f8c69b
    • Opcode Fuzzy Hash: 4455c7f436b0a2d8c21ac2de2215c568954be8c117ee4757739655cbea58f595
    • Instruction Fuzzy Hash: 3221283E201A4541DF199B3DDCA8339A251AB80B78F599722DA3FC62E4DF3CC041D702
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: befc4e31688ca027fc467a0091b09bfe04993e8a5ec8ed331c858a993eb204c6
    • Instruction ID: e271df36bb5cf753cdcbfb5c74760e2ac52d3efa00cbd1592bdba0a9851f48b8
    • Opcode Fuzzy Hash: befc4e31688ca027fc467a0091b09bfe04993e8a5ec8ed331c858a993eb204c6
    • Instruction Fuzzy Hash: C311A97D408B688FCB64AB6C814432833E0FB5A310F5A11AAD56CC7221D374DCC88BC7
    APIs
    • std::exception::exception.LIBCMT ref: 0286A494
    • std::exception::exception.LIBCMT ref: 0286A4E0
    • std::exception::exception.LIBCMT ref: 0286A528
      • Part of subcall function 028775BC: RaiseException.KERNEL32 ref: 02877637
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: std::exception::exception$ExceptionRaise
    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
    • API String ID: 127205192-1866435925
    • Opcode ID: 03de42b1d57c69098daac0204ad33a72ce76f433452482d42a03222e607276e7
    • Instruction ID: 2a2ffc0ae8549ffdcc59718982a9e2f3cba90208b1da8986d20786dd4b710d10
    • Opcode Fuzzy Hash: 03de42b1d57c69098daac0204ad33a72ce76f433452482d42a03222e607276e7
    • Instruction Fuzzy Hash: 2131083AA01B1599EB00DBA4E8447EC33B5B74434CF98481ADE1D57B28EF74C256C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: 6f2b7d36461e4a0d181c2c2b0b56c0f7b2e919e7de38a3e7e4e2102f7147be67
    • Instruction ID: 5eaaec870ad89502a66eb2da074b199825aeaf407e1aaad46c17f150980f4308
    • Opcode Fuzzy Hash: 6f2b7d36461e4a0d181c2c2b0b56c0f7b2e919e7de38a3e7e4e2102f7147be67
    • Instruction Fuzzy Hash: 03112C3E1096449FD30A7F6CD88532876D2FB43322F5516ADDC1AC71D1DAB888848BD7
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 0d4cd8a73f2e7e400c7d0e7b591efabca8c63f0e7fa36032bab0b7c7c0917382
    • Instruction ID: 014ee9fac226320a295b5bddb1e96c28dda2f1b25427cefb4063d0a6cc547aa5
    • Opcode Fuzzy Hash: 0d4cd8a73f2e7e400c7d0e7b591efabca8c63f0e7fa36032bab0b7c7c0917382
    • Instruction Fuzzy Hash: FE11567E71028446E7167F29DC4032EB612AB80BA9F8D8265DE15CB3E1CB7CC841CB22
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: f4454937c5e5bbaa0e9d0a0c22758e5a6eeff2523f96aab8d469512271315ee2
    • Instruction ID: 5dd44a7ebb2cee7347285fcbc8c8339f9c21e3c267c1d2e59a0951dd95c1d6fb
    • Opcode Fuzzy Hash: f4454937c5e5bbaa0e9d0a0c22758e5a6eeff2523f96aab8d469512271315ee2
    • Instruction Fuzzy Hash: E5219032B1C542E1F7556B1598052BD65729F80BB1F096339EA2E8E3D3DE7CA4408B90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 5a090e99aeee2951a657be0a8c4efb463e857be8daee4d60eaed3aa4b73c4070
    • Instruction ID: d22f1d9bd6f01a37220030f0a94781279c1e221fc1c81f62901f6d48209c7015
    • Opcode Fuzzy Hash: 5a090e99aeee2951a657be0a8c4efb463e857be8daee4d60eaed3aa4b73c4070
    • Instruction Fuzzy Hash: 0D21D422E1C642E5F7456F25984537D2533AF80761F096339EA2E8F3E3DEBCA4408B90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: c8ff8ee70364361b3dc83590c2d90dbe629010f301a2ce9629a4b457e90024a1
    • Instruction ID: fe8a4d8efc355c0dae0388fe10d375f2435fbbec40c9db4bd72bb62aa797e397
    • Opcode Fuzzy Hash: c8ff8ee70364361b3dc83590c2d90dbe629010f301a2ce9629a4b457e90024a1
    • Instruction Fuzzy Hash: 2E11D22E71168442EB167F19D85032E7612A780FB5F8D4749EE398B3E1EB7CD4818B62
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$BuffersErrorFileFlushLast__doserrno
    • String ID:
    • API String ID: 1845094721-0
    • Opcode ID: 052eaff4a4bf768fdab472bc5fd2df4f04601910d83273a053cf8ccc3b032aca
    • Instruction ID: 08d94580e83e051543ec110b856ee71bfb99101c04302f7ad1f14908debf5ac3
    • Opcode Fuzzy Hash: 052eaff4a4bf768fdab472bc5fd2df4f04601910d83273a053cf8ccc3b032aca
    • Instruction Fuzzy Hash: 2E112B3EB0578446DB157FA9D88432E7612AB80FA4F8D856DDA2A8B3A0DF7CC841C711
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$BuffersErrorFileFlushLast__doserrno
    • String ID:
    • API String ID: 1845094721-0
    • Opcode ID: 17d30c8fc9599290ce3f70905f1a86dc7465141df05744b8eccb52f7b4e97e35
    • Instruction ID: b55889b4d671590a835a39dcd0af0d338f6270850312e12e3bee3701120cdfee
    • Opcode Fuzzy Hash: 17d30c8fc9599290ce3f70905f1a86dc7465141df05744b8eccb52f7b4e97e35
    • Instruction Fuzzy Hash: 9B21C221F0C643F5F7155FA5988427D257AAF91B90F142379E61E8E3E3CE6CA840C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: 449afea29cff9f96f01fd31e2d1eae9b8e244c4fb90c52916936df59702f190e
    • Instruction ID: 44c340bf68f36518ac9401ab2477d4f5e360d9cd3fa685b0236e74fb1eaec36a
    • Opcode Fuzzy Hash: 449afea29cff9f96f01fd31e2d1eae9b8e244c4fb90c52916936df59702f190e
    • Instruction Fuzzy Hash: 7111503FB0028446E715BF2DD88431D7612A780B65F9D4569DA1ACB7D1DB7CC440CB21
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: bda87b43c9d570eecaee3d7bd9474c424701c106e53aae398468428abc392862
    • Instruction ID: fee4699256ae76d34aaa9f5226edf45e2f26dfdc5ff0c4cd0fb1ffcbda2ae934
    • Opcode Fuzzy Hash: bda87b43c9d570eecaee3d7bd9474c424701c106e53aae398468428abc392862
    • Instruction Fuzzy Hash: 3A119D22E1C282F1F7056B25998527D6637AFD17A0F196378E51F8F3D3CE7CA4408650
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 553ff7a640bda5d3f087a58087b0c5fe603f7e2afa60208906e828a7eb11613b
    • Instruction ID: a0b26b21ce92710d7c5d0460de8e9c27ac464c4bd82c356e473b2471bf2f8903
    • Opcode Fuzzy Hash: 553ff7a640bda5d3f087a58087b0c5fe603f7e2afa60208906e828a7eb11613b
    • Instruction Fuzzy Hash: D211C27E500B808BD721AF66A40031EB7A0F3A8FD5F584052CF588B755CB3CC491CB42
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 671de168d03ae217984e1b1287bd742c961c49be666fcdf1db50e274fe126a0f
    • Instruction ID: 4c62541afd08afb67e499e002577230b1c54cdc9123f1f373631b9c9ffbe174c
    • Opcode Fuzzy Hash: 671de168d03ae217984e1b1287bd742c961c49be666fcdf1db50e274fe126a0f
    • Instruction Fuzzy Hash: 6D115A7E900B808BDB21AF5A944032E7661FB94F98F595025DF598B755CB3CC482CF42
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: c1d3ccc9aad43bc67af73f482cb02ec735a242584822cbb9a96a93b359dba97b
    • Instruction ID: c6636079e882b0ce6286ea2dc404855dc07999f96cfac6e18b0942a4eaf95a7c
    • Opcode Fuzzy Hash: c1d3ccc9aad43bc67af73f482cb02ec735a242584822cbb9a96a93b359dba97b
    • Instruction Fuzzy Hash: D0115E3280C782E6E7605B51940036976B1FB94B90F196238DB8E4BBD3CE3CE84187C1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
    • String ID:
    • API String ID: 3421218197-3916222277
    • Opcode ID: d4be7e06b31d663aed38c78f28249248fafd060fd5c9b0da482a79e76a279693
    • Instruction ID: 24d76a2053f786f3c6fbb568f2606533d73960b5d431e56130eb9268d154df85
    • Opcode Fuzzy Hash: d4be7e06b31d663aed38c78f28249248fafd060fd5c9b0da482a79e76a279693
    • Instruction Fuzzy Hash: 2A014F3A215B8182DB608B64F84935BB7A4F394794F905126E78A43F68DF3CC145CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Value$CloseDeleteOpen
    • String ID: Console$IpDatespecial
    • API String ID: 3183427449-1840232981
    • Opcode ID: 46a845e2221ca44cf1185620c2cc3f604d55b02dd79e17f295db38f463142a96
    • Instruction ID: c5f713aa5a670293623e32ee2ebaecab2bde9744ba1946e2fd6ad7741a98f590
    • Opcode Fuzzy Hash: 46a845e2221ca44cf1185620c2cc3f604d55b02dd79e17f295db38f463142a96
    • Instruction Fuzzy Hash: F701217A716A8086EB21CB15F8597993770F799BA8F848112CF9D13B95CF3CC18AC704
    APIs
    • _getptd.LIBCMT ref: 02878EB7
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
      • Part of subcall function 02882978: _getptd.LIBCMT ref: 0288297C
    • _getptd.LIBCMT ref: 02878EC9
    • _getptd.LIBCMT ref: 02878ED7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$_amsg_exit
    • String ID: MOC$RCC$csm
    • API String ID: 2610988583-2671469338
    • Opcode ID: 2f656466f72e01974a1df93c8b86b1b6fb3d43157e53be49a4e22abd606d8b83
    • Instruction ID: eaeb312f1d14772d80fdf51b9ccb6b03f6fcc0a4ef2b15857fa0ba0db41aa04c
    • Opcode Fuzzy Hash: 2f656466f72e01974a1df93c8b86b1b6fb3d43157e53be49a4e22abd606d8b83
    • Instruction Fuzzy Hash: 69E0123F910144CAD7257F6984483AC3661F7A8B0AFD6D9A59648C2310C7BCC480AE13
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$_amsg_exit
    • String ID: MOC$RCC$csm
    • API String ID: 2610988583-2671469338
    • Opcode ID: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
    • Instruction ID: c6e3a6219c7e8d789f40ca0cd851a760820f531c119ec4df6046f046997b4480
    • Opcode Fuzzy Hash: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
    • Instruction Fuzzy Hash: 68F03035B0D102E5E7552B2480063F831F7EF98B05F85F7B8D6498A3838FAC68818A52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno_getptd$_lockmalloc
    • String ID:
    • API String ID: 1369581901-0
    • Opcode ID: 6627a91fce6e6f9bd605d3e47a486a9597166daa8d056ce2c6ca4d44098f1495
    • Instruction ID: fa6dd6a6b664187301b098e9136a5bf43bb3cdfbd8dbd2eb41facd069d1eb7b2
    • Opcode Fuzzy Hash: 6627a91fce6e6f9bd605d3e47a486a9597166daa8d056ce2c6ca4d44098f1495
    • Instruction Fuzzy Hash: 9D513B3C614A188FEB65EF6C988076577E2FB88314F14415EC88EC7252DB34B886CB97
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocCurrentFreeThread
    • String ID:
    • API String ID: 1155560630-0
    • Opcode ID: cd68a7855d9bff61e79928e65f9b1f850c339330868a212f2d92ce5f7b1a21b2
    • Instruction ID: 69456b355ec8ab2e232170a996e270156f4bab969482349618fb7c73013e8e1d
    • Opcode Fuzzy Hash: cd68a7855d9bff61e79928e65f9b1f850c339330868a212f2d92ce5f7b1a21b2
    • Instruction Fuzzy Hash: C2714932718A81E7D65D8B25A14036AB3BAFB44B84F405238EB5E8B755DF38F561CB40
    APIs
    • malloc.LIBCMT ref: 02811296
    • malloc.LIBCMT ref: 02811302
      • Part of subcall function 02825011: _FF_MSGBANNER.LIBCMT ref: 02825041
      • Part of subcall function 02825011: _callnewh.LIBCMT ref: 0282507F
      • Part of subcall function 02825011: _errno.LIBCMT ref: 0282508A
      • Part of subcall function 02825011: _errno.LIBCMT ref: 02825095
    • free.LIBCMT ref: 0281132B
      • Part of subcall function 02824FD1: _errno.LIBCMT ref: 02824FF1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$malloc$_callnewhfree
    • String ID: d$d$d
    • API String ID: 1789327305-1898527202
    • Opcode ID: e4bca791a3ca6fc00bfabf83367b606d4990b6dba4dc514ecbcba51caafa37f7
    • Instruction ID: 7b9b1c14037322a7c002e0502aa488583ee01159efd720a4c7a80505acc48210
    • Opcode Fuzzy Hash: e4bca791a3ca6fc00bfabf83367b606d4990b6dba4dc514ecbcba51caafa37f7
    • Instruction Fuzzy Hash: A25104B4424A198FDB95DF1CC088B957BE4FB18704F4581AA990CCB26ADB74C884CFA1
    APIs
    • _getptd.LIBCMT ref: 0287F11F
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
      • Part of subcall function 0287ED3C: _getptd.LIBCMT ref: 0287ED46
      • Part of subcall function 0287ED3C: _amsg_exit.LIBCMT ref: 0287EDE3
      • Part of subcall function 0287EDF8: GetOEMCP.KERNEL32 ref: 0287EE22
      • Part of subcall function 0287AA60: malloc.LIBCMT ref: 0287AA8B
      • Part of subcall function 0287AA60: Sleep.KERNEL32 ref: 0287AA9E
    • free.LIBCMT ref: 0287F1AA
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    • _lock.LIBCMT ref: 0287F1DA
    • free.LIBCMT ref: 0287F27D
    • free.LIBCMT ref: 0287F2A9
    • _errno.LIBCMT ref: 0287F2AE
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
    • String ID:
    • API String ID: 3894533514-0
    • Opcode ID: 03e3f508a065664d853cee889eabf6afe27cfefa4609284178044c8b375e6fe5
    • Instruction ID: 95c7d78e9ace65ed44edbb9c5eda9680ae924cc9d9bac68995f591d08be2818b
    • Opcode Fuzzy Hash: 03e3f508a065664d853cee889eabf6afe27cfefa4609284178044c8b375e6fe5
    • Instruction Fuzzy Hash: BF41A13E61168086E714DB6AE44032EB7A2F7A4B88F588117CE5EC7B58CF7CC442C791
    APIs
    • _getptd.LIBCMT ref: 00007FF66090F34F
      • Part of subcall function 00007FF66090BA34: _amsg_exit.LIBCMT ref: 00007FF66090BA4A
      • Part of subcall function 00007FF66090EF6C: _getptd.LIBCMT ref: 00007FF66090EF76
      • Part of subcall function 00007FF66090EF6C: _amsg_exit.LIBCMT ref: 00007FF66090F013
      • Part of subcall function 00007FF66090F028: GetOEMCP.KERNEL32 ref: 00007FF66090F052
      • Part of subcall function 00007FF66090C020: malloc.LIBCMT ref: 00007FF66090C04B
      • Part of subcall function 00007FF66090C020: Sleep.KERNEL32(?,?,ceil,00007FF66090D951,?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951,?,?,00000000,00007FF66090BA08), ref: 00007FF66090C05E
    • free.LIBCMT ref: 00007FF66090F3DA
      • Part of subcall function 00007FF660909030: HeapFree.KERNEL32(?,?,00000000,00007FF66090BA1C,?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE), ref: 00007FF660909046
      • Part of subcall function 00007FF660909030: _errno.LIBCMT ref: 00007FF660909050
      • Part of subcall function 00007FF660909030: GetLastError.KERNEL32(?,?,00000000,00007FF66090BA1C,?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE), ref: 00007FF660909058
    • _lock.LIBCMT ref: 00007FF66090F40A
    • free.LIBCMT ref: 00007FF66090F4AD
    • free.LIBCMT ref: 00007FF66090F4D9
    • _errno.LIBCMT ref: 00007FF66090F4DE
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
    • String ID:
    • API String ID: 3894533514-0
    • Opcode ID: de94af9eb20aff71365a2e79f7747a0a6ec5dd64a421ced7859fa65583d8f430
    • Instruction ID: b85175a1c1e527354c14f38d1ba2994fd71fefb75c2c07ecb9851cb1871661d4
    • Opcode Fuzzy Hash: de94af9eb20aff71365a2e79f7747a0a6ec5dd64a421ced7859fa65583d8f430
    • Instruction Fuzzy Hash: 4351C421A0C642E1E7549B25945027A76B7FB80B48F14623ADD5FCBBA7CF3CE542C784
    APIs
    • malloc.LIBCMT ref: 028617C5
    • malloc.LIBCMT ref: 02861831
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • free.LIBCMT ref: 0286185A
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$Heapmalloc$AllocErrorFreeLast_callnewhfree
    • String ID: d$d$d
    • API String ID: 161857241-1898527202
    • Opcode ID: 413d3b361f1ae2f37866b78383e34ea41cab92c9d9dfaf27fd664dffe3c6aa16
    • Instruction ID: 05682dac2632a5a498b94e1eac2bfb0f061a59e2df6e161d373332605caf8301
    • Opcode Fuzzy Hash: 413d3b361f1ae2f37866b78383e34ea41cab92c9d9dfaf27fd664dffe3c6aa16
    • Instruction Fuzzy Hash: 0941047A112B90C9E7818F25E4483993BB9F748F88F59813ADB8C4B758EF79C454CB60
    APIs
    • malloc.LIBCMT ref: 00007FF6609017F5
    • malloc.LIBCMT ref: 00007FF660901861
      • Part of subcall function 00007FF660909070: _FF_MSGBANNER.LIBCMT ref: 00007FF6609090A0
      • Part of subcall function 00007FF660909070: HeapAlloc.KERNEL32(?,?,4E00000000000000,00007FF66090C050,?,?,ceil,00007FF66090D951,?,?,?,00007FF66090D9FB,?,?,00000000,00007FF66090B951), ref: 00007FF6609090C5
      • Part of subcall function 00007FF660909070: _callnewh.LIBCMT ref: 00007FF6609090DE
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090E9
      • Part of subcall function 00007FF660909070: _errno.LIBCMT ref: 00007FF6609090F4
    • free.LIBCMT ref: 00007FF66090188A
      • Part of subcall function 00007FF660909030: HeapFree.KERNEL32(?,?,00000000,00007FF66090BA1C,?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE), ref: 00007FF660909046
      • Part of subcall function 00007FF660909030: _errno.LIBCMT ref: 00007FF660909050
      • Part of subcall function 00007FF660909030: GetLastError.KERNEL32(?,?,00000000,00007FF66090BA1C,?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE), ref: 00007FF660909058
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$Heapmalloc$AllocErrorFreeLast_callnewhfree
    • String ID: d$d$d
    • API String ID: 161857241-1898527202
    • Opcode ID: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
    • Instruction ID: 182f177ac06ec53fa75a718f72eaa7e8e4cf37e7b890b7c9c8418090a1511975
    • Opcode Fuzzy Hash: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
    • Instruction Fuzzy Hash: 7C412832519B91C5E7408F20E4003993AF9F744F88F19923ADA8D4B789EF79D454CBA0
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 0283294C
      • Part of subcall function 0282BE8D: _set_error_mode.LIBCMT ref: 0282BE96
      • Part of subcall function 0282BE8D: _set_error_mode.LIBCMT ref: 0282BEA5
      • Part of subcall function 0282BC2D: _set_error_mode.LIBCMT ref: 0282BC72
      • Part of subcall function 0282BC2D: _set_error_mode.LIBCMT ref: 0282BC83
      • Part of subcall function 0282A531: malloc.LIBCMT ref: 0282A55C
    • _errno.LIBCMT ref: 0283298E
    • _lock.LIBCMT ref: 028329A2
    • free.LIBCMT ref: 028329C5
    • _errno.LIBCMT ref: 028329CA
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _set_error_mode$_errno$_lockfreemalloc
    • String ID:
    • API String ID: 360200360-0
    • Opcode ID: 94b0533748bce51f3f0ee7a44595441a65b1f51acf6d8cfd0de9afd4f5187e95
    • Instruction ID: c85e2e83a2465b4f81cd462ec9c8b06b81e5d28f0c4f91e5abc36db0ce40698b
    • Opcode Fuzzy Hash: 94b0533748bce51f3f0ee7a44595441a65b1f51acf6d8cfd0de9afd4f5187e95
    • Instruction Fuzzy Hash: DF21CF3C208A2D8FE765BFA8D85472972D1FB89316F40053C980AC3294CB788C84CB82
    APIs
    • GetEnvironmentStringsW.KERNEL32 ref: 02882649
    • WideCharToMultiByte.KERNEL32 ref: 028826A0
    • WideCharToMultiByte.KERNEL32 ref: 028826DB
    • free.LIBCMT ref: 028826E8
    • FreeEnvironmentStringsW.KERNEL32 ref: 028826F3
    • FreeEnvironmentStringsW.KERNEL32 ref: 02882701
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
    • String ID:
    • API String ID: 517548149-0
    • Opcode ID: 39ac4e38675b56c40c8c307033e4f7505f59e0a7c34ad5e5f182410cea7ce816
    • Instruction ID: 33c2ddab086f877d602ec2d1b89f0bbb1ab257e2a899aa184c4f007b935ea788
    • Opcode Fuzzy Hash: 39ac4e38675b56c40c8c307033e4f7505f59e0a7c34ad5e5f182410cea7ce816
    • Instruction Fuzzy Hash: 43213D7A615BC086DB24EF26B41471AB7A5FB88FD4F888025DE8A87B19EF3CD450C704
    APIs
    • ResetEvent.KERNEL32 ref: 0286530C
    • ResetEvent.KERNEL32 ref: 02865319
    • timeGetTime.WINMM ref: 0286531F
    • WaitForSingleObject.KERNEL32 ref: 02865373
    • ResetEvent.KERNEL32 ref: 02865390
      • Part of subcall function 02864D20: GetCurrentThreadId.KERNEL32 ref: 02864D2D
    • ResetEvent.KERNEL32 ref: 028653B7
      • Part of subcall function 028759EC: _errno.LIBCMT ref: 02875A17
      • Part of subcall function 028759EC: _invalid_parameter_noinfo.LIBCMT ref: 02875A22
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EventReset$CurrentObjectSingleThreadTimeWait_errno_invalid_parameter_noinfotime
    • String ID:
    • API String ID: 2543248268-0
    • Opcode ID: d50bf74d6e22cde16153601e1c4afc7f6e0cc1e21fea4f5b3574960e88087405
    • Instruction ID: 8beb4607f3ffe5006d5f3685079d97e8c871e2960a792dbb9ec29aefb6fd7520
    • Opcode Fuzzy Hash: d50bf74d6e22cde16153601e1c4afc7f6e0cc1e21fea4f5b3574960e88087405
    • Instruction Fuzzy Hash: 0C21397A204B9086DB45CF25E84836D7364FB89F98FA88121DE5DD7B68DF38C581C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EventReset$CurrentObjectSingleThreadTimeWait_errno_invalid_parameter_noinfotime
    • String ID:
    • API String ID: 2543248268-0
    • Opcode ID: 3c273d08d9a1588e0da29e7cbdea0a8e994acad75351d05f79bf53ec50dd0d72
    • Instruction ID: 7eac60ca80c7543a5c3e25d83fe9e2dac608db7337feb72328b8637256dee66a
    • Opcode Fuzzy Hash: 3c273d08d9a1588e0da29e7cbdea0a8e994acad75351d05f79bf53ec50dd0d72
    • Instruction Fuzzy Hash: 16217C36608A81D6E740CF21E8402AA73B6FB48F94F185235DE4ECB76ADF78D5868740
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 02864D2D
      • Part of subcall function 02864100: SwitchToThread.KERNEL32 ref: 0286413E
      • Part of subcall function 02864100: SetLastError.KERNEL32 ref: 02864185
    • send.WS2_32 ref: 02864D79
    • SetEvent.KERNEL32 ref: 02864D97
    • WSACloseEvent.WS2_32 ref: 02864DAB
    • shutdown.WS2_32 ref: 02864DC4
    • closesocket.WS2_32 ref: 02864DCE
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EventThread$CloseCurrentErrorLastSwitchclosesocketsendshutdown
    • String ID:
    • API String ID: 779811758-0
    • Opcode ID: 9bc6ea2ebeeba2fb3f83fde7a834929fe9b253913c8843f74cc280f85b5423e1
    • Instruction ID: 5887e387a8479ec71517c3134e5fa923bb55216a1e6c757bd4fc980489bcee95
    • Opcode Fuzzy Hash: 9bc6ea2ebeeba2fb3f83fde7a834929fe9b253913c8843f74cc280f85b5423e1
    • Instruction Fuzzy Hash: 7221333E60164186EB20AF79E85832D7362FB98FB8F944321DB3987698DF34C885C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EventThread$CloseCurrentErrorLastSwitchclosesocketsendshutdown
    • String ID:
    • API String ID: 779811758-0
    • Opcode ID: 2fa192ee69b06f1eeb25edd6ab0f4da1fe6a6614d325027052db3e123256aa8b
    • Instruction ID: 825d878e6846e1e7ee154b3747e14e590b1f70beee6efd999fee8d2b3a91dafa
    • Opcode Fuzzy Hash: 2fa192ee69b06f1eeb25edd6ab0f4da1fe6a6614d325027052db3e123256aa8b
    • Instruction Fuzzy Hash: 6F215171A08642D2EB149F25E4501293376FF98FA4F445335DA2E8B7D6DE38D8858780
    APIs
    • GetLastError.KERNEL32 ref: 0287E226
    • FlsGetValue.KERNEL32 ref: 0287E234
    • SetLastError.KERNEL32 ref: 0287E28C
      • Part of subcall function 0287AAE0: Sleep.KERNEL32 ref: 0287AB25
    • FlsSetValue.KERNEL32 ref: 0287E260
    • free.LIBCMT ref: 0287E283
      • Part of subcall function 0287E164: _lock.LIBCMT ref: 0287E1B8
      • Part of subcall function 0287E164: _lock.LIBCMT ref: 0287E1D7
    • GetCurrentThreadId.KERNEL32 ref: 0287E274
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
    • String ID:
    • API String ID: 3106088686-0
    • Opcode ID: 413cfe39aa25b23b0b14b7556f2c0eeaded75c2f83ecb0192f175fd880dcee4d
    • Instruction ID: cf394af59f04072d4b876194fc74c520265da1b5bc23c96f76b21abcec6e61f8
    • Opcode Fuzzy Hash: 413cfe39aa25b23b0b14b7556f2c0eeaded75c2f83ecb0192f175fd880dcee4d
    • Instruction Fuzzy Hash: EE01866D60270183EB85AF75E4983296292BB5CBA4FD8C235DA2A837D4EF3CC445C711
    APIs
    • GetLastError.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9BA
    • FlsGetValue.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9C8
    • SetLastError.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090BA20
      • Part of subcall function 00007FF66090C0A0: Sleep.KERNEL32(?,?,ceil,00007FF66090B9E3,?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE), ref: 00007FF66090C0E5
    • FlsSetValue.KERNEL32(?,?,?,00007FF66090938D,?,?,?,?,00007FF660914BEE,?,?,?,?,00007FF660912ED1), ref: 00007FF66090B9F4
    • free.LIBCMT ref: 00007FF66090BA17
    • GetCurrentThreadId.KERNEL32 ref: 00007FF66090BA08
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
    • String ID:
    • API String ID: 3106088686-0
    • Opcode ID: 4213d91c3c88d15f51b7cb7809fe6c775b8414f6b8c9181202556ccbea47a494
    • Instruction ID: d568053f8fe35e02b1b19febbdd2d44efb3de31cb21f252aa0e37a1c02d063e0
    • Opcode Fuzzy Hash: 4213d91c3c88d15f51b7cb7809fe6c775b8414f6b8c9181202556ccbea47a494
    • Instruction Fuzzy Hash: 1D017524B0D702E2FB459B75945517922BBAF48750F086B38C92E8A3D3EE3CE845C210
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno
    • String ID:
    • API String ID: 2288870239-0
    • Opcode ID: fb9f54a9f244550df940d026c32715cce55ac9c12273f06423ac3a9ba640441a
    • Instruction ID: f11118bee49f3d81bd1218ebef9e09b4ed6b49d387a9d04903fbea4b867abda6
    • Opcode Fuzzy Hash: fb9f54a9f244550df940d026c32715cce55ac9c12273f06423ac3a9ba640441a
    • Instruction Fuzzy Hash: 4D91AEB8105A4DCFCB99EFACC098B69B7E5FF59308B14449DC14EDB261CB71A882CB51
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CallTranslator
    • String ID: MOC$RCC
    • API String ID: 3569367362-2084237596
    • Opcode ID: cb34173580a42dfacebeea2d5b2fd6fdecd6c43d53704b8f6108025bf97ea43f
    • Instruction ID: dc310bfcf581928c029a6ba5fef05ef7674a08a79599f84954ed754193d50b6a
    • Opcode Fuzzy Hash: cb34173580a42dfacebeea2d5b2fd6fdecd6c43d53704b8f6108025bf97ea43f
    • Instruction Fuzzy Hash: F361E638118B2D8FD724FF58C0047E6B3E1FB84308F644A6ED44AC7515DBB4A599CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 39caf3c37a47655031c94e0de5774d4aa99865a29994b72ed535d303bf2608d5
    • Instruction ID: b42ac2f7898e1fdfdf2a405e076ff9827aa5794a94ef2996d05d573c1eef1fc3
    • Opcode Fuzzy Hash: 39caf3c37a47655031c94e0de5774d4aa99865a29994b72ed535d303bf2608d5
    • Instruction Fuzzy Hash: 4A715D7360AB81D5DB51DF69E0502AD77B6EB55B84F58A13AC78E4B306CF38E461C300
    APIs
    • _getptd.LIBCMT ref: 0287978D
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    • _getptd.LIBCMT ref: 028797AB
    • _CallSETranslator.LIBCMT ref: 028797F3
      • Part of subcall function 02877A34: _getptd.LIBCMT ref: 02877A5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CallTranslator_amsg_exit
    • String ID: MOC$RCC
    • API String ID: 1374396951-2084237596
    • Opcode ID: b2d025f7e271158a0b314ad1bef8ace00e4e0695c6d6e4d82c4aff9e558a4ce5
    • Instruction ID: 5a02fb48761fe7ac25cfd6dc279774548e8e7661cf1e1a9b80b00afe7d85007a
    • Opcode Fuzzy Hash: b2d025f7e271158a0b314ad1bef8ace00e4e0695c6d6e4d82c4aff9e558a4ce5
    • Instruction Fuzzy Hash: 8E51CF7A604AC5D6CF20DF19E5807ADB361FB80B8DF49452ADB9E87608DF78C152CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$CallTranslator_amsg_exit
    • String ID: MOC$RCC
    • API String ID: 1374396951-2084237596
    • Opcode ID: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
    • Instruction ID: b80ccef3a540c4082a7bb455c77f8f7616646c271cde8204ef5edb03bb498393
    • Opcode Fuzzy Hash: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
    • Instruction Fuzzy Hash: 85614D72B08A82E5DA20CB15D0803B9B77AFB81B88F449675DB8E8B796DF78D151C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 46e5c42acb55ef602981079806f2a339f8179ab2e4ea52cfa33c98ebef37ded6
    • Instruction ID: e12873fbd45a13a348be8aff4497bdf3bf71932afcdd5b45345f469bdd4704e0
    • Opcode Fuzzy Hash: 46e5c42acb55ef602981079806f2a339f8179ab2e4ea52cfa33c98ebef37ded6
    • Instruction Fuzzy Hash: 1151053E202B84C5CB549F29E58836DB366F708B88F9C9016CB9E97715EF3AD4A1C315
    APIs
    • _fileno.LIBCMT ref: 02827C25
      • Part of subcall function 028326D9: _errno.LIBCMT ref: 028326E2
      • Part of subcall function 028326D9: _invalid_parameter_noinfo.LIBCMT ref: 028326ED
    • _errno.LIBCMT ref: 02827C8E
    • _invalid_parameter_noinfo.LIBCMT ref: 02827C99
    • _getbuf.LIBCMT ref: 02827CCD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno_getbuf
    • String ID: @
    • API String ID: 3036866907-2766056989
    • Opcode ID: 6e7c207d42a18353b67d0f256d14af4aa84329ee3b20535ed05c0923c9c5ad37
    • Instruction ID: e8a42c229d1d221d948a974ee31f859f6ba75a6f16a654274b2972be0f4eb040
    • Opcode Fuzzy Hash: 6e7c207d42a18353b67d0f256d14af4aa84329ee3b20535ed05c0923c9c5ad37
    • Instruction Fuzzy Hash: 4931B83C124A688EF75D9F3D84C933476D1FB55329F68229CD85ACA1D6D73884CAC681
    APIs
    • _fileno.LIBCMT ref: 02878154
      • Part of subcall function 02882C08: _errno.LIBCMT ref: 02882C11
      • Part of subcall function 02882C08: _invalid_parameter_noinfo.LIBCMT ref: 02882C1C
    • _errno.LIBCMT ref: 028781BD
    • _invalid_parameter_noinfo.LIBCMT ref: 028781C8
    • _getbuf.LIBCMT ref: 028781FC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno_getbuf
    • String ID: @
    • API String ID: 3036866907-2766056989
    • Opcode ID: 8d7ce136ce8f7f1f231367dd9a059eef84ecd512c068b24ec2d55b06d3899124
    • Instruction ID: 8097c5a3439ccbaf33365068ebb2830583f5a1dc428cca4a09967e78fe5ae2ee
    • Opcode Fuzzy Hash: 8d7ce136ce8f7f1f231367dd9a059eef84ecd512c068b24ec2d55b06d3899124
    • Instruction Fuzzy Hash: A531D66F610F8885DF298F38D84C3382751E751BBDF599601CE2E862E5CB78C891D7A1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$ExceptionRaise_amsg_exit
    • String ID: csm
    • API String ID: 4155239085-1018135373
    • Opcode ID: df9b9db6a6bbbd15e90c5ace666b783b32aabbdd6a22e9d59f25dd2b1799e60b
    • Instruction ID: 5bf61277dddad2911320426b7df4329e414b556101d3732f1871dd7b2a515193
    • Opcode Fuzzy Hash: df9b9db6a6bbbd15e90c5ace666b783b32aabbdd6a22e9d59f25dd2b1799e60b
    • Instruction Fuzzy Hash: 6821083E204641C6DB30DF16E04475EB365F799BA9F494226DFAE43B94CB39D886CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$ExceptionRaise_amsg_exit
    • String ID: csm
    • API String ID: 4155239085-1018135373
    • Opcode ID: 9353493ea25706b6dc90e2ff27a29bc00a94e76970d53f38476d2ffead27e1f6
    • Instruction ID: c1f159a4b34e232e5025b1dbe04ad16c91507f80567e6f188e6681e3470b123f
    • Opcode Fuzzy Hash: 9353493ea25706b6dc90e2ff27a29bc00a94e76970d53f38476d2ffead27e1f6
    • Instruction Fuzzy Hash: 1D316C36608642E6E7709B21A00536E7376FB887A5F409375DE9E4B786CF3DE842CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseDeleteOpenValue
    • String ID: Console$IpDatespecial
    • API String ID: 849931509-1840232981
    • Opcode ID: b025ef4eb51c44f48957f4b35409c7e843425d9afe9ad078bec9dd5431dc71bf
    • Instruction ID: 308dc3c91116c7492f213ba2ecb9d49b788b49afd93b604f96d896bc441f6669
    • Opcode Fuzzy Hash: b025ef4eb51c44f48957f4b35409c7e843425d9afe9ad078bec9dd5431dc71bf
    • Instruction Fuzzy Hash: 23F05E3A711A85CAEB21DB65F808B997360F754BADF808112CE5D13A98DF38C1CAC740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$__free_lconv_num
    • String ID:
    • API String ID: 1547021563-0
    • Opcode ID: 0972748b3299ccda1293d1965588bd6f12e48a98b94eb4eeacb18aa3f4afee27
    • Instruction ID: f31297955a24ae27e0ba51d0729342196f0b2838fe96ade485ea7c278a0f2457
    • Opcode Fuzzy Hash: 0972748b3299ccda1293d1965588bd6f12e48a98b94eb4eeacb18aa3f4afee27
    • Instruction Fuzzy Hash: C451913E311B848ADB24EF26E4407AA77A6F784B88F854526DE9E87715DF3CC152C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2808128820-0
    • Opcode ID: 9441f5ab7ec443429837251121a8f35dc82b3e26f8158eac5b6752c49b38b939
    • Instruction ID: d71fd12de8fdd85ed011040b809df055409fb06f7b39641ea3cab01b84055f3d
    • Opcode Fuzzy Hash: 9441f5ab7ec443429837251121a8f35dc82b3e26f8158eac5b6752c49b38b939
    • Instruction Fuzzy Hash: C141E23C619A1C4FE758EB2C9890B7933D2FBA8314F14416DDC4EC3295DB249C8A8B93
    APIs
    • _fileno.LIBCMT ref: 0282C3A6
      • Part of subcall function 028326D9: _errno.LIBCMT ref: 028326E2
      • Part of subcall function 028326D9: _invalid_parameter_noinfo.LIBCMT ref: 028326ED
    • _errno.LIBCMT ref: 0282C3B6
    • _errno.LIBCMT ref: 0282C3D2
    • _isatty.LIBCMT ref: 0282C433
    • _getbuf.LIBCMT ref: 0282C43F
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: 3a1171754d4b4170047c6cc9e54148eef069f994d9e669cb0a89bd27f0e9310b
    • Instruction ID: f8c1bc91ed90ed3b532f907deefefd78a838b3952cb80c6a80ca58d9520863de
    • Opcode Fuzzy Hash: 3a1171754d4b4170047c6cc9e54148eef069f994d9e669cb0a89bd27f0e9310b
    • Instruction Fuzzy Hash: F841D03D114A284FCB58EF2CC49573A77E1FB48310B59469AD85ACB29AD774C8C5CBC2
    APIs
    • _fileno.LIBCMT ref: 0287C8D5
      • Part of subcall function 02882C08: _errno.LIBCMT ref: 02882C11
      • Part of subcall function 02882C08: _invalid_parameter_noinfo.LIBCMT ref: 02882C1C
    • _errno.LIBCMT ref: 0287C8E5
    • _errno.LIBCMT ref: 0287C901
    • _isatty.LIBCMT ref: 0287C962
    • _getbuf.LIBCMT ref: 0287C96E
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: 381ea5d0cd2b533c0e117cf2450131a3f5c5659705f4c7803b8e4f8ae10362d7
    • Instruction ID: cecd8112a40f7311b00cee71936977f80b2453d5fe4f1e60b1a682f907dbac1a
    • Opcode Fuzzy Hash: 381ea5d0cd2b533c0e117cf2450131a3f5c5659705f4c7803b8e4f8ae10362d7
    • Instruction Fuzzy Hash: 1F41D27E610B448ADB589F2DD45032D7761E784FA9F184217CBAAC73D5EB38C491CB81
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: 4f60cfe29fde747d4f6edf3b98704d3458481cfd96a237e93bfce69436bb82ae
    • Instruction ID: 1d3cd0e2d56722ebaee240e48c7ee3358cd8d42bd75b52cd6dc5fb2bc8081fa8
    • Opcode Fuzzy Hash: 4f60cfe29fde747d4f6edf3b98704d3458481cfd96a237e93bfce69436bb82ae
    • Instruction Fuzzy Hash: E141A062A1C606D6EB549F28D45127836B3EB44B54F142339DA6F8B3D7EE2CE851C7C0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID: Main
    • API String ID: 1452528299-521822810
    • Opcode ID: 84099bf8a725d166ee20315b1c9746f156bee2e17b322136615ebfaf6b4ec049
    • Instruction ID: b0ea128494876eb17ed772ad7517543fd628b9d7a2f0e8f65f11e7c253cb4b3b
    • Opcode Fuzzy Hash: 84099bf8a725d166ee20315b1c9746f156bee2e17b322136615ebfaf6b4ec049
    • Instruction Fuzzy Hash: 32417E7AB15A54CBDB18CF15E44876973A1F748B88F488025DB8E87B48DF38D591CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLastRead$mallocrealloc
    • String ID:
    • API String ID: 3638135368-0
    • Opcode ID: 29ff069d9a5630de77bab8c1bef4471da58ecb6172fdba01688657c43c45e91a
    • Instruction ID: 0b39d5be697a08cfd606d53b4e3bb1131d6cad81df69fb73fcc7ea98a5581139
    • Opcode Fuzzy Hash: 29ff069d9a5630de77bab8c1bef4471da58ecb6172fdba01688657c43c45e91a
    • Instruction Fuzzy Hash: 16415D3E205B84C7DB209F16E4547AAB7A0FB48B99F488425DF8E87B65DF78E085C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2808128820-0
    • Opcode ID: b7a6682e71fa9ca0f23f12acf299cb83072229e033a8220aa42f242abf8997f2
    • Instruction ID: dc8bafd25c34680ddc2d0b0981ceab9af032cd83b15e4ffeca4619a51d023422
    • Opcode Fuzzy Hash: b7a6682e71fa9ca0f23f12acf299cb83072229e033a8220aa42f242abf8997f2
    • Instruction Fuzzy Hash: D9417E3E20668485EB14FF26D94476A73A3FB85BD8F488125CE5E8BB54EF78C051CB06
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWide$StringTypefreemalloc
    • String ID:
    • API String ID: 307345228-0
    • Opcode ID: bfc7af66d6703da52bfe69fa20a0ec25bf490c970911e5871b8f8c191284c125
    • Instruction ID: 42cc0eae4be88eca10a287687ed61800f704a52bd3967fa325a788e465d5e4ae
    • Opcode Fuzzy Hash: bfc7af66d6703da52bfe69fa20a0ec25bf490c970911e5871b8f8c191284c125
    • Instruction Fuzzy Hash: 77319F7F300B818ADB10AF25D8007A963A6FB58BF8F994212EE2D87BD4DF38C4018701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ByteCharMultiWide$StringTypefreemalloc
    • String ID:
    • API String ID: 307345228-0
    • Opcode ID: e70f9f49b4bf10f7c9a397bbad2514da52a9a5bda9101d0c48d23cf0e55f0220
    • Instruction ID: 4639caa978f6d947c172d87d1dd8be50de0184daecf07ea49644c7b23198041f
    • Opcode Fuzzy Hash: e70f9f49b4bf10f7c9a397bbad2514da52a9a5bda9101d0c48d23cf0e55f0220
    • Instruction Fuzzy Hash: 16419422B08741E5FB108F2598105A963BAFF84BB8F185376EE6D8B7D6DE7DD4118340
    APIs
    • malloc.LIBCMT ref: 0286C963
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • free.LIBCMT ref: 0286C98B
    • CreateDIBSection.GDI32 ref: 0286C9F7
    • free.LIBCMT ref: 0286CA16
      • Part of subcall function 0286D280: GetObjectW.GDI32 ref: 0286D2B2
    • free.LIBCMT ref: 0286CA56
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno$AllocCreateHeapObjectSection_callnewhmalloc
    • String ID:
    • API String ID: 2034203143-0
    • Opcode ID: a2d0313cfa7d0c66887be27b82d6d882aa3239715030336f8aa708ac968e3a49
    • Instruction ID: a6238720457fd5d40f4943df89c7cbaa5e4e8fd81bcfcea203e360ec334f9c3e
    • Opcode Fuzzy Hash: a2d0313cfa7d0c66887be27b82d6d882aa3239715030336f8aa708ac968e3a49
    • Instruction Fuzzy Hash: 4C31553E20568086DB15DF26D40876AF795FB88B89F8C8426DF9D97B24EF78D111C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$recv
    • String ID:
    • API String ID: 316788870-0
    • Opcode ID: 36fda355891a9b6a2a41bb1c4455046136ab9c6b80eef1ec788c7483a912b158
    • Instruction ID: 1915e7427bea3a9ea0d80bfb0c4bc3fff0e5b963026996d22bdaad459a40c38e
    • Opcode Fuzzy Hash: 36fda355891a9b6a2a41bb1c4455046136ab9c6b80eef1ec788c7483a912b158
    • Instruction Fuzzy Hash: 91316B7E204A80C6EB209F39E44836D2761F749B99F984526DF1DC7BA8DF3AC484CB11
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorLast$recv
    • String ID:
    • API String ID: 316788870-0
    • Opcode ID: e4f8957da8d65f30d38b13d09da8badb50e03e5984e11ac3259b2f877bd45eac
    • Instruction ID: 6169240e825dec2bdf5ba67e5314d18b3a85a9c84899df5f771cc1158490ae31
    • Opcode Fuzzy Hash: e4f8957da8d65f30d38b13d09da8badb50e03e5984e11ac3259b2f877bd45eac
    • Instruction Fuzzy Hash: 14419472B0CA41D5E7509F28E44436E23B2EB55B84F541639DA1ECB79ADF3DD4848B80
    APIs
    • _ctrlfp.LIBCMT ref: 0288CEA1
    • _exception_enabled.LIBCMT ref: 0288CEC4
      • Part of subcall function 0288CDA4: _set_statfp.LIBCMT ref: 0288CDCB
      • Part of subcall function 0288CDA4: _set_statfp.LIBCMT ref: 0288CE3E
    • _raise_exc.LIBCMT ref: 0288CF10
    • _ctrlfp.LIBCMT ref: 0288CF50
    • _ctrlfp.LIBCMT ref: 0288CF81
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
    • String ID:
    • API String ID: 3456427917-0
    • Opcode ID: 1aba8912174c80f48c1f205ea0e6b1cbf11b6fb09252fd53c66cda772265d1f3
    • Instruction ID: d65b62eaf6fb5588a9a54e1087b938c312005bbdce383631e2ed28a60da07a5c
    • Opcode Fuzzy Hash: 1aba8912174c80f48c1f205ea0e6b1cbf11b6fb09252fd53c66cda772265d1f3
    • Instruction Fuzzy Hash: F0315F3A614F848AD711EF29E84066FB775FB8A798F041216FE8D9BA58DF78C441CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
    • String ID:
    • API String ID: 3456427917-0
    • Opcode ID: ec85eac3057d4a959c5fd9faad8141c4a2bc6fb97e23b1e6474f11119bd41e60
    • Instruction ID: e30c48282c2324d52cd03939d9e69f09236716d92aab23ccc65df8833fe89d50
    • Opcode Fuzzy Hash: ec85eac3057d4a959c5fd9faad8141c4a2bc6fb97e23b1e6474f11119bd41e60
    • Instruction Fuzzy Hash: 5F318232B18A85D6E710DF24A4012AEB776FB89388F002335FA8D4AB5ADF3CD441CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
    • String ID:
    • API String ID: 513674450-0
    • Opcode ID: 075c36b3ca135fdc652563b5ac2541178ceec77664d81c65090f73d39e80c9e7
    • Instruction ID: 6538774c222f4918c208f67ed945d8af2ad4c2a815c106573018db78b4f6032b
    • Opcode Fuzzy Hash: 075c36b3ca135fdc652563b5ac2541178ceec77664d81c65090f73d39e80c9e7
    • Instruction Fuzzy Hash: C131583A311A959EDB24CF35E8547D933A4F74878CF888129DA5E87B48EF38D545C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$__doserrno
    • String ID:
    • API String ID: 2614100947-0
    • Opcode ID: 800d099e4cba60736708ed37c98d79b550133b1203d55932b7dfc71724dd1719
    • Instruction ID: 069ba36bdf5e9426e8ad84f07dbb254c6e5e654ee22113f1497466c53e35495c
    • Opcode Fuzzy Hash: 800d099e4cba60736708ed37c98d79b550133b1203d55932b7dfc71724dd1719
    • Instruction Fuzzy Hash: 5021383C6086448FD71AAF6CE89523D76D1EB85324F4D45ADD41AC7191CBB8C84087D6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno
    • String ID:
    • API String ID: 2918714741-0
    • Opcode ID: 56325473ece89c43913ab42bac2eec84427b1d3a9a27b51c81ea3f767b85194f
    • Instruction ID: 5093d91fe783e06af9c7e736cb9d7704f16fd3a29fd51e10eaf984aaf3d85e3e
    • Opcode Fuzzy Hash: 56325473ece89c43913ab42bac2eec84427b1d3a9a27b51c81ea3f767b85194f
    • Instruction Fuzzy Hash: DF11BE3D508B288FCB68AB6C84493247BE1FB59310F5811AAD54CC7261D7B89CCACB87
    APIs
      • Part of subcall function 0287BDC8: _amsg_exit.LIBCMT ref: 02882F66
    • DecodePointer.KERNEL32 ref: 02875B8D
    • DecodePointer.KERNEL32 ref: 02875B9D
    • EncodePointer.KERNEL32 ref: 02875C1B
      • Part of subcall function 0287AB64: realloc.LIBCMT ref: 0287AB8F
      • Part of subcall function 0287AB64: Sleep.KERNEL32 ref: 0287ABAB
    • EncodePointer.KERNEL32 ref: 02875C2B
    • EncodePointer.KERNEL32 ref: 02875C38
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Pointer$Encode$Decode$Sleep_amsg_exitrealloc
    • String ID:
    • API String ID: 1162480733-0
    • Opcode ID: 1c272021f84b2579e31e02946320267b97f2c365d49e819e98475682d178a89d
    • Instruction ID: 68ce2b19beb7eb002176ec7a6636112a219796d40766f5491fc0e80bda8f570a
    • Opcode Fuzzy Hash: 1c272021f84b2579e31e02946320267b97f2c365d49e819e98475682d178a89d
    • Instruction Fuzzy Hash: 69215B2D702B4481EB15AB62F94831AA7A6F789BC5FC4D825CE4E87B24EF7CD085C301
    APIs
    • DecodePointer.KERNEL32(?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF660909645
    • DecodePointer.KERNEL32(?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF660909655
      • Part of subcall function 00007FF66090C1B4: _errno.LIBCMT ref: 00007FF66090C1BD
      • Part of subcall function 00007FF66090C1B4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF66090C1C8
    • EncodePointer.KERNEL32(?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF6609096D3
      • Part of subcall function 00007FF66090C124: realloc.LIBCMT ref: 00007FF66090C14F
      • Part of subcall function 00007FF66090C124: Sleep.KERNEL32(?,?,00000000,00007FF6609096C3,?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF66090C16B
    • EncodePointer.KERNEL32(?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF6609096E3
    • EncodePointer.KERNEL32(?,?,00000000,00007FF660909731,?,?,?,?,00007FF6609091A3), ref: 00007FF6609096F0
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
    • String ID:
    • API String ID: 1909145217-0
    • Opcode ID: ecada074d5a0a7123039d1954c0b31d342863ec9009fb92d5d2dea83d0352a09
    • Instruction ID: 5b797107b58517406c08a7419b825bc30d4bbdcbc486bfc4002fa62d59571ca1
    • Opcode Fuzzy Hash: ecada074d5a0a7123039d1954c0b31d342863ec9009fb92d5d2dea83d0352a09
    • Instruction Fuzzy Hash: A1217121B1DA42E1EA059B11E94807A62B7FF44BC0B446A39DA1E8F767DF7CE084C380
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ObjectSelect$ColorCompatibleCreateDeleteTable
    • String ID:
    • API String ID: 3899591553-0
    • Opcode ID: aea2d29c66071ab4bceb5e6f64975c6cb6b9eb1a8a263ab540639364755b0d74
    • Instruction ID: e1802f1ffc3c68338ef65f8e38533c8c2ad06f1045fe31eddb6927655441de25
    • Opcode Fuzzy Hash: aea2d29c66071ab4bceb5e6f64975c6cb6b9eb1a8a263ab540639364755b0d74
    • Instruction Fuzzy Hash: BC117C3A301B10C9EB55DF66F498B293364FB98F98F64A025DE4A93B18CF39C485C380
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
    • String ID:
    • API String ID: 1513102227-0
    • Opcode ID: 47c32264752e366559c11a188ac99593ceaf011ed73af6a10e627e5836cbe9c1
    • Instruction ID: 0668048546b0330f15a578eff8ce86b1e23cf3f5fff0fa284a14ad2653060018
    • Opcode Fuzzy Hash: 47c32264752e366559c11a188ac99593ceaf011ed73af6a10e627e5836cbe9c1
    • Instruction Fuzzy Hash: 0E214A7E212B4481EB249B68EC5C3642364FB28B38F98C21BCA6D836E0DF798447C300
    APIs
    • OpenProcess.KERNEL32 ref: 0286A9C2
    • malloc.LIBCMT ref: 0286A9D0
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • GetCurrentProcessId.KERNEL32 ref: 0286AA07
    • free.LIBCMT ref: 0286AA23
    • CloseHandle.KERNEL32 ref: 0286AA2B
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process_errno$AllocCloseCurrentHandleHeapOpen_callnewhfreemalloc
    • String ID:
    • API String ID: 1715275611-0
    • Opcode ID: c394f2033b8ada5d2d783f5011fe782673c571999c97d0cb0aede26748a8ddc7
    • Instruction ID: 61c81f6d64ce2b04ed2a2738bbf07998fa913c4b87414347d51da79105ceb391
    • Opcode Fuzzy Hash: c394f2033b8ada5d2d783f5011fe782673c571999c97d0cb0aede26748a8ddc7
    • Instruction Fuzzy Hash: 12116D3E710A4086DB649B16E50836D6361F788B88FC88125DB9E57B59DF39C491C750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_fileno_freebuf_invalid_parameter_noinfo
    • String ID:
    • API String ID: 228234209-0
    • Opcode ID: 9b8945a01a406cd1ac831ca273cda5d643df3cbecfdeb2c523a6de6a35bb6735
    • Instruction ID: 48cb79d6444450865375cfd0681dc6d42e9e7a80a22244f8c31f2a4a2143aba1
    • Opcode Fuzzy Hash: 9b8945a01a406cd1ac831ca273cda5d643df3cbecfdeb2c523a6de6a35bb6735
    • Instruction Fuzzy Hash: A701D62D214A195EDF19ABBD449433971C2BB89378F58436C4819C71C5DA74C8C9C7E2
    APIs
    • EnterCriticalSection.KERNEL32 ref: 02865DF5
    • EnterCriticalSection.KERNEL32 ref: 02865DFF
    • LeaveCriticalSection.KERNEL32 ref: 02865E0F
    • LeaveCriticalSection.KERNEL32 ref: 02865E19
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 71fe61b111dbe12e8dda685ea8694a1dc0aa0ddfb773c4f5c26901a55c0952e0
    • Instruction ID: 6802d1c268338f8495fbee050327a94dd5ff24c86a0bae1c3dbb6c0ef1c77703
    • Opcode Fuzzy Hash: 71fe61b111dbe12e8dda685ea8694a1dc0aa0ddfb773c4f5c26901a55c0952e0
    • Instruction Fuzzy Hash: F0111C3A635A4483DBA09B65F4983AE6360F758755FC49022DBCB83A50DF3CD48AC700
    APIs
    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF660904E7E,?,?,00000000,00007FF660904E44), ref: 00007FF660905E35
    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF660904E7E,?,?,00000000,00007FF660904E44), ref: 00007FF660905E3F
    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF660904E7E,?,?,00000000,00007FF660904E44), ref: 00007FF660905E4F
    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF660904E7E,?,?,00000000,00007FF660904E44), ref: 00007FF660905E59
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: d0535108d2faffde62c4ad6e510cb9d391b63625fe126b8c96127d7e5368dc19
    • Instruction ID: 3f327e447c3cbb4ce7aedcc2fbe8a2bcef676090415a44a9ceb44f89fd5cb6eb
    • Opcode Fuzzy Hash: d0535108d2faffde62c4ad6e510cb9d391b63625fe126b8c96127d7e5368dc19
    • Instruction Fuzzy Hash: 08114C32A28945D3EB949B21F4443AA6371FB48750F446131DB8F86B61CF7CE98AC700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: fa741961b582ee7b67e6576bbdc250400e5bcedb0d675f31e0db02a7ef4224cf
    • Instruction ID: 8955683bd4fca0f8e42517874d0664780039ccec76d4f45ab0d522b009031c9c
    • Opcode Fuzzy Hash: fa741961b582ee7b67e6576bbdc250400e5bcedb0d675f31e0db02a7ef4224cf
    • Instruction Fuzzy Hash: 98F0287D12485C4EE70EAB28C984368B7D3FF0232AF894288C405CB1E0C7BC9C848A92
    APIs
    • GetSystemTimeAsFileTime.KERNEL32 ref: 028827CB
    • GetCurrentProcessId.KERNEL32 ref: 028827D6
    • GetCurrentThreadId.KERNEL32 ref: 028827E2
    • GetTickCount.KERNEL32 ref: 028827EE
    • QueryPerformanceCounter.KERNEL32 ref: 028827FF
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: be49b71be2468d602ce2b86d554d21e0fe8525651c21df714ca60d01e100c69a
    • Instruction ID: a277209362d834b3222214212227a1226167ea3fdce691efd7360fa4d68fce62
    • Opcode Fuzzy Hash: be49b71be2468d602ce2b86d554d21e0fe8525651c21df714ca60d01e100c69a
    • Instruction Fuzzy Hash: F5015229226B4582EB90CF21F84935573A0F75DFA0F98A621EE5E47B64DF3CC9958700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 98e16b1ec0ad293c89ca25142769c411a4e3d743e8d3f271fefc4cf6040d5f50
    • Instruction ID: 6d0a262e305f0d5b575583ea19b6d7e57d82bc17ccd8e5a97b13d43cb10bfa96
    • Opcode Fuzzy Hash: 98e16b1ec0ad293c89ca25142769c411a4e3d743e8d3f271fefc4cf6040d5f50
    • Instruction Fuzzy Hash: DC015B31B1DA01E2EB418F21E944266637AFB49B90F443B70EE5E8B7A5DF7CD9958300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 9c05f4c1c36c7b5831c53dd5cc1829f6975137ad5d23c81940f0ce13bd6f0dca
    • Instruction ID: 02b0cbb86b5e0d3a49099b2b31324e9fddf79dc44e240fd3baddf38a2300fa79
    • Opcode Fuzzy Hash: 9c05f4c1c36c7b5831c53dd5cc1829f6975137ad5d23c81940f0ce13bd6f0dca
    • Instruction Fuzzy Hash: 9DF0626EA1264C86EF057B19C88032C76529B50B79FDD8715CA3E8A3E1CB7C84418B12
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: b2568e6a52513f616cc9bf7babecad4815ad7cdb92447009d9c431ea0fd75076
    • Instruction ID: ef7990b58df4f96e35dade4d24d0215973d245a03a12db98feda6138efbfcca7
    • Opcode Fuzzy Hash: b2568e6a52513f616cc9bf7babecad4815ad7cdb92447009d9c431ea0fd75076
    • Instruction Fuzzy Hash: 6C01AD62F1C646E5FB056B14888137C21739F90B25F616379D52E8E3E3CFAE60508A50
    APIs
    • WaitForSingleObject.KERNEL32 ref: 028658B0
    • WaitForSingleObject.KERNEL32 ref: 028658C0
    • Sleep.KERNEL32 ref: 028658CB
    • CloseHandle.KERNEL32 ref: 028658EA
    • CloseHandle.KERNEL32 ref: 028658F7
      • Part of subcall function 02864D20: GetCurrentThreadId.KERNEL32 ref: 02864D2D
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleObjectSingleWait$CurrentSleepThread
    • String ID:
    • API String ID: 570250148-0
    • Opcode ID: decc56ae74fd69e27b6cea45ca757f20852d30087eeae71558a9b79a526937d1
    • Instruction ID: de1997cabb5e85b9069a1595170124bd6edc2deb2e1a2b7b56ca00c886bcf6cc
    • Opcode Fuzzy Hash: decc56ae74fd69e27b6cea45ca757f20852d30087eeae71558a9b79a526937d1
    • Instruction Fuzzy Hash: EDF01D3E211A84C2E7059F7AEC193283320F799F59F98C221CF2A477A5CF388885C350
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandleObjectSingleWait$CurrentSleepThread
    • String ID:
    • API String ID: 570250148-0
    • Opcode ID: 892c36502c9aa2b1c275c7a3c19491e1c66a3c365f8122baa1cd80770b25c1c6
    • Instruction ID: 8cf47be57414ef9485e9195b4d587c06c699c41f5823140566f14cb60d428c72
    • Opcode Fuzzy Hash: 892c36502c9aa2b1c275c7a3c19491e1c66a3c365f8122baa1cd80770b25c1c6
    • Instruction Fuzzy Hash: 0CF04472604949D2F705DF31E8141793335FB88F65F181330CD2E8A395CF7898899350
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EnumErrorEventEventsLastNetworkReset
    • String ID:
    • API String ID: 1050048411-3916222277
    • Opcode ID: bae50107dfc8bbf13130f036befb9453e5ae5370985c1f6d570d448442856cd2
    • Instruction ID: ce376781aaf52a6fd31b59362999aeaf610fc17bcf940175beebf8fc166ba6dd
    • Opcode Fuzzy Hash: bae50107dfc8bbf13130f036befb9453e5ae5370985c1f6d570d448442856cd2
    • Instruction Fuzzy Hash: 0B41657E2046888BE334CF29E40832E77E2F785B8CF550114CA9DC7759EBBAC9498B40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: EnumErrorEventEventsLastNetworkReset
    • String ID:
    • API String ID: 1050048411-3916222277
    • Opcode ID: 828e8a55efaf8f4e93ed5acb76a083e09fbb0b5487182bc448ae793a037f2d46
    • Instruction ID: bc575ab9b18d767719af5dadbaf1cacab486f84b6322ed8dd3bcc346bd20fae5
    • Opcode Fuzzy Hash: 828e8a55efaf8f4e93ed5acb76a083e09fbb0b5487182bc448ae793a037f2d46
    • Instruction Fuzzy Hash: 73519EB290C642D6E7208F25940432A73F6EB95B48F155239DE4E8B39ADF7DE8458F80
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: 745c27bf58ce9136a60d1a91a6c4d13b24bddf59c14694e7ed41f0101153d043
    • Instruction ID: a741265d0b60a2e3b5a25005fcf87bfec38cd020c0f195281b4cae9bd3d47eb0
    • Opcode Fuzzy Hash: 745c27bf58ce9136a60d1a91a6c4d13b24bddf59c14694e7ed41f0101153d043
    • Instruction Fuzzy Hash: 59314C7C118B148FDB28EF1CD491B69B3E1FB58311F44066DD48AC7651D731B88ACB96
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_fltout2_invalid_parameter_noinfo
    • String ID: -
    • API String ID: 485257318-2547889144
    • Opcode ID: 463438e0c886120289d20cd45b1c6b5be8d0021f23f58bee05a5ba304ed753cf
    • Instruction ID: b86c674e7ff2fb15200d4df8011a1e2cf397caf50525893af0dbac5e5a149436
    • Opcode Fuzzy Hash: 463438e0c886120289d20cd45b1c6b5be8d0021f23f58bee05a5ba304ed753cf
    • Instruction Fuzzy Hash: D931F56E304A8486DB24EF29E84075AB7A1BB45BE8F544213DE9C87BD9DF3DC485CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_fltout2_invalid_parameter_noinfo
    • String ID: -
    • API String ID: 485257318-2547889144
    • Opcode ID: 618538ce884b31deba6e1646cd0d9800068b1e888b6e4428242c9665014ee262
    • Instruction ID: fb822ce8b0657554cf233f674381ab29b755c440048b2493b8d5c342933565be
    • Opcode Fuzzy Hash: 618538ce884b31deba6e1646cd0d9800068b1e888b6e4428242c9665014ee262
    • Instruction Fuzzy Hash: D531082270C681D1EA21AE21A4003AAB776AB567D4F146371EF9D8BBC6DE3CD805CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID: 1
    • API String ID: 2819658684-2212294583
    • Opcode ID: da590a33fde7f73029e2fedf7efd99da0c6cb8fba08786571a8317b2cb5ff795
    • Instruction ID: 12f8a40c9234ffe8ff9a70c7a84099fe2af6a510608ca4bb9794228fe37d449c
    • Opcode Fuzzy Hash: da590a33fde7f73029e2fedf7efd99da0c6cb8fba08786571a8317b2cb5ff795
    • Instruction Fuzzy Hash: 4711272E21D6C495DB1FAF3889503286B55E741748F8AC053875AD7783E73DC950C712
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID: 1
    • API String ID: 2819658684-2212294583
    • Opcode ID: c24aa144a5a2c35a8fdb484c0746f0b94e6cfc09c221b34de806f61d68da000b
    • Instruction ID: 05bc108a8dffcce97b5238e234f37e817f18df7aa86e9b5f1402b499b5927c25
    • Opcode Fuzzy Hash: c24aa144a5a2c35a8fdb484c0746f0b94e6cfc09c221b34de806f61d68da000b
    • Instruction Fuzzy Hash: 1721FB12B1D6C2E5F7169F24841027C5ABA9F4A78CF55E2B1D64A8E3D3DE2E9801CF10
    APIs
    • _callnewh.LIBCMT ref: 02875606
    • malloc.LIBCMT ref: 02875612
      • Part of subcall function 02875540: _FF_MSGBANNER.LIBCMT ref: 02875570
      • Part of subcall function 02875540: HeapAlloc.KERNEL32 ref: 02875595
      • Part of subcall function 02875540: _callnewh.LIBCMT ref: 028755AE
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755B9
      • Part of subcall function 02875540: _errno.LIBCMT ref: 028755C4
    • std::exception::exception.LIBCMT ref: 0287567F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
    • String ID: bad allocation
    • API String ID: 2837191506-2104205924
    • Opcode ID: 40a2d582bb1ecb2220c378ddd3ce206ee5079f0b2690b48e48e38b89efa330d8
    • Instruction ID: 6843cbbe27a9c08c66902a5fc21897539eefe50ed06f37a371245a9d3b931b70
    • Opcode Fuzzy Hash: 40a2d582bb1ecb2220c378ddd3ce206ee5079f0b2690b48e48e38b89efa330d8
    • Instruction Fuzzy Hash: 7B015A6D21270591FF20EF18F8443642361F744384FC88526CE8E86A62EF7CC288CB02
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 1646373207-1276376045
    • Opcode ID: 6f0d2907b1ebdc80269f3466a428568ae1999691cd8246c2ae25d5ed097e1493
    • Instruction ID: 3b80ec078dd180cab58184b0fbd69e1021bfd88e6a4ddfdeb1ddac11e685729a
    • Opcode Fuzzy Hash: 6f0d2907b1ebdc80269f3466a428568ae1999691cd8246c2ae25d5ed097e1493
    • Instruction Fuzzy Hash: D3D05E1D74370082EF1AAFA0F8883B813525BA8718FDC5029891E46350FF2CD6C9C300
    APIs
    • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FF660909F69,?,?,00000028,00007FF6609090B9,?,?,4E00000000000000,00007FF66090C050,?,?,ceil,00007FF66090D951), ref: 00007FF660909F2F
    • GetProcAddress.KERNEL32(?,?,000000FF,00007FF660909F69,?,?,00000028,00007FF6609090B9,?,?,4E00000000000000,00007FF66090C050,?,?,ceil,00007FF66090D951), ref: 00007FF660909F44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 1646373207-1276376045
    • Opcode ID: 8532fc609fad59ffe6e62cafeae73a037ed505a12b62afac9e0faec1dfd416e1
    • Instruction ID: e95aafddca8d188f4e6f6c76cab8f5e4e98c199c005da81ee7a66614e8ca4365
    • Opcode Fuzzy Hash: 8532fc609fad59ffe6e62cafeae73a037ed505a12b62afac9e0faec1dfd416e1
    • Instruction Fuzzy Hash: 95E01210F1D703E1FE1D5B90A85413522B7AF48741B4875BDD51ECE392EEBCA9499340
    APIs
      • Part of subcall function 0287AA60: malloc.LIBCMT ref: 0287AA8B
      • Part of subcall function 0287AA60: Sleep.KERNEL32 ref: 0287AA9E
    • free.LIBCMT ref: 0287B054
    • free.LIBCMT ref: 0287B070
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$Sleepmalloc
    • String ID:
    • API String ID: 1995388493-0
    • Opcode ID: 6bf55eee69ab9036b927e96da7cfe64225efdf1552398c5a6e05237ef784cdb0
    • Instruction ID: 07d9e2d4b41145476b0bc3aa2d7500754ced85c44b3d7043f766d84f0cb4b863
    • Opcode Fuzzy Hash: 6bf55eee69ab9036b927e96da7cfe64225efdf1552398c5a6e05237ef784cdb0
    • Instruction Fuzzy Hash: 0E41983A301B4497DB14DF2AE99035A73A5F784B98F888525CF5D83B20EF38D561C741
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$Heap$FreeProcess
    • String ID:
    • API String ID: 3493288988-0
    • Opcode ID: 750bef86013f7828302a439500eeb8c2bf117d80014398df721acf859931a48d
    • Instruction ID: 96666d5527eb1eb35e6ef3c8f21d28ec45de1e54cb65bf29c9f7d962b3278fad
    • Opcode Fuzzy Hash: 750bef86013f7828302a439500eeb8c2bf117d80014398df721acf859931a48d
    • Instruction Fuzzy Hash: 5431342A711A5093DB28DB6AE5447696361FB88F94F888121DF9E93F14DF38D4A2CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: 97ec92455e3c7918d41b8261675ed43ac07a1cfb8a1a9c8953e80a2ad2af7bba
    • Instruction ID: 68546701c7f39253f40d2086b9673ba1819382778b38b487004022661d769d5d
    • Opcode Fuzzy Hash: 97ec92455e3c7918d41b8261675ed43ac07a1cfb8a1a9c8953e80a2ad2af7bba
    • Instruction Fuzzy Hash: 63512C7E9086398BEB38252DD84637632CDFB41764F64526ADD9BC7190F760C4DE42C2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: babcbb0527e906c5f606c468c7be68239314e6d00d1a24a3f123e2f318ae27e5
    • Instruction ID: 5d4d2dc6d85106063c2d8c01c31cdf900b2b6ddedde0aab7f0bbb3aad3774a62
    • Opcode Fuzzy Hash: babcbb0527e906c5f606c468c7be68239314e6d00d1a24a3f123e2f318ae27e5
    • Instruction Fuzzy Hash: B341336FA0052184EF345A3ECC4177EA186BB40BACF598522DEA9C7584F778C482C753
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: 94b972fa06678f78d860e6f5b723ba573def77772fbd1e0a4943df1ed3bb4a81
    • Instruction ID: 50af0d63a92f60febdcde5a85bfcf082dd5bf74e08a18e71f68878ce4fc6310f
    • Opcode Fuzzy Hash: 94b972fa06678f78d860e6f5b723ba573def77772fbd1e0a4943df1ed3bb4a81
    • Instruction Fuzzy Hash: CE51BF93D0C153E4FBB45729D80137A21E3AF40B54F146B39DA5BCA7C3EE2CAC8192A1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
    • String ID:
    • API String ID: 27599310-0
    • Opcode ID: e43bc938b8dff1f3acc60e90529e3d7fb630203bf193b243dbf91122d21e0fda
    • Instruction ID: 3145355e7bdf742177ef1e4461df3ef00c232571c64ac41ed06d17e94c63860e
    • Opcode Fuzzy Hash: e43bc938b8dff1f3acc60e90529e3d7fb630203bf193b243dbf91122d21e0fda
    • Instruction Fuzzy Hash: BB517B3EA05B4486EA29DF2DE88833A66A2F7C57D8F58851BDA5EC7714DF38C481C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
    • String ID:
    • API String ID: 27599310-0
    • Opcode ID: 2e1f47d07c568a67316eefeacd6411d58cf0c130c40cf9c6aca4e33faf3add32
    • Instruction ID: 028328173c34405a344d3a178578b7b159ceb31464def7678187535617180ff1
    • Opcode Fuzzy Hash: 2e1f47d07c568a67316eefeacd6411d58cf0c130c40cf9c6aca4e33faf3add32
    • Instruction Fuzzy Hash: A3516E32F0C642E6E6698B15A54023A62B3EF85750F156739D9AF8A796CF3CE841C2C0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BaseImage
    • String ID:
    • API String ID: 2482573191-0
    • Opcode ID: 04e4ddb59326ee2f6fd00dd5a9e934302c90db7294c98b3c1bfd7684be65c82c
    • Instruction ID: 362e0d503147d9eb3018ba0648ce11e8ba37fe06b4240ed739c45fe99dd8a9ed
    • Opcode Fuzzy Hash: 04e4ddb59326ee2f6fd00dd5a9e934302c90db7294c98b3c1bfd7684be65c82c
    • Instruction Fuzzy Hash: 6141293D214A244ED7187B3CC4056B932D2FB84324F24826ED44BC72A9DB74E8CA8A93
    APIs
      • Part of subcall function 02875D58: _getptd.LIBCMT ref: 02875D6A
    • _errno.LIBCMT ref: 0288A32E
    • _invalid_parameter_noinfo.LIBCMT ref: 0288A338
    • _errno.LIBCMT ref: 0288A35C
    • _invalid_parameter_noinfo.LIBCMT ref: 0288A366
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_getptd
    • String ID:
    • API String ID: 1297830140-0
    • Opcode ID: e0e4d029bbe353f1d1e69cf3c42486e835b68d278d4763bb0573f745e1b83faf
    • Instruction ID: daf870bd07ee08e07ddcbd3ebe5e510e024cc9f5a7694a2b7ba13b73739ec93c
    • Opcode Fuzzy Hash: e0e4d029bbe353f1d1e69cf3c42486e835b68d278d4763bb0573f745e1b83faf
    • Instruction Fuzzy Hash: BA41033E215B84CADB25EF29D58436E7BA1F784BD0F488126DB8E87B95DB78C045CB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_getptd
    • String ID:
    • API String ID: 1297830140-0
    • Opcode ID: 9ca92d5bb05e79156cbab85d98cd5049689c098bd46746ebc4bd1871a1c2f17d
    • Instruction ID: 0c40a6a376257822e2a9277c1f9b16610b9de22ff5b65e1c20109b5f3be35c4e
    • Opcode Fuzzy Hash: 9ca92d5bb05e79156cbab85d98cd5049689c098bd46746ebc4bd1871a1c2f17d
    • Instruction Fuzzy Hash: 8C41BD22B0C782D6E751EB19C18426977B6EB45BD0F046275DA8E8BB93CF3CE855C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 7be2ae340f5959406522c893d974e7f2dc4a3aef0f5b2582e14843318c479f82
    • Instruction ID: 6214d2552fd80a78885068835021e73eb46a2b91156b208792aa45ed79035f9a
    • Opcode Fuzzy Hash: 7be2ae340f5959406522c893d974e7f2dc4a3aef0f5b2582e14843318c479f82
    • Instruction Fuzzy Hash: CC312B2C618E894BD70E5A2C948833977C1FB6A305F6812BEE58BC7253D9A18C458795
    APIs
      • Part of subcall function 028777F4: _getptd.LIBCMT ref: 028777F8
    • _getptd.LIBCMT ref: 02878F2B
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    • _SetImageBase.LIBCMT ref: 02878FFE
    • _getptd.LIBCMT ref: 0287902C
    • _getptd.LIBCMT ref: 0287903A
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BaseImage_amsg_exit
    • String ID:
    • API String ID: 2306399499-0
    • Opcode ID: 6bb4dafc34791a121fa802b960719f731f4456cd93f40c562d83455e5897cc48
    • Instruction ID: 4ab0909682a101cca75a8d1f9436a897a20f91a0bb72aa04460b7d6671acbdd1
    • Opcode Fuzzy Hash: 6bb4dafc34791a121fa802b960719f731f4456cd93f40c562d83455e5897cc48
    • Instruction Fuzzy Hash: 2D31B53E61068986CE20E72DD984A6DA7A2BB84FDDF558561CE1DC3760CB38C087DB02
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd$BaseImage_amsg_exit
    • String ID:
    • API String ID: 2306399499-0
    • Opcode ID: b5c06598e24a17d2af3d260348e39d1b732e80aecbaef9a16b5b1eba258a06ea
    • Instruction ID: 6919f9c5987c5efd52f654ddac1a6edc457adabd1cf07f8681636c8329602416
    • Opcode Fuzzy Hash: b5c06598e24a17d2af3d260348e39d1b732e80aecbaef9a16b5b1eba258a06ea
    • Instruction Fuzzy Hash: 2941B722B09543E1EA20A725D4411BD6ABAAF46B94F55D771DA1D8B7E3CE3CE5428200
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 4053972703-0
    • Opcode ID: 7481bf8148e7d156cf8c311b37150eb594a00842ee05393b003d335b8423385e
    • Instruction ID: 8f49919767d401af60aacf166e488ac77e8b4ed7152733a93137104d0898e000
    • Opcode Fuzzy Hash: 7481bf8148e7d156cf8c311b37150eb594a00842ee05393b003d335b8423385e
    • Instruction Fuzzy Hash: 4021B738208F194FD758FFAC985963A77D6FB98311F00062E984DC3261DB64D8848B83
    APIs
    Strings
    • |p1:156.224.26.128|o1:6666|t1:1|p2:156.224.26.128|o2:8888|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:, xrefs: 00007FF6609072E6
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: lstrlen
    • String ID: |p1:156.224.26.128|o1:6666|t1:1|p2:156.224.26.128|o2:8888|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:
    • API String ID: 1659193697-3454465827
    • Opcode ID: 32b2e33b096677a599e1476ba1b417f22cd16269792abd837077c77c15f759a6
    • Instruction ID: b7847cc7ec11a27f204aac4c55c9ce1091d4770db5ee45205036b844def85652
    • Opcode Fuzzy Hash: 32b2e33b096677a599e1476ba1b417f22cd16269792abd837077c77c15f759a6
    • Instruction Fuzzy Hash: 1C310B21E0C656E5FA28CB11B8441BAB3B6FF88B94B04A238DD4F8A756DE7CE541D340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
    • String ID:
    • API String ID: 420147892-0
    • Opcode ID: 02b47b998f259fe205a3e2606ef92517168e540379220ccbf34bb92ef0d7b66a
    • Instruction ID: 34063473f2b79b9b8b4e337579f8eb3e8535e05e2b256f537339a3aa4555ca5f
    • Opcode Fuzzy Hash: 02b47b998f259fe205a3e2606ef92517168e540379220ccbf34bb92ef0d7b66a
    • Instruction Fuzzy Hash: 3731703E604A4582EF28CB29E45837A77A1FB88BA9F558229CE6E93754DF39C045C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 5dd80c5444172ec862273a62d1640867b1ef54dd1b25e438c22e6a4ff87602e9
    • Instruction ID: 8a6a507c1057c7bcef86bb8c43e16d7b0bf18eb3adc894430d0038d4c53a40e4
    • Opcode Fuzzy Hash: 5dd80c5444172ec862273a62d1640867b1ef54dd1b25e438c22e6a4ff87602e9
    • Instruction Fuzzy Hash: 23215B7E7083C88AD704FA79D95035E7B62E765784FD88422CB46C7742E779C845CB11
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorEventLastSelect
    • String ID:
    • API String ID: 1135597009-0
    • Opcode ID: cb030ebd4eb2ee841ca7b97a548f52db33a60d32a92dd19741f3f7cea45038d6
    • Instruction ID: 48efe3ef6585e1225ce0db8a8ec527fe05b0514089a6090ea4b84eaa142ef378
    • Opcode Fuzzy Hash: cb030ebd4eb2ee841ca7b97a548f52db33a60d32a92dd19741f3f7cea45038d6
    • Instruction Fuzzy Hash: 35218EBA60068087E750DF7AD44836D37A2E798B58FA44124CB1CCBB94DF7AC4C6CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ErrorEventLastSelect
    • String ID:
    • API String ID: 1135597009-0
    • Opcode ID: 0be878fb768bf08b0c5fb6e885e8fe2ab6ec24c45cef932c45ab1ad02d861857
    • Instruction ID: e3ac108ed152b0cf2761d5dd5b50a9bc7a433260cb32ae6372cddc290eccfb75
    • Opcode Fuzzy Hash: 0be878fb768bf08b0c5fb6e885e8fe2ab6ec24c45cef932c45ab1ad02d861857
    • Instruction Fuzzy Hash: D521CCB2A08141C6E700CF3AD44836A33A2FB54B58F545238DA2DCB7D2DF79D886CB50
    APIs
    • EnterCriticalSection.KERNEL32 ref: 0286506C
    • LeaveCriticalSection.KERNEL32 ref: 02865085
    • LeaveCriticalSection.KERNEL32 ref: 02865105
    • SetEvent.KERNEL32 ref: 02865125
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterEvent
    • String ID:
    • API String ID: 3394196147-0
    • Opcode ID: b017e7a6f2334ba3780cffc380c5b460edc1420cb3fde9e064e142419b43089a
    • Instruction ID: ac6c818d45d75b1a7f8e90ebf88fe2e0cb05df0ddea1fc1ed2786d4329b44b67
    • Opcode Fuzzy Hash: b017e7a6f2334ba3780cffc380c5b460edc1420cb3fde9e064e142419b43089a
    • Instruction Fuzzy Hash: 1B21193A314B8593D758CF26E5843ADB364F748B94F948125DBAE83725DF38E4A1C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterEvent
    • String ID:
    • API String ID: 3394196147-0
    • Opcode ID: 03f9e94784ee446fcc446a6b9a97075121abf68d5be1871662565671ac975166
    • Instruction ID: 1b6d238c0285249c3909c43beb0497a818d7363579c47e896dab05b91b26b7cf
    • Opcode Fuzzy Hash: 03f9e94784ee446fcc446a6b9a97075121abf68d5be1871662565671ac975166
    • Instruction Fuzzy Hash: 6C212832708B85E2D698CB16E5802AAB3B5FB48B80F545135DB6E87721CF38E9A1C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalDeleteSection$Freefree
    • String ID:
    • API String ID: 1250194111-0
    • Opcode ID: 89630a747caf77da89942a637bcf9e37fff0976dd385492cd44139862e950a8a
    • Instruction ID: bc568f018c3afe8ff4ad874af25ae4414a9e690d192d778adb801631a38581bf
    • Opcode Fuzzy Hash: 89630a747caf77da89942a637bcf9e37fff0976dd385492cd44139862e950a8a
    • Instruction Fuzzy Hash: 07118E3EA01A80C7EB18EF15F8543687760FB44BA4F9C8612DA5A47669DF38C091CB54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
    • String ID:
    • API String ID: 594724896-0
    • Opcode ID: 2aa86dbb0ad97149f4f98bbfb16fd49b6472e5e52c6ca9ac48a45b795c7c226e
    • Instruction ID: 1c1f2bc7aeb2cfbad3d8f02d02daeba8fe9d6dcee3a4b4537e28f7ad5d1ae43f
    • Opcode Fuzzy Hash: 2aa86dbb0ad97149f4f98bbfb16fd49b6472e5e52c6ca9ac48a45b795c7c226e
    • Instruction Fuzzy Hash: 7A11823E61168082E710EB19E88832DBB61F7C4B58F558216CF5E83778CF39C4A2CB15
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit$_getptd_lockfree
    • String ID:
    • API String ID: 2148533958-0
    • Opcode ID: 41950d0d650662fb9ca318be262181bdb2ba838ad8e8b222847fcf64ff023056
    • Instruction ID: 6b9ee42c39dc67f366a190e9cb278be2d7c8cf108d1123b7121c7431f423316e
    • Opcode Fuzzy Hash: 41950d0d650662fb9ca318be262181bdb2ba838ad8e8b222847fcf64ff023056
    • Instruction Fuzzy Hash: EF112E3E226A8086DBA49F29E8847A97761F788B84F4C4067DE4E43759DF28D4A0C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
    • String ID:
    • API String ID: 594724896-0
    • Opcode ID: 78db43efc7c8f8b6f2111a7d5b2742e6ce96985b6946986547e2f26360c46e23
    • Instruction ID: b61e21d2a68d9e9a01e7de6c1a5e8731817312badec21ffeeca80e5032016d53
    • Opcode Fuzzy Hash: 78db43efc7c8f8b6f2111a7d5b2742e6ce96985b6946986547e2f26360c46e23
    • Instruction Fuzzy Hash: 6D117C25A18602E2E7149B19E48037C7376FB84B44F50A375DAAECB3A6CF3DE552C604
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit$_getptd_lockfree
    • String ID:
    • API String ID: 2148533958-0
    • Opcode ID: 7d7c657d20a7dd2b4e75e9e7dc412b9cbf1c6d67fe2fb29e532279fb9e9c9193
    • Instruction ID: a870b049998a7090e9db348cb6aac20f03aa8e01053b5d711002efdb06bbbfaf
    • Opcode Fuzzy Hash: 7d7c657d20a7dd2b4e75e9e7dc412b9cbf1c6d67fe2fb29e532279fb9e9c9193
    • Instruction Fuzzy Hash: DB113D22B1D642E2EB949B10E44077973B6FB44B40F486239DA5F8B797DF2CE450C780
    APIs
    • FlsFree.KERNEL32(?,?,?,?,00007FF66090BC45,?,?,00000000,00007FF660909984), ref: 00007FF66090B8DF
    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66090BC45), ref: 00007FF66090D883
    • free.LIBCMT ref: 00007FF66090D88C
    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66090BC45), ref: 00007FF66090D8B3
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CriticalDeleteSection$Freefree
    • String ID:
    • API String ID: 1250194111-0
    • Opcode ID: c67542cc3d2d698b88e45379a5442c15c18af80ec950ad7c34deb963a0871383
    • Instruction ID: e3c2f9e75684256c545ad26b011677d88d8b1264e33c2a98102163e942f50a13
    • Opcode Fuzzy Hash: c67542cc3d2d698b88e45379a5442c15c18af80ec950ad7c34deb963a0871383
    • Instruction Fuzzy Hash: 31119031E0DA41E6FA158F11A45023863B6EF44B60F586B74DA6E8A3A6CF3CD884C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Thread$CurrentErrorExitLast_freefls
    • String ID:
    • API String ID: 217443660-0
    • Opcode ID: 592d292820fdcc37a8a5b07a798f5007001eef603de5d051769be239e375fdd9
    • Instruction ID: bfc80b525bddbb1c91861c0065802b53aa78b254f796c45bde72e312f82a34fd
    • Opcode Fuzzy Hash: 592d292820fdcc37a8a5b07a798f5007001eef603de5d051769be239e375fdd9
    • Instruction Fuzzy Hash: E3F01D3D702B4585DF08BF75E84935D329AAB09B96F9484348E5DCB314FE38C484C722
    APIs
      • Part of subcall function 02861510: HeapFree.KERNEL32 ref: 02861556
      • Part of subcall function 02861510: free.LIBCMT ref: 02861582
    • HeapDestroy.KERNEL32 ref: 0287022E
    • HeapCreate.KERNEL32 ref: 0287023F
    • free.LIBCMT ref: 02870251
    • HeapDestroy.KERNEL32 ref: 02870274
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Heap$Destroyfree$CreateFree
    • String ID:
    • API String ID: 3907340440-0
    • Opcode ID: fb910f475e248c92b0ee4af45beb681a5d6336f248101098f2117f60791a146a
    • Instruction ID: ddf76175151fefa6f05f66af7b9a52a4568fe11083228cc5b33d41ee6d19421a
    • Opcode Fuzzy Hash: fb910f475e248c92b0ee4af45beb681a5d6336f248101098f2117f60791a146a
    • Instruction Fuzzy Hash: C4F0147E222A8097EB499F62E6983287361FB58B90F949416DF5A43B20DF34D4B0C710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: Heap$Destroyfree$CreateFree
    • String ID:
    • API String ID: 3907340440-0
    • Opcode ID: fcaa257793e5fadcfc70eac2341b6a548630f635855dc52f12f0612825e35ef9
    • Instruction ID: 100f26f1226e1b5b8c0dd1b3ca2076058db38795e1e264d76ba522f0e51d606c
    • Opcode Fuzzy Hash: fcaa257793e5fadcfc70eac2341b6a548630f635855dc52f12f0612825e35ef9
    • Instruction Fuzzy Hash: 05014F36719641E7EB488F61D6901693375FF44780B10A539DF5E47B11CF78E4B08340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit_getptd$_lock
    • String ID:
    • API String ID: 3670291111-0
    • Opcode ID: f73260c00caa837c4d3d9f8a59bd0010eec5b05e7670a8abfb7bea24928e3992
    • Instruction ID: 6026d33659a225880530aed446311c177ee66aa40d8cca9c08fb34dd1c92c487
    • Opcode Fuzzy Hash: f73260c00caa837c4d3d9f8a59bd0010eec5b05e7670a8abfb7bea24928e3992
    • Instruction Fuzzy Hash: BDF0FE2D622541C2EA28BF66C844BB92762E7A5B48F4C4179CF0D877A5DF14C491DB12
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit_getptd$_lock
    • String ID:
    • API String ID: 3670291111-0
    • Opcode ID: 41071648471df9d3322a353edf5a3ab4de664c8de62a61506e4f03b2c3d18dde
    • Instruction ID: edb62f7217ef3047ab89a6b281f7b6d8e137f1c2d11cddf8f6c950b4ee7f1de0
    • Opcode Fuzzy Hash: 41071648471df9d3322a353edf5a3ab4de664c8de62a61506e4f03b2c3d18dde
    • Instruction Fuzzy Hash: 63F0E711A4E142E2FA54EB5188517F822B2EF48B44F48633DDE0F8F7D39F2CA541D695
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CancelEventclosesocketsetsockopt
    • String ID:
    • API String ID: 852421847-0
    • Opcode ID: 5fed5ac1a6c0e25038b08101fba0c49ff6199068559f4a30632e6729f0e15d68
    • Instruction ID: 6c5b32b64e18f15430fab3090670b6637623938b62e0849808605150a90c93b8
    • Opcode Fuzzy Hash: 5fed5ac1a6c0e25038b08101fba0c49ff6199068559f4a30632e6729f0e15d68
    • Instruction Fuzzy Hash: D9F04F3A201B8087E7149F25E55835AB371FB89B64FA44325CBB947BE4CF39C065CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: ObjectSingleWait$Sleep
    • String ID:
    • API String ID: 2961732021-0
    • Opcode ID: a82aa5ed7ef335a9b865fcb5ba273442daed7ef383871e9b9812ef4d3b324817
    • Instruction ID: 63b183d625ed1d83b6e84a9f8a950ce2dc9696ac6c58335f10da68bf57b66788
    • Opcode Fuzzy Hash: a82aa5ed7ef335a9b865fcb5ba273442daed7ef383871e9b9812ef4d3b324817
    • Instruction Fuzzy Hash: 5EF01C7A211A44C6F7409F7ADC183583360F79EB69F958322CB7D462E5CF388485C350
    APIs
    • _getptd.LIBCMT ref: 02879EAC
      • Part of subcall function 0287E2A0: _amsg_exit.LIBCMT ref: 0287E2B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit_getptd
    • String ID: csm$csm
    • API String ID: 4217099735-3733052814
    • Opcode ID: a301923d45d768f53e4ff1bf8f3989137dba7043ec0d64a7539cc695a05f00f4
    • Instruction ID: 7c5756997a938ad1b277d62ac03dc4ab059d3b16ae4543ca95c3d5f9e07aa6aa
    • Opcode Fuzzy Hash: a301923d45d768f53e4ff1bf8f3989137dba7043ec0d64a7539cc695a05f00f4
    • Instruction Fuzzy Hash: 79519B3E204680CACB288F2AD48076DB7A5F359B99F488125DE9DD7B58CB38D491CB02
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _amsg_exit_getptd
    • String ID: csm$csm
    • API String ID: 4217099735-3733052814
    • Opcode ID: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
    • Instruction ID: 52ba7b930e3c37cb968c1472fe77b35f98c4314b69afc897cf23f3e6afa71198
    • Opcode Fuzzy Hash: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
    • Instruction Fuzzy Hash: 1C51A632B08242D5EB608E25914037D76BAFB49B88F445375EA6D9BB86CF3CE491CB41
    APIs
      • Part of subcall function 028755F8: malloc.LIBCMT ref: 02875612
    • wsprintfW.USER32 ref: 0286DCF8
    • CloseHandle.KERNEL32 ref: 0286DE6B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: CloseHandlemallocwsprintf
    • String ID: %s_bin
    • API String ID: 2399101171-2665034546
    • Opcode ID: f89af850d70fafd9c450e0015fdbbbd6af059b6c7c0169ba37591b7b0b900e9d
    • Instruction ID: 7a3351ac1c5733933c1e4ac455c13e4101d264655f5cf8e702184693d30a47cc
    • Opcode Fuzzy Hash: f89af850d70fafd9c450e0015fdbbbd6af059b6c7c0169ba37591b7b0b900e9d
    • Instruction Fuzzy Hash: 1441AD2E701A9481EF50EF66E408B7D236AFB85F88F488126CE5D87788DF39C149C702
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: b2b1431cd55b683814269cea7d1a1a7e7268a5820bfd4734ba4b4440490ac067
    • Instruction ID: 840b7ca20a45f7e6f282e20cd42f1e74b8e3dfad7c7f318cce536f43ce430b0b
    • Opcode Fuzzy Hash: b2b1431cd55b683814269cea7d1a1a7e7268a5820bfd4734ba4b4440490ac067
    • Instruction Fuzzy Hash: A5219339258B5C8FC748EF6D844462AB7D1FB9C324F94076EA45DC7291CB78C984CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: e7192767c34a9623a5d1a89167f59ebb02eb77dc64806a58f83736d32f6d4f2d
    • Instruction ID: 28de93f17ae59bc4fa6cd073d82fb2fde294a8cd84549374ec10fc41f15b1fa5
    • Opcode Fuzzy Hash: e7192767c34a9623a5d1a89167f59ebb02eb77dc64806a58f83736d32f6d4f2d
    • Instruction Fuzzy Hash: DF11BF34618B1C8FC744EF5C9485769B7E2FB98324F10476EA419C32A1DF78D884CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: d6e929b15d94968c4dcae8ba8a550ecf849421d0443b38efa222e2e13b2dfd33
    • Instruction ID: df86a076173bdc891e8eddc14a259b3dc0776f23595bef8fb57ee0c74b5613af
    • Opcode Fuzzy Hash: d6e929b15d94968c4dcae8ba8a550ecf849421d0443b38efa222e2e13b2dfd33
    • Instruction Fuzzy Hash: B621B47B500A44CADB309F76C4843983B75F358BADF8A6219EA4D8BB58CB75C484C784
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
    • Instruction ID: c51a42a026c34b4c98e13404553d4c08e1917766c38a68280763853f16a809ba
    • Opcode Fuzzy Hash: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
    • Instruction Fuzzy Hash: FE310B73604606CADB608F26D0802AC3B7AF758B9CF862375EA4D4BB95CF75D881C784
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 69ea10b5aa7fc4c94b3da25204908f538d83001d58fe88acc6dd5c106ed87c29
    • Instruction ID: 55264d8162efde1814a1e6ea9013a6972cbec9969c05f6171d114efde06340df
    • Opcode Fuzzy Hash: 69ea10b5aa7fc4c94b3da25204908f538d83001d58fe88acc6dd5c106ed87c29
    • Instruction Fuzzy Hash: 2111307E614784C6DB209F16E44025AB7A1F798BE8F984225AF9D97B55CF3CC541CF00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 9b4439fc7c8faf101ecdfea0264f82894208d5a38c9186357c889f9d5f545f4f
    • Instruction ID: 7bfa37ac462f12784ff0f2a9145497f8cf5c3cf9fe9ed39b4488cd5a50c9fbfa
    • Opcode Fuzzy Hash: 9b4439fc7c8faf101ecdfea0264f82894208d5a38c9186357c889f9d5f545f4f
    • Instruction Fuzzy Hash: 7611637261C741D6EB209B15D44026976B2FB88B94F545339EB9E4BB9ACE3CD540CA40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 69a3a8124c829fc22fade150a83cc64c850d83050ea355695546101ce870de63
    • Instruction ID: 7c872f118e77ee89daae4b37a5659b0e0c6f24d33e787520b4875651d6f1a9fc
    • Opcode Fuzzy Hash: 69a3a8124c829fc22fade150a83cc64c850d83050ea355695546101ce870de63
    • Instruction Fuzzy Hash: 540100BA610A4082DB10DF12E44039AB765F798FE8F988320AF5C47BA5DF38C140CB00
    APIs
      • Part of subcall function 02877C2C: _getptd.LIBCMT ref: 02877C39
      • Part of subcall function 02877C2C: _getptd.LIBCMT ref: 02877C4C
    • _getptd.LIBCMT ref: 0288D8F8
    • _getptd.LIBCMT ref: 0288D90B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: b4a5c6ca7b0824ff1c597d2069204a834d0011f023a00befa5de174d093b4a23
    • Instruction ID: 4f125f40697da17a3baf89287e45eea7cdb3d79deb0a2835f21a1ed380148073
    • Opcode Fuzzy Hash: b4a5c6ca7b0824ff1c597d2069204a834d0011f023a00befa5de174d093b4a23
    • Instruction Fuzzy Hash: F8012C6E6407418ACB30AF3598447BC2375EB99F6DF894925CE5D8B644CB30C585CB01
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3244143790.00007FF660901000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF660900000, based on PE: true
    • Associated: 00000000.00000002.3244084924.00007FF660900000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244175387.00007FF660918000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244230955.00007FF66091E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3244260316.00007FF660925000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff660900000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
    • Instruction ID: e581fe65ea9d9b5f965f7a43aeea05462267df471e898751aa72f81b04867c0b
    • Opcode Fuzzy Hash: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
    • Instruction Fuzzy Hash: 1B014022A05247E5EB749F65D8402B827BAEB54B59F4423B9DD0D8F797CF28E481C740
    APIs
    • malloc.LIBCMT ref: 0281C434
      • Part of subcall function 02825011: _FF_MSGBANNER.LIBCMT ref: 02825041
      • Part of subcall function 02825011: _callnewh.LIBCMT ref: 0282507F
      • Part of subcall function 02825011: _errno.LIBCMT ref: 0282508A
      • Part of subcall function 02825011: _errno.LIBCMT ref: 02825095
    • free.LIBCMT ref: 0281C45C
    • free.LIBCMT ref: 0281C4E7
    • free.LIBCMT ref: 0281C527
    Memory Dump Source
    • Source File: 00000000.00000002.3242861449.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2810000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$_errno$_callnewhmalloc
    • String ID:
    • API String ID: 2761444284-0
    • Opcode ID: 41aa70f8018d2aebca106d91cb34d39965c9ad2e17f13fc8d01bbcb11a335b68
    • Instruction ID: 1438388390393ec1f427f29d35ee4fa7ea4eef060ba62a50a52eccf84497fc4f
    • Opcode Fuzzy Hash: 41aa70f8018d2aebca106d91cb34d39965c9ad2e17f13fc8d01bbcb11a335b68
    • Instruction Fuzzy Hash: 1441F23865CB1E8FC729EF5D9481776B7D9FB88304B00852E998EC3251DB70E8468B83
    APIs
    • free.LIBCMT ref: 02873171
      • Part of subcall function 02875500: HeapFree.KERNEL32 ref: 02875516
      • Part of subcall function 02875500: _errno.LIBCMT ref: 02875520
      • Part of subcall function 02875500: GetLastError.KERNEL32 ref: 02875528
    • free.LIBCMT ref: 02873184
    • free.LIBCMT ref: 02873197
    • free.LIBCMT ref: 028731AA
    Memory Dump Source
    • Source File: 00000000.00000002.3242905680.0000000002860000.00000040.00001000.00020000.00000000.sdmp, Offset: 02860000, based on PE: true
    • Associated: 00000000.00000002.3242905680.00000000028A9000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2860000_44ba92cfe6426e6b641bda018ec4850696b32035a60e8.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 8ae717418b747786a6bdd70cc3524a69f5d92fbf5ae73ae9309fde861978cd30
    • Instruction ID: 56ddbd05a6268c39790d4a44f15f4d3b66a45a9f3f1b92b5473e3040c80f6153
    • Opcode Fuzzy Hash: 8ae717418b747786a6bdd70cc3524a69f5d92fbf5ae73ae9309fde861978cd30
    • Instruction Fuzzy Hash: 5FF0621E202A4488DF24EFB4C0A43396321EB94F7CF980B149E7E89594CF28C480D792