Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
quHmbPnLFV.exe

Overview

General Information

Sample name:quHmbPnLFV.exe
renamed because original name is a hash value
Original sample name:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa.exe
Analysis ID:1582216
MD5:e4a3903deccb9128673c052ca0a31080
SHA1:326c8a7f863a9a7c3f6135a6a916168bea68b1be
SHA256:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

GhostRat
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GhostRat
AI detected suspicious sample
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • quHmbPnLFV.exe (PID: 7296 cmdline: "C:\Users\user\Desktop\quHmbPnLFV.exe" MD5: E4A3903DECCB9128673C052CA0A31080)
    • WerFault.exe (PID: 7472 cmdline: C:\Windows\system32\WerFault.exe -u -p 7296 -s 1356 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: quHmbPnLFV.exe PID: 7296JoeSecurity_GhostRatYara detected GhostRatJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: quHmbPnLFV.exeVirustotal: Detection: 11%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B43FB0 CryptAcquireContextW,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CloseHandle,CloseHandle,0_2_00007FF665B43FB0
    Source: quHmbPnLFV.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: z:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: x:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: v:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: t:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: r:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: p:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: n:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: l:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: j:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: h:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: f:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: b:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: y:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: w:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: u:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: s:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: q:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: o:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: m:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: k:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: i:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: g:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\WerFault.exeFile opened: c:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: [:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665BB0B00 FindFirstFileW,FindClose,0_2_00007FF665BB0B00
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 206.238.220.204:6666
    Source: unknownDNS traffic detected: query: 53.210.109.20.in-addr.arpa replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD1750 select,recv,0_2_000001FE8FAD1750
    Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
    Source: global trafficDNS traffic detected: DNS query: 53.210.109.20.in-addr.arpa
    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADC1B0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,lstrlenW,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,0_2_000001FE8FADC1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADC1B0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,lstrlenW,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,0_2_000001FE8FADC1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8FC0 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,0_2_000001FE8FAD8FC0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF80B8 DirectInput8Create,0_2_000001FE8FAF80B8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665BB1B50: CreateFileW,DeviceIoControl,CloseHandle,0_2_00007FF665BB1B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8A2D ExitWindowsEx,0_2_000001FE8FAD8A2D
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8997 GetModuleFileNameW,GetCommandLineW,GetStartupInfoW,CreateProcessW,ExitProcess,ExitProcess,ExitWindowsEx,0_2_000001FE8FAD8997
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8A4E ExitWindowsEx,0_2_000001FE8FAD8A4E
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD14F00_2_000001FE8FAD14F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD2B000_2_000001FE8FAD2B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE21F00_2_000001FE8FAE21F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF3A240_2_000001FE8FAF3A24
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD5A100_2_000001FE8FAD5A10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAED1600_2_000001FE8FAED160
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADC1B00_2_000001FE8FADC1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD98D00_2_000001FE8FAD98D0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAEC7E00_2_000001FE8FAEC7E0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8FC00_2_000001FE8FAD8FC0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD58200_2_000001FE8FAD5820
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF67700_2_000001FE8FAF6770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE7F580_2_000001FE8FAE7F58
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADF6500_2_000001FE8FADF650
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADBDD00_2_000001FE8FADBDD0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAEFD100_2_000001FE8FAEFD10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAEEC800_2_000001FE8FAEEC80
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADB4800_2_000001FE8FADB480
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADCBF00_2_000001FE8FADCBF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF53780_2_000001FE8FAF5378
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD9B400_2_000001FE8FAD9B40
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE7B8C0_2_000001FE8FAE7B8C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD62F00_2_000001FE8FAD62F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE8B000_2_000001FE8FAE8B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD3A600_2_000001FE8FAD3A60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF42880_2_000001FE8FAF4288
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD52800_2_000001FE8FAD5280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B446100_2_00007FF665B44610
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C2D5880_2_00007FF665C2D588
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C329340_2_00007FF665C32934
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C387700_2_00007FF665C38770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B6B2400_2_00007FF665B6B240
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B761B00_2_00007FF665B761B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C2A1440_2_00007FF665C2A144
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B985000_2_00007FF665B98500
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C2A3D80_2_00007FF665C2A3D8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B633A00_2_00007FF665B633A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C333400_2_00007FF665C33340
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B5FE700_2_00007FF665B5FE70
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B800500_2_00007FF665B80050
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C30ACC0_2_00007FF665C30ACC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C3A9D80_2_00007FF665C3A9D8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B5B9B00_2_00007FF665B5B9B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B809700_2_00007FF665B80970
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B72C000_2_00007FF665B72C00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665BC6BF00_2_00007FF665BC6BF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C25BE40_2_00007FF665C25BE4
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C38B9C0_2_00007FF665C38B9C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665BB1B500_2_00007FF665BB1B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B60B500_2_00007FF665B60B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400041B00_2_00000001400041B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400014F00_2_00000001400014F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001BFE80_2_000000014001BFE8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001D06C0_2_000000014001D06C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400051000_2_0000000140005100
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400101E00_2_00000001400101E0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400033100_2_0000000140003310
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140007B600_2_0000000140007B60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000F38C0_2_000000014000F38C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140002D200_2_0000000140002D20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001364C0_2_000000014001364C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001A6980_2_000000014001A698
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400166B00_2_00000001400166B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000F6D40_2_000000014000F6D4
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001AEFC0_2_000000014001AEFC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000A7000_2_000000014000A700
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140013FCC0_2_0000000140013FCC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA9F1210_2_000001FE8FA9F121
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA9B8A10_2_000001FE8FA9B8A1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA90FC10_2_000001FE8FA90FC1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAAE7510_2_000001FE8FAAE751
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA9AF510_2_000001FE8FA9AF51
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA9C6C10_2_000001FE8FA9C6C1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAA765D0_2_000001FE8FAA765D
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA925D10_2_000001FE8FA925D1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA94D510_2_000001FE8FA94D51
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA954E10_2_000001FE8FA954E1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA935310_2_000001FE8FA93531
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA993A10_2_000001FE8FA993A1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FA98A910_2_000001FE8FA98A91
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: String function: 00007FF665B4D680 appears 62 times
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7296 -s 1356
    Source: quHmbPnLFV.exeBinary or memory string: nna.nosciencehu.comtadaoka.osaka.jphayakawa.yamanashi.jpdnsalias.orgedu.saedu.sbedu.rsedu.sclib.id.usogori.fukuoka.jpnotogawa.shiga.jpedu.sdrepbody.aeroid.auedu.ruk12.nj.usloyalist.museumedu.rwedu.sgxyzmoka.tochigi.jpdynathome.netkimino.wakayama.jpedu.slnissanveterinaire.kmkokubunji.tokyo.jpedu.snos.hordaland.notm.kmartsandcrafts.museumis-a-musician.com*.kitakyushu.jpiitate.fukushima.jpedu.stav.iturayasu.chiba.jpedu.svflorida.museumninjaedu.synemuro.hokkaido.jpedu.tjs
    Source: classification engineClassification label: mal76.troj.evad.winEXE@2/6@2/2
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665B49F50 GetLastError,FormatMessageW,LocalFree,0_2_00007FF665B49F50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD51C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_000001FE8FAD51C0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD5040 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,0_2_000001FE8FAD5040
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD56A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_000001FE8FAD56A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4770 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,swprintf,swprintf,0_2_000001FE8FAD4770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD3970 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_000001FE8FAD3970
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4B60 lstrlenW,CoInitialize,CoInitializeEx,CoCreateInstance,swprintf,0_2_000001FE8FAD4B60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7296
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeMutant created: \Sessions\1\BaseNamedObjects\2024. 9. 2
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7d97e41a-8ac5-4559-9f11-f770fd602ba3Jump to behavior
    Source: quHmbPnLFV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: quHmbPnLFV.exeVirustotal: Detection: 11%
    Source: quHmbPnLFV.exeString found in binary or memory: Africa/Addis_Ababa
    Source: quHmbPnLFV.exeString found in binary or memory: in-addr.arpa
    Source: quHmbPnLFV.exeString found in binary or memory: gaviika.notattoofg.itkonan.shiga.jpoff.aicountrydevrn.itsamukawa.kanagawa.jpbaiduport.frcarbonia-iglesias.itmiyoshi.tokushima.jptabuse.yamaguchi.jpsosnowiec.pladultin-addr.arpagran.nogob.paserveftp.orghidaka.hokkaido.jpnesseby.nosatosho.okayama.jpgob.peflightsandriabarlettatrani.itnagato.yamaguchi.jphostnes.akershus.nogob.pkdvrdns.orgmiyota.nagano.jpembroidery.museumkarasjohka.nofrom-ky.comtrieste.itashoro.hokkaido.jpdealersaigawa.fukuoka.jpspiegelatlanta.museumromskog.nol
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile read: C:\Users\user\Desktop\quHmbPnLFV.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\quHmbPnLFV.exe "C:\Users\user\Desktop\quHmbPnLFV.exe"
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7296 -s 1356
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: ddraw.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dciman32.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D7B70EE0-4340-11CF-B063-0020AFC2CD35}\InprocServer32Jump to behavior
    Source: quHmbPnLFV.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: quHmbPnLFV.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: quHmbPnLFV.exeStatic file information: File size 2835456 > 1048576
    Source: quHmbPnLFV.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x104c00
    Source: quHmbPnLFV.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x171600
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: quHmbPnLFV.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4D10 LoadLibraryW,GetProcAddress,swprintf,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_000001FE8FAD4D10
    Source: quHmbPnLFV.exeStatic PE information: section name: .gehcont
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF89D8 push rbp; retf 0_2_000001FE8FAF8A04
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD8933 OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_000001FE8FAD8933
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: C:\Program Files\VMware\VMware Tools\ VMware 0_2_000001FE8FAD4F20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeStalling execution: Execution stalls by calling Sleepgraph_0-75680
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-76403
    Source: C:\Users\user\Desktop\quHmbPnLFV.exe TID: 7316Thread sleep time: -50000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exe TID: 7388Thread sleep time: -50000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665BB0B00 FindFirstFileW,FindClose,0_2_00007FF665BB0B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4900 RegOpenKeyExW,RegQueryValueExW,lstrcmpW,RegQueryValueExW,lstrcpyW,RegQueryValueExW,GetSystemInfo,wsprintfW,lstrcpyW,lstrcpyW,RegCloseKey,RegCloseKey,0_2_000001FE8FAD4900
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeThread delayed: delay time: 50000Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeThread delayed: delay time: 50000Jump to behavior
    Source: Amcache.hve.3.drBinary or memory string: VMware
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: quHmbPnLFV.exe, 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware\VMware Tools\
    Source: quHmbPnLFV.exe, 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ~/%s%d/None/%sHDD:%dWW %d Gb Free %d Gb Mem: %d Gb %sFree%d Gb %s-%d8herrorDriverDescSYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000%s >fX[:%d MGetNativeSystemInfontdll.dllRtlGetNtVersionNumbers%d.%d.%dSOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameC:\Program Files\VMware\VMware Tools\VMwareSeDebugPrivilegeNtSetInformationProcessNtDll.dllWindows\System32\svchost.exe%s%sOpenProcessKernel32.dllExitProcessWinExecWaitForSingleObjectwininet.dllInternetOpenWMSIE 6.0InternetOpenUrlWInternetReadFileInternetCloseHandleinvalid string positionstring too long
    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: quHmbPnLFV.exe, 00000000.00000002.1939782639.000001FE8DBC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllhh
    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeAPI call chain: ExitProcess graph end nodegraph_0-75573
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeAPI call chain: ExitProcess graph end nodegraph_0-75944
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE6968 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000001FE8FAE6968
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4D10 LoadLibraryW,GetProcAddress,swprintf,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_000001FE8FAD4D10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD41F0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_000001FE8FAD41F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE6968 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000001FE8FAE6968
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE3A20 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000001FE8FAE3A20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADB480 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,Sleep,EnumWindows,Sleep,EnumWindows,CreateEventA,Sleep,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,CloseHandle,WaitForSingleObject,CloseHandle,CloseHandle,0_2_000001FE8FADB480
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAF8270 SetUnhandledExceptionFilter,0_2_000001FE8FAF8270
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C27648 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF665C27648
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C2160C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF665C2160C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400041B0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00000001400041B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000E2F8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014000E2F8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400112FC SetUnhandledExceptionFilter,0_2_00000001400112FC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000BF30 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014000BF30

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD5A10 GetSystemDirectoryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,GetThreadContext,SetThreadContext,ResumeThread,0_2_000001FE8FAD5A10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD5280 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_000001FE8FAD5280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_000001FE8FAD5280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAD4140 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_000001FE8FAD4140
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetSystemInfo,wsprintfW,GetLocalTime,wsprintfW,GetLocaleInfoW,EnumDisplayMonitors,swprintf,swprintf,lstrcatW,GetSystemDirectoryW,GetCurrentHwProfileW,0_2_000001FE8FAD2B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FADB9A0 Sleep,SleepEx,GetLocalTime,wsprintfW,Sleep,SleepEx,EnumWindows,Sleep,EnumWindows,Sleep,SleepEx,CreateEventA,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,CloseHandle,WaitForSingleObject,CloseHandle,CloseHandle,0_2_000001FE8FADB9A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF665C2A144 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF665C2A144
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE95AC HeapCreate,GetVersion,HeapSetInformation,0_2_000001FE8FAE95AC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: quHmbPnLFV.exeBinary or memory string: acs.exe
    Source: quHmbPnLFV.exeBinary or memory string: kxetray.exe
    Source: quHmbPnLFV.exeBinary or memory string: avcenter.exe
    Source: quHmbPnLFV.exeBinary or memory string: vsserv.exe
    Source: quHmbPnLFV.exeBinary or memory string: KSafeTray.exe
    Source: quHmbPnLFV.exeBinary or memory string: cfp.exe
    Source: quHmbPnLFV.exeBinary or memory string: avp.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360Safe.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360tray.exe
    Source: quHmbPnLFV.exeBinary or memory string: rtvscan.exe
    Source: quHmbPnLFV.exeBinary or memory string: ashDisp.exe
    Source: quHmbPnLFV.exeBinary or memory string: TMBMSRV.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360Tray.exe
    Source: quHmbPnLFV.exeBinary or memory string: avgwdsvc.exe
    Source: quHmbPnLFV.exeBinary or memory string: AYAgent.aye
    Source: quHmbPnLFV.exeBinary or memory string: RavMonD.exe
    Source: quHmbPnLFV.exeBinary or memory string: QUHLPSVC.EXE
    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
    Source: quHmbPnLFV.exeBinary or memory string: Mcshield.exe
    Source: quHmbPnLFV.exeBinary or memory string: K7TSecurity.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: quHmbPnLFV.exe PID: 7296, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: quHmbPnLFV.exe PID: 7296, type: MEMORYSTR
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000001FE8FAE0EF0 htons,bind,0_2_000001FE8FAE0EF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140009400 htons,bind,0_2_0000000140009400
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    2
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    Command and Scripting Interpreter
    Boot or Logon Initialization Scripts1
    Access Token Manipulation
    2
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Screen Capture
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
    Process Injection
    1
    DLL Side-Loading
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares2
    Input Capture
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Masquerading
    NTDS17
    System Information Discovery
    Distributed Component Object Model2
    Clipboard Data
    1
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
    Virtualization/Sandbox Evasion
    LSA Secrets151
    Security Software Discovery
    SSHKeylogging1
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Access Token Manipulation
    Cached Domain Credentials131
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
    Process Injection
    DCSync1
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Indicator Removal
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    quHmbPnLFV.exe11%VirustotalBrowse
    quHmbPnLFV.exe8%ReversingLabsWin64.Malware.Generic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    53.210.109.20.in-addr.arpa
    unknown
    unknownfalse
      high
      15.164.165.52.in-addr.arpa
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://upx.sf.netAmcache.hve.3.drfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          206.238.220.204
          unknownUnited States
          174COGENT-174USfalse
          IP
          192.168.1.2
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1582216
          Start date and time:2024-12-30 03:52:10 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 50s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:quHmbPnLFV.exe
          renamed because original name is a hash value
          Original Sample Name:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa.exe
          Detection:MAL
          Classification:mal76.troj.evad.winEXE@2/6@2/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 76
          • Number of non-executed functions: 263
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 52.168.117.173, 40.126.32.134, 172.202.163.200, 52.165.164.15, 20.109.210.53, 13.107.246.45
          • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          TimeTypeDescription
          21:53:02API Interceptor2x Sleep call for process: quHmbPnLFV.exe modified
          21:53:25API Interceptor1x Sleep call for process: WerFault.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          COGENT-174USloligang.ppc.elfGet hashmaliciousMiraiBrowse
          • 154.44.130.212
          loligang.sh4.elfGet hashmaliciousMiraiBrowse
          • 154.22.1.136
          loligang.mpsl.elfGet hashmaliciousMiraiBrowse
          • 38.237.101.164
          loligang.arm.elfGet hashmaliciousMiraiBrowse
          • 38.142.152.46
          loligang.x86.elfGet hashmaliciousMiraiBrowse
          • 38.53.96.152
          spc.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.34.88.62
          arm7.elfGet hashmaliciousMirai, MoobotBrowse
          • 206.42.118.144
          mips.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.168.204.186
          x86.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.236.228.40
          mpsl.elfGet hashmaliciousMirai, MoobotBrowse
          • 38.59.110.247
          No context
          No context
          Process:C:\Windows\System32\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):1.0638486583563953
          Encrypted:false
          SSDEEP:192:WvtC5y4MZ90hT88SjjZtXpZFQ2wzuiFIZ24lO8Q:Ityy4MAho8SjZwzuiFIY4lO8Q
          MD5:49E8B3AD565EE084CA35201B4D3755AA
          SHA1:AE76A61A490B02B69833C967E07AD93905679267
          SHA-256:0B5EA97498F11AB44937CFC6E053F27626CF6BEC95CA386168388B2F19602DA4
          SHA-512:EB33682BF09D54A9A4BB44050C712382BDF00D5C56CEE0C30E49AD71DE3570561547442E467F0A56537D8DE2B1D6423E6A7C294C58A4A7C489A4AE12A170DCBC
          Malicious:true
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.0.0.0.7.8.8.5.0.4.6.5.5.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.0.0.0.7.8.8.9.8.2.6.6.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.b.1.9.c.d.4.-.1.e.5.b.-.4.a.f.4.-.9.f.7.a.-.9.9.5.5.a.0.6.8.d.1.c.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.d.8.1.9.3.f.a.-.c.a.3.1.-.4.f.2.2.-.a.a.8.f.-.d.2.3.6.0.c.7.4.7.2.8.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.q.u.H.m.b.P.n.L.F.V...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.8.0.-.0.0.0.1.-.0.0.1.4.-.3.2.2.9.-.2.8.f.0.6.5.5.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.2.5.5.3.d.3.c.5.e.c.0.1.a.7.5.9.a.9.0.a.0.b.8.3.3.3.d.0.e.d.5.0.0.0.0.f.f.f.f.!.0.0.0.0.3.2.6.c.8.a.7.f.8.6.3.a.9.a.7.c.3.f.6.1.3.5.a.6.a.9.1.6.1.6.8.b.e.a.6.8.b.1.b.e.!.q.u.H.m.b.P.n.L.F.V...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.0.2.:.2.2.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Mini DuMP crash report, 16 streams, Mon Dec 30 02:53:08 2024, 0x1205a4 type
          Category:dropped
          Size (bytes):220222
          Entropy (8bit):1.8055964783384484
          Encrypted:false
          SSDEEP:1536:uirqwi/Lk6aaRyF2ESnPVXszKvrADuGFJm+QdeOJdmd/L8uJO8QA+Ka2RDHC4jPL:TYA6aapmLs
          MD5:807F73A2A0EBC986329EF5DC408C8167
          SHA1:7EF948D92646B2FBC8ABE662A7310F88AF94FA57
          SHA-256:223D1A23416AC4F61460F8DEC9236E5ABCE859D7C27767BF17491130DE7B8881
          SHA-512:0F4998D96F0DFAC4C37BB90B9EC0E322AE92BF8669DD91B33D69133D39A3935CB8E75D98DBAB3EDF134FD52A266D11F7756E2E7354CCD3C7F60AD7CF82E9A614
          Malicious:false
          Reputation:low
          Preview:MDMP..a..... .........rg............t.......................$....$...........$......................l.......8...........T............4...'..........dB..........PD..............................................................................eJ.......D......Lw......................T.............rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8870
          Entropy (8bit):3.7048037031152967
          Encrypted:false
          SSDEEP:192:R6l7wVeJ6grC6Y9LNMJgmfyUJxnprD89b6S9fGvem:R6lXJ1+6YRNMJgmfy4464fGP
          MD5:4D325254DCCA7AD423F156A459BA46F6
          SHA1:BC8453D8568DE59454996F5B1664943B08D1040B
          SHA-256:32DBA8F5D3FC5D123348EBE08F3373C50AAC85476748F1AD19250F3541101C72
          SHA-512:E407C43C6CAE315B394A1F117A90A8D89DDAD7A72B01D4520FE8F77F083549E2C2B0D9365EE83D05A1F87AD7B35DF021F7DD8CCD0831B7726C98ABF753E3392E
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.9.6.<./.P.i.
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4796
          Entropy (8bit):4.486279002934917
          Encrypted:false
          SSDEEP:48:cvIwWl8zs3Jg771I97gWpW8VY2Ym8M4JTwFFzyq8v0d2b/Ed:uIjfZI78Z7V6JT6WI2jEd
          MD5:55DA29C5D67596F13D0CDDD8A17B5E3E
          SHA1:0E4CFD138B78282E49B241A8B5ADFC1DD1C4C5C3
          SHA-256:17D3E04F1F1FA61A0157BE52D8108384C89C039BFABF9C0962A9F0EBDF243086
          SHA-512:549906F3C8D0F76978057C26B30C22536BF0226D9D9F7B6F716965D8391DD950CAF870128D689E3479AD78110A28326E3097AA9D23F0912D9750F9D24536DE17
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="653395" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Users\user\Desktop\quHmbPnLFV.exe
          File Type:data
          Category:dropped
          Size (bytes):46
          Entropy (8bit):1.0424600748477153
          Encrypted:false
          SSDEEP:3:/lbq:4
          MD5:8CB7B7F28464C3FCBAE8A10C46204572
          SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
          SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
          SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
          Malicious:false
          Reputation:high, very likely benign file
          Preview:........................................user.
          Process:C:\Windows\System32\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.4656056293489925
          Encrypted:false
          SSDEEP:6144:eIXfpi67eLPU9skLmb0b44WSPKaJG8nAgejZMMhA2gX4WABl0uN+dwBCswSbt:zXD944WlLZMM6YFHw+t
          MD5:1248E6A028A4476BC60FA0DC6BC646E9
          SHA1:10F7D744A5EC44B78A20E6A291FC8B76E813200D
          SHA-256:6973B189D5BFEA3CD6EA6C59CFA7E8367558E55CB5C7FA5CF405B39DEAFAEEF3
          SHA-512:15293B7912B2735C38C96FEDE18D973BD8239EFD1A77DA925FBC138BF42C2314AE0B1B2AD712A8D0AE4B9E59BA5C6FE21B3CA593C509AFC92534158739F9D5C4
          Malicious:false
          Reputation:low
          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb...eZ...............................................................................................................................................................................................................................................................................................................................................3..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.639658770449267
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:quHmbPnLFV.exe
          File size:2'835'456 bytes
          MD5:e4a3903deccb9128673c052ca0a31080
          SHA1:326c8a7f863a9a7c3f6135a6a916168bea68b1be
          SHA256:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa
          SHA512:ab8b0f92a863c348c6819ba0f7cbc0b7d3669118c9646b239e542cc82768c7685e4326cb113561de23bf5aba5d539be3fdab6c212794ba4894011c40022bcbb2
          SSDEEP:49152:nKAtKQ+IgK2jItFcJsv6tWKFdu9C4FwPg0u7vTPQnWCLZgZ3YPmWjZ5RPpA4Jtuv:n9BFcJsv6tWKFdu9C9yvSWkUh
          TLSH:07D57B06B7A54164E9F7C13D49A3D296E6727C868B229ADF126CBB1D3D332F0193B311
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............r...r...r.......r......<r.......r.......r.......r...,...r...,...r.......r.......r.......r...r..^r..;....r..;....r..;....r.
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x1400e0cd4
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66D63D8D [Mon Sep 2 22:34:53 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:ec2055fdb052a446adb6979fb0ed0eab
          Instruction
          dec eax
          sub esp, 28h
          call 00007FCC1C7EE860h
          dec eax
          add esp, 28h
          jmp 00007FCC1C7EDB07h
          int3
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          jmp 00007FCC1C7EDCA1h
          dec eax
          mov ecx, ebx
          call 00007FCC1C7FD98Ah
          test eax, eax
          je 00007FCC1C7EDCA5h
          dec eax
          mov ecx, ebx
          call 00007FCC1C7F45CEh
          dec eax
          test eax, eax
          je 00007FCC1C7EDC79h
          dec eax
          add esp, 20h
          pop ebx
          ret
          dec eax
          cmp ebx, FFFFFFFFh
          je 00007FCC1C7EDC98h
          call 00007FCC1C7EEC40h
          int3
          call 00007FCC1C7EEC5Ah
          int3
          jmp 00007FCC1C72B91Ch
          int3
          int3
          int3
          jmp 00007FCC1C7EDC4Ch
          int3
          int3
          int3
          dec eax
          sub esp, 28h
          call 00007FCC1C7EEDDCh
          test eax, eax
          je 00007FCC1C7EDCB3h
          dec eax
          mov eax, dword ptr [00000030h]
          dec eax
          mov ecx, dword ptr [eax+08h]
          jmp 00007FCC1C7EDC97h
          dec eax
          cmp ecx, eax
          je 00007FCC1C7EDCA6h
          xor eax, eax
          dec eax
          cmpxchg dword ptr [001CAC78h], ecx
          jne 00007FCC1C7EDC80h
          xor al, al
          dec eax
          add esp, 28h
          ret
          mov al, 01h
          jmp 00007FCC1C7EDC89h
          int3
          int3
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          movzx eax, byte ptr [001CAC63h]
          test ecx, ecx
          mov ebx, 00000001h
          cmove eax, ebx
          mov byte ptr [001CAC53h], al
          call 00007FCC1C7EEC0Bh
          call 00007FCC1C7F01AAh
          test al, al
          jne 00007FCC1C7EDC96h
          Programming Language:
          • [ C ] VS2015 UPD3.1 build 24215
          • [C++] VS2015 UPD3.1 build 24215
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x275bc00x428.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x275fe80x8c.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2ba0000x2f0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2ad0000xb874.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x2bb0000x1738.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x2558d00x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x255a100x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2559100x100.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x1060000x5f8.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x104afb0x104c00c84d40d1f469072f57a689e738938f87False0.4515520134228188data6.42377635279018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x1060000x1714260x171600b3565b4a69ad63ff5f0bccae2be1aeb9False0.4485690302453469data6.12092587750584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x2780000x34cf80x30600eaf56cb727f7c173a8525299caf11fabFalse0.9167877906976745data7.769789455373511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x2ad0000xb8740xba00cf779a23130b6ed874a178e9a6439f89False0.49380460349462363data6.05031206526366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .gehcont0x2b90000x140x2000b1a7acc4da92921e25ea6fbe01d58f0False0.048828125data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x2ba0000x2f00x4000bb6439b754faf94f529f9817d706a2fFalse0.4033203125data4.3014032271203595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x2bb0000x17380x1800b78a8906569a1ced329731d1563785d5False0.3839518229166667data5.389524742252251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x2ba0600x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5500770416024653
          DLLImport
          KERNEL32.dllIsBadReadPtr, FreeLibrary, GetModuleHandleW, GetCommandLineW, GetCurrentProcessId, LocalFree, VerSetConditionMask, GetLastError, GetVersionExW, FormatMessageW, VerifyVersionInfoW, OutputDebugStringW, GetConsoleWindow, CompareStringW, GetUserDefaultLCID, GetStartupInfoW, GetModuleFileNameW, SetEvent, WaitForSingleObject, CreateEventW, DuplicateHandle, WaitForMultipleObjects, GetCurrentProcess, CreateThread, GetCurrentThread, GetCurrentThreadId, SetThreadPriority, GetThreadPriority, TerminateThread, ResumeThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemInfo, QueryPerformanceCounter, QueryPerformanceFrequency, GetTickCount, WaitForSingleObjectEx, GetSystemDirectoryW, LoadLibraryW, GetSystemTime, GetLocalTime, CreateFileW, GetFileAttributesExW, GetCurrentDirectoryW, CreateDirectoryW, DeleteFileW, FindClose, FindFirstFileW, GetFileAttributesW, GetFileInformationByHandle, GetFullPathNameW, GetLogicalDrives, GetLongPathNameW, RemoveDirectoryW, GetTempPathW, SetErrorMode, DeviceIoControl, CopyFileW, MoveFileW, GetProcessHeap, FileTimeToSystemTime, FlushFileBuffers, GetFileType, ReadFile, SetEndOfFile, SetFilePointerEx, WriteFile, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, MoveFileExW, ResetEvent, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, GetCurrencyFormatW, GetUserDefaultUILanguage, MultiByteToWideChar, WideCharToMultiByte, FindFirstFileExW, FindNextFileW, GetTimeZoneInformation, GetGeoInfoW, GetUserGeoID, ReleaseMutex, CreateMutexW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, RtlPcToFileHeader, RaiseException, EncodePointer, LoadLibraryExW, GetCommandLineA, ExitProcess, GetModuleHandleExW, ExitThread, FreeLibraryAndExitThread, GetConsoleMode, ReadConsoleW, GetConsoleOutputCP, SetFileAttributesW, SetStdHandle, GetStdHandle, LCMapStringW, HeapReAlloc, SetEnvironmentVariableW, GetCPInfo, GetFileSizeEx, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, WriteConsoleW, HeapSize, GetProcAddress, HeapAlloc, GetNativeSystemInfo, LoadLibraryA, VirtualAlloc, VirtualFree, SetLastError, HeapFree, VirtualProtect, SystemTimeToTzSpecificLocalTime, CloseHandle
          ADVAPI32.dllOpenProcessToken, FreeSid, GetLengthSid, GetTokenInformation, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, CopySid, RegQueryInfoKeyW, RegQueryValueExW, CryptDestroyKey, CryptReleaseContext, CryptDestroyHash, CryptHashData, CryptDeriveKey, CryptCreateHash, CryptDecrypt, CryptAcquireContextW
          WS2_32.dllWSAAsyncSelect
          USER32.dllCharNextExA, CallNextHookEx, KillTimer, SetTimer, MsgWaitForMultipleObjectsEx, GetQueueStatus, UnhookWindowsHookEx, CreateWindowExW, UnregisterClassW, RegisterClassW, DefWindowProcW, PostMessageW, PeekMessageW, DispatchMessageW, TranslateMessage, SetWindowLongPtrW, SetWindowsHookExW, DestroyWindow, GetWindowLongPtrW
          SHELL32.dllSHGetSpecialFolderPathW
          ole32.dllCoCreateInstance, CoTaskMemFree, CoInitialize, CoUninitialize
          NameOrdinalAddress
          z_adler3210x1400aab20
          z_adler32_combine20x1400aae00
          z_adler32_combine6430x1400aae00
          z_compress40x140049aa0
          z_compress250x140049ac0
          z_compressBound60x140049b70
          z_crc3270x1400ab2f0
          z_crc32_combine80x1400ab300
          z_crc32_combine6490x1400ab300
          z_deflate100x140090200
          z_deflateBound110x140090b00
          z_deflateCopy120x140090c10
          z_deflateEnd130x140090e80
          z_deflateInit2_140x140090f60
          z_deflateInit_150x1400911f0
          z_deflateParams160x140091230
          z_deflatePrime170x140091350
          z_deflateReset180x140091390
          z_deflateSetDictionary190x1400914f0
          z_deflateSetHeader200x140091640
          z_deflateTune210x140091670
          z_get_crc_table220x1400ab310
          z_inflate230x140091830
          z_inflateCopy240x140093010
          z_inflateEnd250x140093250
          z_inflateGetHeader260x1400932b0
          z_inflateInit2_270x1400932e0
          z_inflateInit_280x1400933d0
          z_inflateMark290x1400933e0
          z_inflatePrime300x140093440
          z_inflateReset310x1400934a0
          z_inflateReset2320x140093520
          z_inflateSetDictionary330x1400935d0
          z_inflateSync340x1400936c0
          z_inflateSyncPoint350x140093820
          z_inflateUndermine360x140093850
          z_uncompress370x140049b90
          z_zError380x1400ab320
          z_zlibCompileFlags390x1400ab360
          z_zlibVersion400x1400ab370
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Dec 30, 2024 03:53:03.690155983 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:03.695087910 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:03.695177078 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:03.748889923 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:03.753824949 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.577349901 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.577734947 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:04.582643032 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.582654953 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.582665920 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890492916 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890505075 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890515089 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890520096 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890531063 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:04.890671015 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:04.890671015 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.107920885 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.107929945 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.107958078 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108041048 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108051062 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108061075 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108071089 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108072042 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.108113050 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.108113050 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.108783960 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108809948 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.108844042 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.109081984 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.109092951 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.109143019 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.326191902 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326217890 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326229095 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326241016 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326251984 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326282978 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.326333046 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.326579094 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326596975 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326620102 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.326967955 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326980114 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.326991081 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.327001095 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.327011108 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.327013016 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.327037096 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.327050924 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.327755928 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.327766895 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.327811956 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.544492006 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544521093 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544562101 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544598103 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544645071 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544680119 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.544733047 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.544733047 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.544733047 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.545099020 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545150042 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545160055 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545171022 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545206070 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.545206070 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.545728922 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545741081 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545751095 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545761108 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545770884 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.545783043 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.545819044 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.546498060 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546509027 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546519995 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546535969 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546549082 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546554089 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.546560049 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.546575069 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.546607971 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.592695951 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.762554884 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762612104 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762629986 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762640953 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762646914 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762659073 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762671947 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762684107 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.762705088 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.762743950 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.763077974 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763089895 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763102055 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763124943 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.763288021 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763329983 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.763396978 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763408899 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763420105 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763432026 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763441086 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.763456106 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763468027 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763470888 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.763480902 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.763508081 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.764234066 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.764256954 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.764271975 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.764277935 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.764286995 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.764305115 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.764321089 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.764347076 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.980581999 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980612993 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980639935 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980652094 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980663061 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980680943 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.980686903 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.980731964 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.980776072 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.980983973 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981015921 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981029987 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981040955 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981057882 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981057882 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981070995 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981076002 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981096029 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981106043 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981120110 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981138945 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981154919 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981163025 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981192112 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981893063 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981910944 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981923103 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981934071 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981945992 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981956959 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981967926 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981970072 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981981039 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.981992006 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.981992960 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.982006073 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:05.982016087 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.982036114 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.982059956 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:05.982795000 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.024820089 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.068715096 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.120726109 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.198615074 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198628902 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198638916 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198652983 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198662996 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198673010 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198682070 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198690891 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198695898 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198700905 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198705912 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198736906 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.198786974 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.198987007 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.198997974 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199013948 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199023008 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199029922 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199042082 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199053049 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199054956 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199064016 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199074030 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199081898 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199090004 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199093103 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199117899 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199834108 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199845076 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199853897 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199863911 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199877977 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199887991 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199892998 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199898958 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199909925 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199919939 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199928999 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199937105 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199937105 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199939013 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.199959040 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.199994087 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.200699091 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200710058 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200733900 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200743914 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200753927 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200763941 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200766087 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.200773954 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.200788021 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.200819016 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.245773077 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.416953087 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.416964054 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.416974068 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.416984081 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417032003 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417049885 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417074919 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417087078 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417108059 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417148113 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417156935 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417166948 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417190075 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417231083 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417259932 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417293072 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417344093 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417357922 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417378902 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417555094 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417565107 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417576075 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417587042 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417589903 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417602062 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417612076 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417612076 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417646885 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417809963 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417819977 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417829990 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417839050 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417844057 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417866945 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417870998 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417881966 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417890072 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417901993 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417912960 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.417927027 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417938948 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.417952061 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418611050 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418621063 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418631077 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418641090 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418648958 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418651104 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418662071 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418672085 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418673992 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418682098 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418692112 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418706894 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418715000 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418719053 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418729067 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418739080 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418740034 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418751955 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.418761015 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418772936 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.418790102 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.419380903 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419394016 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419404030 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419421911 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419430971 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419433117 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.419442892 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419451952 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.419457912 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.419481993 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.505074024 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.547677040 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634555101 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634567976 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634607077 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634620905 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634624004 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634630919 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634677887 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634685993 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634732008 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634776115 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634785891 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634793997 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634803057 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634838104 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634875059 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634892941 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.634968996 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634984970 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.634996891 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635006905 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635013103 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635020971 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635031939 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635035038 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635046005 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635066986 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635097027 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635274887 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635365963 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635377884 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635389090 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635399103 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635409117 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635418892 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635422945 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635430098 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635442019 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635472059 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635472059 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635675907 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635762930 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635772943 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635785103 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635801077 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635808945 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635809898 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635821104 CET666649730206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:06.635839939 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.635874987 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:06.641503096 CET497306666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:08.660057068 CET497316666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:08.664908886 CET666649731206.238.220.204192.168.2.4
          Dec 30, 2024 03:53:08.665003061 CET497316666192.168.2.4206.238.220.204
          Dec 30, 2024 03:53:28.815361977 CET497316666192.168.2.4206.238.220.204
          TimestampSource PortDest PortSource IPDest IP
          Dec 30, 2024 03:53:03.689090967 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:03.689136028 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:03.709846973 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:03.768805027 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:03.823962927 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:03.922703028 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.032711983 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.162782907 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.302726030 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.482729912 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.672723055 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:04.883706093 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:05.102711916 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:05.343707085 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:05.612725019 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:05.902717113 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:06.234829903 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:06.569778919 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:06.918720961 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:07.289746046 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:07.668859959 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.080200911 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.518815041 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.711647034 CET503676341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.801759958 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.801811934 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.832591057 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.879992008 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:08.996959925 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:09.088485003 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:09.249202013 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:26.706147909 CET503686341192.168.2.4192.168.1.2
          Dec 30, 2024 03:53:32.634351969 CET5357738162.159.36.2192.168.2.4
          Dec 30, 2024 03:53:33.071273088 CET5997453192.168.2.41.1.1.1
          Dec 30, 2024 03:53:33.078438997 CET53599741.1.1.1192.168.2.4
          Dec 30, 2024 03:53:34.279934883 CET4922453192.168.2.41.1.1.1
          Dec 30, 2024 03:53:34.288836956 CET53492241.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 30, 2024 03:53:33.071273088 CET192.168.2.41.1.1.10x10e1Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
          Dec 30, 2024 03:53:34.279934883 CET192.168.2.41.1.1.10xeb4cStandard query (0)53.210.109.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 30, 2024 03:53:33.078438997 CET1.1.1.1192.168.2.40x10e1Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
          Dec 30, 2024 03:53:34.288836956 CET1.1.1.1192.168.2.40xeb4cName error (3)53.210.109.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:21:53:00
          Start date:29/12/2024
          Path:C:\Users\user\Desktop\quHmbPnLFV.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\quHmbPnLFV.exe"
          Imagebase:0x7ff665b40000
          File size:2'835'456 bytes
          MD5 hash:E4A3903DECCB9128673C052CA0A31080
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:21:53:08
          Start date:29/12/2024
          Path:C:\Windows\System32\WerFault.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\WerFault.exe -u -p 7296 -s 1356
          Imagebase:0x7ff6498d0000
          File size:570'736 bytes
          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:2.8%
            Dynamic/Decrypted Code Coverage:65.2%
            Signature Coverage:19.1%
            Total number of Nodes:1660
            Total number of Limit Nodes:85
            execution_graph 74756 1fe8fae6424 74757 1fe8fae642d 74756->74757 74758 1fe8fae643c 74757->74758 74773 1fe8faee5f8 25 API calls 5 library calls 74757->74773 74761 1fe8fae6459 __SehTransFilter 74758->74761 74762 1fe8fae6968 74758->74762 74763 1fe8fae69a2 _cftoe_l _recalloc 74762->74763 74764 1fe8fae69be RtlCaptureContext RtlLookupFunctionEntry 74763->74764 74765 1fe8fae69f7 RtlVirtualUnwind 74764->74765 74766 1fe8fae6a2e 74764->74766 74767 1fe8fae6a4a IsDebuggerPresent 74765->74767 74766->74767 74774 1fe8faf8270 74767->74774 74769 1fe8fae6a6d UnhandledExceptionFilter 74770 1fe8fae6a7c _cftoe_l 74769->74770 74771 1fe8fae3a20 _cftoe_l 7 API calls 74770->74771 74772 1fe8fae6a9b 74771->74772 74772->74761 74773->74758 74775 1fe8faf8272 74774->74775 74776 7ff665b44100 74787 7ff665b44fc0 74776->74787 74784 7ff665b44176 74840 7ff665c20a50 74784->74840 74849 7ff665c20ce8 74787->74849 74790 7ff665b45013 74858 7ff665b5f730 74790->74858 74796 7ff665b43fb0 CryptAcquireContextW 74797 7ff665b44027 CryptCreateHash 74796->74797 74798 7ff665b43ff3 CryptAcquireContextW 74796->74798 74800 7ff665b44049 CryptHashData 74797->74800 74801 7ff665b440c7 CryptReleaseContext 74797->74801 74798->74797 74799 7ff665b44016 74798->74799 75428 7ff665b43f50 69 API calls _SyncOriginator 74799->75428 74804 7ff665b440bd CryptDestroyHash 74800->74804 74805 7ff665b44065 CryptDeriveKey 74800->74805 74802 7ff665b440d3 CloseHandle CloseHandle 74801->74802 74806 7ff665c20a50 _handle_error 8 API calls 74802->74806 74804->74801 74805->74804 74808 7ff665b4408b CryptDecrypt CryptDestroyKey 74805->74808 74809 7ff665b440f9 74806->74809 74807 7ff665b44022 74807->74802 74808->74804 74810 7ff665b44610 74809->74810 74811 7ff665b44641 GetModuleHandleW GetProcAddress 74810->74811 74812 7ff665b44665 74810->74812 74811->74812 74813 7ff665b44b72 SetLastError 74812->74813 74814 7ff665b446a2 SetLastError 74812->74814 74820 7ff665b446b4 74812->74820 74815 7ff665b44874 74814->74815 74816 7ff665c20a50 _handle_error 8 API calls 74815->74816 74817 7ff665b4414f 74816->74817 74839 7ff665b45440 127 API calls 3 library calls 74817->74839 74818 7ff665b44728 GetNativeSystemInfo 74818->74813 74819 7ff665b4475e VirtualAlloc 74818->74819 74821 7ff665b44787 VirtualAlloc 74819->74821 74822 7ff665b447b4 GetProcessHeap HeapAlloc 74819->74822 74820->74813 74820->74818 74821->74822 74823 7ff665b447a4 SetLastError 74821->74823 74824 7ff665b447e1 VirtualFree SetLastError 74822->74824 74825 7ff665b447ff 74822->74825 74823->74815 74824->74815 74826 7ff665b448b8 VirtualAlloc 74825->74826 74827 7ff665b44861 SetLastError 74825->74827 74833 7ff665b448e2 memcpy_s 74826->74833 74828 7ff665b4486c 74827->74828 75444 7ff665b44b90 GetProcessHeap HeapFree __std_exception_copy 74828->75444 74831 7ff665b44973 VirtualAlloc 74831->74828 74831->74833 74833->74827 74833->74828 74833->74831 74837 7ff665b449ca 74833->74837 74836 7ff665b44aa8 74836->74815 74838 7ff665b44af6 RtlAddFunctionTable 74836->74838 74837->74828 75429 7ff665b44410 74837->75429 74838->74815 74839->74784 74841 7ff665c20a5a 74840->74841 74842 7ff665b44185 74841->74842 74843 7ff665c21640 IsProcessorFeaturePresent 74841->74843 74844 7ff665c21657 74843->74844 75456 7ff665c21834 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 74844->75456 74846 7ff665c2166a 75457 7ff665c2160c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 74846->75457 74851 7ff665c20cf3 74849->74851 74850 7ff665b44ff8 74850->74790 74891 7ff665b45060 105 API calls 3 library calls 74850->74891 74851->74850 74853 7ff665c20d12 74851->74853 74892 7ff665c309f0 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 74851->74892 74857 7ff665c20d1d 74853->74857 74893 7ff665c21cc8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 74853->74893 74856 7ff665c20d23 74894 7ff665c21ce8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 74857->74894 74859 7ff665b5f76a 74858->74859 74862 7ff665b5f780 std::bad_exception::bad_exception 74859->74862 74895 7ff665b6f9e0 105 API calls std::bad_exception::bad_exception 74859->74895 74861 7ff665b45022 74869 7ff665b46dc0 74861->74869 74862->74861 74896 7ff665b616d0 88 API calls 2 library calls 74862->74896 74864 7ff665b5f7a5 74865 7ff665b5f7b3 74864->74865 74866 7ff665b5f7d5 74864->74866 74865->74861 74897 7ff665b61490 24 API calls std::bad_exception::bad_exception 74865->74897 74898 7ff665b651f0 105 API calls 3 library calls 74866->74898 74870 7ff665b46e0d 74869->74870 74871 7ff665b46e11 74869->74871 74874 7ff665b46e3b Concurrency::details::ExternalContextBase::~ExternalContextBase _SyncOriginator 74870->74874 74994 7ff665b66460 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 74870->74994 74993 7ff665b46f90 43 API calls 2 library calls 74871->74993 74899 7ff665b6b900 74874->74899 74875 7ff665b46e2f 74875->74874 74995 7ff665b46f90 43 API calls 2 library calls 74875->74995 74878 7ff665b46ec2 74881 7ff665b46ee0 74878->74881 74996 7ff665b63e10 105 API calls 2 library calls 74878->74996 74879 7ff665b46e99 74879->74878 74972 7ff665b46660 74879->74972 74882 7ff665b46f24 74881->74882 74997 7ff665b46f90 43 API calls 2 library calls 74881->74997 74884 7ff665b46f3b 74882->74884 74998 7ff665b45c80 139 API calls 3 library calls 74882->74998 74977 7ff665b478d0 74884->74977 74891->74790 74892->74851 74894->74856 74895->74862 74896->74864 74897->74861 74898->74861 74999 7ff665b49df0 74899->74999 74901 7ff665b6b938 74902 7ff665b6bc94 74901->74902 75014 7ff665b46730 54 API calls 74901->75014 74903 7ff665b49df0 std::bad_exception::bad_exception 24 API calls 74902->74903 74905 7ff665b6bca5 74903->74905 74908 7ff665b6be4a 74905->74908 75030 7ff665b796d0 113 API calls std::bad_exception::bad_exception 74905->75030 74906 7ff665b6b976 75015 7ff665b66a60 105 API calls 2 library calls 74906->75015 75005 7ff665bbc830 74908->75005 74909 7ff665b6b983 Concurrency::details::ExternalContextBase::~ExternalContextBase 75016 7ff665b66cd0 88 API calls 2 library calls 74909->75016 74913 7ff665b6b9c9 74968 7ff665b6bc8a 74913->74968 75017 7ff665b6c7b0 9 API calls 2 library calls 74913->75017 74914 7ff665b6c174 74927 7ff665b6c1b5 Concurrency::details::ExternalContextBase::~ExternalContextBase 74914->74927 75046 7ff665b6a460 48 API calls std::bad_exception::bad_exception 74914->75046 74915 7ff665b6be76 Concurrency::details::ExternalContextBase::~ExternalContextBase 74915->74914 75035 7ff665b66a60 105 API calls 2 library calls 74915->75035 74918 7ff665b6bcd3 Concurrency::details::ExternalContextBase::~ExternalContextBase 75031 7ff665b6ccc0 113 API calls 2 library calls 74918->75031 74920 7ff665b6bec0 75036 7ff665b66cd0 88 API calls 2 library calls 74920->75036 74924 7ff665b6bd3d 75032 7ff665b6cc90 24 API calls 74924->75032 74925 7ff665b6c190 75047 7ff665b6d1e0 24 API calls 2 library calls 74925->75047 74927->74879 74928 7ff665b6bed6 74971 7ff665b6c16a 74928->74971 75037 7ff665b6c7b0 9 API calls 2 library calls 74928->75037 74931 7ff665b6bace 75025 7ff665b6ccc0 113 API calls 2 library calls 74931->75025 74932 7ff665b6b9d6 74964 7ff665b6ba3a Concurrency::details::ExternalContextBase::~ExternalContextBase 74932->74964 75018 7ff665b69d00 74932->75018 74934 7ff665b6bd4b 75033 7ff665b6ae20 24 API calls 74934->75033 74935 7ff665b6c1a3 74935->74927 75048 7ff665b6a920 44 API calls std::bad_exception::bad_exception 74935->75048 74937 7ff665b6b9f8 75022 7ff665b6d140 24 API calls 74937->75022 74941 7ff665b6bae7 75026 7ff665b6cc90 24 API calls 74941->75026 74943 7ff665b6bee3 74950 7ff665b69d00 24 API calls 74943->74950 74965 7ff665b6bf49 Concurrency::details::ExternalContextBase::~ExternalContextBase 74943->74965 74946 7ff665b6ba05 75023 7ff665b4ace0 88 API calls 2 library calls 74946->75023 74947 7ff665b6baf5 75027 7ff665b6ad40 24 API calls 74947->75027 74952 7ff665b6bef9 74950->74952 75038 7ff665b6d140 24 API calls 74952->75038 74953 7ff665b6bfb0 75041 7ff665b6ccc0 113 API calls 2 library calls 74953->75041 74956 7ff665b6bf06 75039 7ff665b4ace0 88 API calls 2 library calls 74956->75039 74957 7ff665b6bfc9 75042 7ff665b6cc90 24 API calls 74957->75042 74960 7ff665b6bd58 Concurrency::details::ExternalContextBase::~ExternalContextBase 75034 7ff665b799b0 113 API calls 74960->75034 74961 7ff665b6bfd7 75043 7ff665b6ad40 24 API calls 74961->75043 75024 7ff665b79790 113 API calls std::bad_exception::bad_exception 74964->75024 75040 7ff665b79790 113 API calls std::bad_exception::bad_exception 74965->75040 74966 7ff665b6bb07 Concurrency::details::ExternalContextBase::~ExternalContextBase 75028 7ff665b799b0 113 API calls 74966->75028 75029 7ff665b66b00 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 74968->75029 74969 7ff665b6bfe9 Concurrency::details::ExternalContextBase::~ExternalContextBase 75044 7ff665b799b0 113 API calls 74969->75044 75045 7ff665b66b00 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 74971->75045 74973 7ff665c20ce8 std::bad_exception::bad_exception 4 API calls 74972->74973 74974 7ff665b4667d 74973->74974 74975 7ff665b46692 74974->74975 75299 7ff665b70dd0 74974->75299 74975->74878 74978 7ff665b46f43 74977->74978 74984 7ff665b47904 Concurrency::details::ExternalContextBase::~ExternalContextBase 74977->74984 74985 7ff665b47c80 74978->74985 74984->74978 75420 7ff665b4dc60 24 API calls 2 library calls 74984->75420 75421 7ff665b4f140 24 API calls 2 library calls 74984->75421 75422 7ff665b4f770 24 API calls std::bad_exception::bad_exception 74984->75422 75423 7ff665b46c40 54 API calls 74984->75423 75424 7ff665b46ca0 54 API calls 74984->75424 74986 7ff665b47ca7 74985->74986 74987 7ff665b44144 74985->74987 75425 7ff665b470c0 43 API calls 2 library calls 74986->75425 74987->74796 74989 7ff665b47cac 74989->74987 75426 7ff665b6a460 48 API calls std::bad_exception::bad_exception 74989->75426 74992 7ff665b47cc3 74992->74987 75427 7ff665b6a920 44 API calls std::bad_exception::bad_exception 74992->75427 74993->74870 74994->74875 74995->74874 74996->74881 74997->74882 74998->74884 75000 7ff665b49e3b 74999->75000 75004 7ff665b49e45 Concurrency::details::ExternalContextBase::~ExternalContextBase std::bad_exception::bad_exception 75000->75004 75049 7ff665b4f610 24 API calls 2 library calls 75000->75049 75002 7ff665b49e94 75002->75004 75050 7ff665b4eff0 24 API calls 3 library calls 75002->75050 75004->74901 75051 7ff665be57f0 75005->75051 75012 7ff665bbc86b Concurrency::details::ExternalContextBase::~ExternalContextBase 75013 7ff665bbc957 Concurrency::details::ExternalContextBase::~ExternalContextBase 75012->75013 75087 7ff665b68c70 75012->75087 75090 7ff665b66f30 75012->75090 75095 7ff665b681c0 75012->75095 75100 7ff665b68720 139 API calls 2 library calls 75012->75100 75101 7ff665b691b0 139 API calls 75012->75101 75013->74915 75014->74906 75015->74909 75016->74913 75017->74932 75019 7ff665b69d43 75018->75019 75021 7ff665b69d86 Concurrency::details::ExternalContextBase::~ExternalContextBase 75019->75021 75298 7ff665b56cc0 24 API calls 3 library calls 75019->75298 75021->74937 75022->74946 75023->74964 75024->74931 75025->74941 75026->74947 75027->74966 75028->74968 75030->74918 75031->74924 75032->74934 75033->74960 75034->74908 75035->74920 75036->74928 75037->74943 75038->74956 75039->74965 75040->74953 75041->74957 75042->74961 75043->74969 75044->74971 75046->74925 75047->74935 75048->74927 75049->75002 75050->75004 75052 7ff665be5856 75051->75052 75053 7ff665be5867 SHGetSpecialFolderPathW 75052->75053 75086 7ff665be5a8f Concurrency::details::ExternalContextBase::~ExternalContextBase 75052->75086 75055 7ff665be5890 75053->75055 75053->75086 75124 7ff665be5770 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75055->75124 75058 7ff665be589e 75060 7ff665be59c0 Concurrency::details::ExternalContextBase::~ExternalContextBase 75058->75060 75125 7ff665b47650 43 API calls 75058->75125 75131 7ff665b45b30 75060->75131 75061 7ff665be5b36 Concurrency::details::ExternalContextBase::~ExternalContextBase 75065 7ff665c20a50 _handle_error 8 API calls 75061->75065 75066 7ff665be5b75 75065->75066 75066->75012 75068 7ff665be5a0f 75071 7ff665b45b30 24 API calls 75068->75071 75069 7ff665be58bb Concurrency::details::ExternalContextBase::~ExternalContextBase 75070 7ff665be5922 Concurrency::details::ExternalContextBase::~ExternalContextBase 75069->75070 75126 7ff665b47650 43 API calls 75069->75126 75128 7ff665b46130 43 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75070->75128 75072 7ff665be5a1b Concurrency::details::ExternalContextBase::~ExternalContextBase 75071->75072 75138 7ff665b45e00 139 API calls 2 library calls 75072->75138 75075 7ff665be58ff 75127 7ff665bdecf0 24 API calls 2 library calls 75075->75127 75078 7ff665be5a54 75139 7ff665bbd520 24 API calls 75078->75139 75079 7ff665be595b Concurrency::details::ExternalContextBase::~ExternalContextBase 75079->75060 75129 7ff665b46130 43 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75079->75129 75082 7ff665be599f 75130 7ff665bdecf0 24 API calls 2 library calls 75082->75130 75083 7ff665be5a81 75085 7ff665b45b30 24 API calls 75083->75085 75085->75086 75102 7ff665be5b90 75086->75102 75145 7ff665b685b0 75087->75145 75089 7ff665b68c86 75089->75012 75091 7ff665c20ce8 std::bad_exception::bad_exception 4 API calls 75090->75091 75092 7ff665b66f58 75091->75092 75093 7ff665b66f6d 75092->75093 75153 7ff665b67240 139 API calls 2 library calls 75092->75153 75093->75012 75096 7ff665b681dc 75095->75096 75097 7ff665b681d4 75095->75097 75098 7ff665b68204 75096->75098 75154 7ff665bafef0 75096->75154 75097->75012 75098->75012 75100->75012 75101->75012 75103 7ff665be5c11 75102->75103 75106 7ff665be5d0c Concurrency::details::ExternalContextBase::~ExternalContextBase 75102->75106 75140 7ff665c21200 5 API calls std::bad_exception::bad_exception 75103->75140 75108 7ff665c20a50 _handle_error 8 API calls 75106->75108 75110 7ff665be5b28 75108->75110 75118 7ff665b47850 75110->75118 75119 7ff665b47896 75118->75119 75120 7ff665b47871 75118->75120 75142 7ff665b5eb70 24 API calls 2 library calls 75119->75142 75141 7ff665b46910 24 API calls std::bad_exception::bad_exception 75120->75141 75123 7ff665b4787c 75123->75061 75124->75058 75125->75069 75126->75075 75127->75070 75128->75079 75129->75082 75130->75060 75132 7ff665b45b7b 75131->75132 75133 7ff665b45b51 75131->75133 75144 7ff665b5e770 24 API calls 2 library calls 75132->75144 75143 7ff665b46910 24 API calls std::bad_exception::bad_exception 75133->75143 75136 7ff665b45b61 75136->75086 75137 7ff665b45e00 139 API calls 2 library calls 75136->75137 75137->75068 75138->75078 75139->75083 75141->75123 75142->75123 75143->75136 75144->75136 75148 7ff665b51b80 75145->75148 75147 7ff665b68607 memcpy_s 75147->75089 75149 7ff665b51bab std::bad_exception::bad_exception 75148->75149 75150 7ff665b51bb8 75149->75150 75152 7ff665b49cb0 24 API calls 3 library calls 75149->75152 75150->75147 75152->75150 75153->75093 75155 7ff665baff51 75154->75155 75194 7ff665bad4d0 75155->75194 75157 7ff665baff65 75158 7ff665baffa3 75157->75158 75163 7ff665bb00aa Concurrency::details::ExternalContextBase::~ExternalContextBase 75157->75163 75226 7ff665bb1260 30 API calls 3 library calls 75158->75226 75160 7ff665baffaf 75160->75163 75227 7ff665bb1950 32 API calls 2 library calls 75160->75227 75162 7ff665baffcb 75228 7ff665bad2d0 24 API calls 75162->75228 75165 7ff665bb00f6 Concurrency::details::ExternalContextBase::~ExternalContextBase 75163->75165 75166 7ff665bb0295 75163->75166 75167 7ff665bb0138 SetErrorMode 75163->75167 75183 7ff665c20a50 _handle_error 8 API calls 75165->75183 75171 7ff665bb02af 75166->75171 75232 7ff665bb05b0 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75166->75232 75197 7ff665badba0 75167->75197 75171->75165 75173 7ff665bb02e8 75171->75173 75176 7ff665badba0 28 API calls 75173->75176 75175 7ff665baffd9 Concurrency::details::ExternalContextBase::~ExternalContextBase 75175->75163 75178 7ff665bb02f7 75176->75178 75177 7ff665bb01a5 Concurrency::details::ExternalContextBase::~ExternalContextBase 75180 7ff665bb0259 75177->75180 75181 7ff665bb01d6 75177->75181 75233 7ff665bb0b00 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75178->75233 75204 7ff665bb3030 GetLastError 75180->75204 75229 7ff665bad8e0 75181->75229 75186 7ff665bb043a 75183->75186 75186->75098 75187 7ff665bb01db 75188 7ff665bb0286 SetErrorMode 75187->75188 75188->75166 75190 7ff665bb0303 75190->75165 75192 7ff665bb0272 75192->75188 75193 7ff665bb0276 SetErrorMode 75192->75193 75193->75165 75234 7ff665badcd0 75194->75234 75245 7ff665baddf0 75197->75245 75199 7ff665badbbd 75200 7ff665b59470 75199->75200 75201 7ff665b59483 75200->75201 75202 7ff665b59490 GetFileAttributesExW 75200->75202 75295 7ff665b56cc0 24 API calls 3 library calls 75201->75295 75202->75177 75205 7ff665bb3060 75204->75205 75206 7ff665bb3069 75204->75206 75205->75206 75207 7ff665bb313e 75205->75207 75208 7ff665badba0 28 API calls 75206->75208 75211 7ff665c20a50 _handle_error 8 API calls 75207->75211 75209 7ff665bb3076 75208->75209 75296 7ff665bb0b00 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75209->75296 75213 7ff665bb0261 75211->75213 75212 7ff665bb3083 75212->75207 75214 7ff665bad8e0 24 API calls 75212->75214 75213->75188 75216 7ff665bb2e70 75213->75216 75215 7ff665bb309e 75214->75215 75215->75207 75217 7ff665bad8e0 24 API calls 75216->75217 75218 7ff665bb2e96 75217->75218 75219 7ff665bb2e9a GetLogicalDrives 75218->75219 75220 7ff665bb2f0b 75218->75220 75222 7ff665bad4d0 24 API calls 75219->75222 75221 7ff665badba0 28 API calls 75220->75221 75224 7ff665bb2f18 75221->75224 75223 7ff665bb2eaf Concurrency::details::ExternalContextBase::~ExternalContextBase _SyncOriginator 75222->75223 75223->75192 75224->75223 75297 7ff665bb32c0 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75224->75297 75226->75160 75227->75162 75228->75175 75230 7ff665badcd0 24 API calls 75229->75230 75231 7ff665bad8ee 75230->75231 75231->75187 75232->75171 75233->75190 75235 7ff665bad4ed 75234->75235 75236 7ff665badce6 75234->75236 75235->75157 75236->75235 75242 7ff665b692d0 24 API calls 2 library calls 75236->75242 75238 7ff665badd02 Concurrency::details::ExternalContextBase::~ExternalContextBase 75240 7ff665badd89 Concurrency::details::ExternalContextBase::~ExternalContextBase 75238->75240 75243 7ff665b56e00 24 API calls 2 library calls 75238->75243 75240->75235 75244 7ff665b56e00 24 API calls 2 library calls 75240->75244 75242->75238 75243->75240 75244->75235 75246 7ff665bade10 75245->75246 75254 7ff665badec6 Concurrency::details::ExternalContextBase::~ExternalContextBase 75245->75254 75247 7ff665badcd0 24 API calls 75246->75247 75246->75254 75248 7ff665bade34 75247->75248 75253 7ff665bade66 Concurrency::details::ExternalContextBase::~ExternalContextBase 75248->75253 75267 7ff665bad670 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75248->75267 75250 7ff665b69d00 24 API calls 75251 7ff665badeb8 75250->75251 75255 7ff665bb5fd0 75251->75255 75253->75250 75254->75199 75256 7ff665bb6025 75255->75256 75266 7ff665bb6029 Concurrency::details::ExternalContextBase::~ExternalContextBase 75256->75266 75268 7ff665bb1450 75256->75268 75258 7ff665bb6050 75284 7ff665b54ad0 75258->75284 75260 7ff665bb60e5 75294 7ff665b68cb0 24 API calls 75260->75294 75261 7ff665bb6062 75261->75260 75289 7ff665b52640 75261->75289 75264 7ff665bb60d6 75293 7ff665b56e00 24 API calls 2 library calls 75264->75293 75266->75254 75267->75253 75270 7ff665bb14ce 75268->75270 75277 7ff665bb14eb 75268->75277 75269 7ff665b59470 24 API calls 75271 7ff665bb151f GetFullPathNameW 75269->75271 75274 7ff665b49cb0 std::bad_exception::bad_exception 24 API calls 75270->75274 75270->75277 75272 7ff665bb1589 75271->75272 75273 7ff665bb153a 75271->75273 75276 7ff665bb15a1 Concurrency::details::ExternalContextBase::~ExternalContextBase 75272->75276 75279 7ff665b46d40 24 API calls 75272->75279 75275 7ff665b795d0 24 API calls 75273->75275 75274->75277 75278 7ff665bb1563 75275->75278 75280 7ff665bb1610 __std_exception_copy 75276->75280 75282 7ff665b52390 _SyncOriginator 24 API calls 75276->75282 75277->75269 75281 7ff665b59470 24 API calls 75278->75281 75279->75276 75280->75258 75283 7ff665bb1574 GetFullPathNameW 75281->75283 75282->75280 75283->75272 75285 7ff665b54ae4 75284->75285 75287 7ff665b54af6 std::bad_exception::bad_exception 75284->75287 75285->75261 75286 7ff665b54b63 _SyncOriginator 75286->75261 75287->75286 75288 7ff665b49cb0 std::bad_exception::bad_exception 24 API calls 75287->75288 75288->75286 75290 7ff665b52656 75289->75290 75291 7ff665b5268d _SyncOriginator 75289->75291 75290->75291 75292 7ff665b56cc0 _SyncOriginator 24 API calls 75290->75292 75291->75264 75292->75291 75293->75260 75294->75266 75295->75202 75296->75212 75297->75223 75298->75021 75300 7ff665c20ce8 std::bad_exception::bad_exception 4 API calls 75299->75300 75301 7ff665b70df8 75300->75301 75302 7ff665b70e0a 75301->75302 75306 7ff665b70e40 75301->75306 75311 7ff665b66740 105 API calls std::bad_exception::bad_exception 75302->75311 75305 7ff665b70e19 75305->74975 75312 7ff665b5f920 75306->75312 75311->75305 75313 7ff665b5f99c GetCurrentThreadId 75312->75313 75314 7ff665b5f964 75312->75314 75316 7ff665b74400 75313->75316 75340 7ff665b4ad50 88 API calls 2 library calls 75314->75340 75317 7ff665b70eeb 75316->75317 75318 7ff665b74423 75316->75318 75317->75302 75341 7ff665bc0830 75318->75341 75320 7ff665b7442f 75321 7ff665b74443 75320->75321 75383 7ff665b6a460 48 API calls std::bad_exception::bad_exception 75320->75383 75323 7ff665b54ad0 _SyncOriginator 24 API calls 75321->75323 75339 7ff665b7458f Concurrency::details::ExternalContextBase::~ExternalContextBase 75321->75339 75325 7ff665b74470 Concurrency::details::ExternalContextBase::~ExternalContextBase 75323->75325 75326 7ff665b59470 24 API calls 75325->75326 75327 7ff665b7449f 75326->75327 75351 7ff665b79080 75327->75351 75329 7ff665b744a9 75330 7ff665b744ba GetProcAddress 75329->75330 75331 7ff665b744b6 Concurrency::details::ExternalContextBase::~ExternalContextBase 75329->75331 75330->75331 75332 7ff665b54ad0 _SyncOriginator 24 API calls 75331->75332 75333 7ff665b7453f Concurrency::details::ExternalContextBase::~ExternalContextBase 75332->75333 75334 7ff665b59470 24 API calls 75333->75334 75335 7ff665b74565 75334->75335 75336 7ff665b79080 139 API calls 75335->75336 75337 7ff665b7456f 75336->75337 75338 7ff665b7457c GetProcAddress 75337->75338 75337->75339 75338->75339 75339->75317 75384 7ff665b6a920 44 API calls std::bad_exception::bad_exception 75339->75384 75342 7ff665bc0842 75341->75342 75350 7ff665bc07fe 75341->75350 75387 7ff665bc0870 43 API calls 2 library calls 75342->75387 75344 7ff665bc0780 75345 7ff665c20ce8 std::bad_exception::bad_exception 4 API calls 75344->75345 75344->75350 75346 7ff665bc07c4 75345->75346 75348 7ff665bc07dc 75346->75348 75385 7ff665b69ea0 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::bad_exception::bad_exception 75346->75385 75348->75350 75386 7ff665b6a010 88 API calls 2 library calls 75348->75386 75350->75320 75352 7ff665b790bd 75351->75352 75353 7ff665b79153 75351->75353 75402 7ff665b664f0 26 API calls 3 library calls 75352->75402 75388 7ff665b79500 GetSystemDirectoryW 75353->75388 75356 7ff665b7915c 75358 7ff665b45b30 24 API calls 75356->75358 75357 7ff665b790c6 75359 7ff665b66f30 138 API calls 75357->75359 75364 7ff665b79169 Concurrency::details::ExternalContextBase::~ExternalContextBase 75358->75364 75360 7ff665b790d3 75359->75360 75403 7ff665b68450 24 API calls _SyncOriginator 75360->75403 75362 7ff665b790e0 75363 7ff665b45b30 24 API calls 75362->75363 75371 7ff665b790ed Concurrency::details::ExternalContextBase::~ExternalContextBase 75363->75371 75366 7ff665b49df0 std::bad_exception::bad_exception 24 API calls 75364->75366 75382 7ff665b79238 Concurrency::details::ExternalContextBase::~ExternalContextBase 75364->75382 75369 7ff665b791af 75366->75369 75367 7ff665b792fa 75368 7ff665b52640 24 API calls 75367->75368 75381 7ff665b79323 Concurrency::details::ExternalContextBase::~ExternalContextBase 75368->75381 75370 7ff665b54ad0 _SyncOriginator 24 API calls 75369->75370 75372 7ff665b791d4 Concurrency::details::ExternalContextBase::~ExternalContextBase 75370->75372 75371->75353 75404 7ff665b58230 24 API calls 75372->75404 75374 7ff665b7922b 75405 7ff665b78fd0 24 API calls 75374->75405 75377 7ff665b79402 Concurrency::details::ExternalContextBase::~ExternalContextBase 75377->75329 75379 7ff665b59470 24 API calls 75380 7ff665b793ab LoadLibraryExW 75379->75380 75380->75377 75380->75381 75381->75377 75381->75379 75398 7ff665b524d0 75381->75398 75406 7ff665b52390 24 API calls _SyncOriginator 75381->75406 75395 7ff665b46d40 75382->75395 75383->75321 75384->75317 75385->75348 75386->75350 75387->75344 75389 7ff665b7958d 75388->75389 75390 7ff665b79553 75388->75390 75392 7ff665b46d40 24 API calls 75389->75392 75407 7ff665b795d0 24 API calls 2 library calls 75390->75407 75394 7ff665b7959d __std_exception_copy 75392->75394 75393 7ff665b7957e GetSystemDirectoryW 75393->75389 75394->75356 75408 7ff665b54d90 75395->75408 75397 7ff665b46d68 Concurrency::details::ExternalContextBase::~ExternalContextBase 75397->75367 75399 7ff665b524fb Concurrency::details::ExternalContextBase::~ExternalContextBase memcpy_s 75398->75399 75400 7ff665b524f3 75398->75400 75399->75381 75400->75399 75419 7ff665b56cc0 24 API calls 3 library calls 75400->75419 75402->75357 75403->75362 75404->75374 75405->75382 75406->75381 75407->75393 75409 7ff665b54db7 75408->75409 75410 7ff665b54da4 75408->75410 75413 7ff665b975e0 75409->75413 75410->75397 75414 7ff665b97638 75413->75414 75415 7ff665b51b80 _SyncOriginator 24 API calls 75414->75415 75418 7ff665b97670 75415->75418 75416 7ff665b59030 _SyncOriginator 24 API calls 75417 7ff665b54dee 75416->75417 75417->75397 75418->75416 75419->75399 75420->74984 75421->74984 75422->74984 75423->74984 75424->74984 75425->74989 75426->74992 75427->74987 75428->74807 75430 7ff665b44437 IsBadReadPtr 75429->75430 75431 7ff665b44552 75429->75431 75430->75431 75432 7ff665b4445c 75430->75432 75431->74828 75438 7ff665b44280 75431->75438 75432->75431 75434 7ff665b4456e SetLastError 75432->75434 75435 7ff665b44538 IsBadReadPtr 75432->75435 75436 7ff665b44554 SetLastError 75432->75436 75434->75431 75435->75431 75435->75432 75436->75431 75442 7ff665b442cf 75438->75442 75439 7ff665b443d2 75440 7ff665b44190 10 API calls 75439->75440 75441 7ff665b443e4 75440->75441 75441->74828 75441->74836 75442->75439 75442->75441 75445 7ff665b44190 75442->75445 75444->74815 75446 7ff665b441fb 75445->75446 75447 7ff665b441b4 75445->75447 75448 7ff665c20a50 _handle_error 8 API calls 75446->75448 75449 7ff665b44213 VirtualProtect 75447->75449 75452 7ff665b441bf 75447->75452 75450 7ff665b4420d 75448->75450 75449->75446 75451 7ff665b44268 75449->75451 75450->75442 75453 7ff665c20a50 _handle_error 8 API calls 75451->75453 75452->75446 75454 7ff665b441ea VirtualFree 75452->75454 75455 7ff665b44275 75453->75455 75454->75446 75455->75442 75456->74846 75458 7ff665b41000 75461 7ff665b4a440 75458->75461 75462 7ff665b4a458 memcpy_s 75461->75462 75466 7ff665b41009 75461->75466 75463 7ff665b4a491 GetVersionExW 75462->75463 75464 7ff665b4a4a3 75463->75464 75469 7ff665b4a4c4 75463->75469 75464->75469 75471 7ff665b49920 75464->75471 75469->75466 75499 7ff665b4d680 88 API calls 4 library calls 75469->75499 75472 7ff665b49969 Concurrency::details::ExternalContextBase::~ExternalContextBase 75471->75472 75473 7ff665b59470 24 API calls 75472->75473 75474 7ff665b499c3 75473->75474 75475 7ff665b79080 139 API calls 75474->75475 75476 7ff665b499cd 75475->75476 75477 7ff665b499de GetProcAddress 75476->75477 75481 7ff665b49aee Concurrency::details::ExternalContextBase::~ExternalContextBase 75476->75481 75478 7ff665b49a0c 75477->75478 75479 7ff665b499f9 75477->75479 75482 7ff665b49a25 GetProcAddress 75478->75482 75483 7ff665b49a20 75478->75483 75480 7ff665b59470 24 API calls 75479->75480 75484 7ff665b49a02 75480->75484 75485 7ff665c20a50 _handle_error 8 API calls 75481->75485 75482->75483 75488 7ff665b59470 24 API calls 75483->75488 75493 7ff665b49a57 75483->75493 75486 7ff665b79080 139 API calls 75484->75486 75487 7ff665b49b7f 75485->75487 75486->75478 75487->75469 75498 7ff665b497b0 17 API calls 2 library calls 75487->75498 75490 7ff665b49a4d 75488->75490 75489 7ff665b49a68 GetProcAddress 75491 7ff665b49a64 75489->75491 75492 7ff665b79080 139 API calls 75490->75492 75491->75481 75494 7ff665b49a96 GetFileVersionInfoSizeExW 75491->75494 75492->75493 75493->75489 75493->75491 75494->75481 75495 7ff665b49acc 75494->75495 75500 7ff665c20d2c 75495->75500 75498->75469 75499->75466 75502 7ff665c20ce8 75500->75502 75501 7ff665b49ad4 GetFileVersionInfoW 75501->75481 75502->75501 75504 7ff665c20d12 75502->75504 75509 7ff665c309f0 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 75502->75509 75505 7ff665c20d1d 75504->75505 75510 7ff665c21cc8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 75504->75510 75511 7ff665c21ce8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 75505->75511 75508 7ff665c20d23 75509->75502 75511->75508 75512 14000ca2c 75513 14000ca44 75512->75513 75555 140011aa0 HeapCreate 75513->75555 75516 14000caaf 75560 14000e938 69 API calls 2 library calls 75516->75560 75517 14000ca96 75568 14000f5ec 61 API calls 2 library calls 75517->75568 75518 14000ca9b 75569 14000f38c 61 API calls 4 library calls 75518->75569 75522 14000cab4 75524 14000cada _RTC_Initialize 75522->75524 75525 14000cac1 75522->75525 75526 14000cac6 75522->75526 75523 14000caa5 75570 14000edc8 GetModuleHandleW GetProcAddress ExitProcess malloc 75523->75570 75561 14001175c 68 API calls __onexitinit 75524->75561 75571 14000f5ec 61 API calls 2 library calls 75525->75571 75572 14000f38c 61 API calls 4 library calls 75526->75572 75530 14000cad0 75573 14000edc8 GetModuleHandleW GetProcAddress ExitProcess malloc 75530->75573 75533 14000cae5 75534 14000caf3 GetCommandLineW 75533->75534 75574 14000f124 61 API calls 2 library calls 75533->75574 75562 1400116d4 63 API calls 2 library calls 75534->75562 75537 14000cb05 75575 1400115e4 62 API calls 2 library calls 75537->75575 75539 14000cb11 75540 14000cb15 75539->75540 75541 14000cb1f 75539->75541 75576 14000f124 61 API calls 2 library calls 75540->75576 75563 140011314 61 API calls 5 library calls 75541->75563 75544 14000cb24 75545 14000cb32 75544->75545 75546 14000cb28 75544->75546 75564 14000eeac 72 API calls 2 library calls 75545->75564 75577 14000f124 61 API calls 2 library calls 75546->75577 75549 14000cb3c 75550 14000cb47 75549->75550 75551 14000cb40 75549->75551 75565 1400041b0 6 API calls 75550->75565 75578 14000f124 61 API calls 2 library calls 75551->75578 75554 14000cb67 75556 14000ca89 75555->75556 75557 140011ac8 GetVersion 75555->75557 75556->75516 75556->75517 75556->75518 75558 140011ad2 HeapSetInformation 75557->75558 75559 140011aec 75557->75559 75558->75559 75559->75556 75560->75522 75561->75533 75562->75537 75563->75544 75564->75549 75579 140003310 75565->75579 75568->75518 75569->75523 75571->75526 75572->75530 75575->75539 75580 140003326 vscan_fn 75579->75580 75680 140003aa7 CreateThread CreateThread WaitForSingleObject CloseHandle Sleep 75579->75680 75681 1400045a0 73 API calls memcpy_s 75580->75681 75582 14000339d 75682 140003030 73 API calls 3 library calls 75582->75682 75584 1400033b7 75683 1400045a0 73 API calls memcpy_s 75584->75683 75586 1400033e7 75684 140003030 73 API calls 3 library calls 75586->75684 75588 140003401 75685 1400045a0 73 API calls memcpy_s 75588->75685 75590 140003431 75686 140003030 73 API calls 3 library calls 75590->75686 75592 14000344b 75687 1400045a0 73 API calls memcpy_s 75592->75687 75594 14000347b 75688 140003030 73 API calls 3 library calls 75594->75688 75596 140003495 75689 1400045a0 73 API calls memcpy_s 75596->75689 75598 1400034c5 75690 140003030 73 API calls 3 library calls 75598->75690 75600 1400034df 75691 1400045a0 73 API calls memcpy_s 75600->75691 75602 14000350f 75692 140003030 73 API calls 3 library calls 75602->75692 75604 140003529 75693 1400045a0 73 API calls memcpy_s 75604->75693 75606 140003559 75694 140003030 73 API calls 3 library calls 75606->75694 75608 140003573 75695 1400045a0 73 API calls memcpy_s 75608->75695 75610 1400035a3 75696 140003030 73 API calls 3 library calls 75610->75696 75612 1400035bd 75697 1400045a0 73 API calls memcpy_s 75612->75697 75614 1400035ed 75698 140003030 73 API calls 3 library calls 75614->75698 75616 140003607 75699 1400045a0 73 API calls memcpy_s 75616->75699 75618 140003637 75700 140003030 73 API calls 3 library calls 75618->75700 75620 140003651 75701 1400045a0 73 API calls memcpy_s 75620->75701 75622 140003681 75702 140003030 73 API calls 3 library calls 75622->75702 75624 14000369b 75703 1400045a0 73 API calls memcpy_s 75624->75703 75626 1400036cb 75704 140003030 73 API calls 3 library calls 75626->75704 75628 1400036e5 75705 1400045a0 73 API calls memcpy_s 75628->75705 75630 140003715 75706 140003030 73 API calls 3 library calls 75630->75706 75632 14000372f 75707 1400045a0 73 API calls memcpy_s 75632->75707 75634 14000375f 75708 140003030 73 API calls 3 library calls 75634->75708 75636 140003779 75709 1400045a0 73 API calls memcpy_s 75636->75709 75638 1400037a9 75710 140003030 73 API calls 3 library calls 75638->75710 75640 1400037c3 75711 1400045a0 73 API calls memcpy_s 75640->75711 75642 1400037f3 75712 140003030 73 API calls 3 library calls 75642->75712 75644 14000380d 75713 1400045a0 73 API calls memcpy_s 75644->75713 75646 14000383d 75714 140003030 73 API calls 3 library calls 75646->75714 75648 140003857 75715 1400045a0 73 API calls memcpy_s 75648->75715 75650 140003887 75716 140003030 73 API calls 3 library calls 75650->75716 75652 1400038a1 75717 1400045a0 73 API calls memcpy_s 75652->75717 75654 1400038d1 75718 140003030 73 API calls 3 library calls 75654->75718 75656 1400038eb 75719 1400045a0 73 API calls memcpy_s 75656->75719 75658 14000391b 75720 140003030 73 API calls 3 library calls 75658->75720 75660 140003935 75721 1400045a0 73 API calls memcpy_s 75660->75721 75662 140003965 75722 140003030 73 API calls 3 library calls 75662->75722 75664 14000397f 75723 1400045a0 73 API calls memcpy_s 75664->75723 75666 1400039af 75724 140003030 73 API calls 3 library calls 75666->75724 75668 1400039c9 75725 1400045a0 73 API calls memcpy_s 75668->75725 75670 1400039f9 75726 140003030 73 API calls 3 library calls 75670->75726 75672 140003a13 75727 1400045a0 73 API calls memcpy_s 75672->75727 75674 140003a43 75728 140003030 73 API calls 3 library calls 75674->75728 75676 140003a5d 75729 1400045a0 73 API calls memcpy_s 75676->75729 75678 140003a8d 75730 140003030 73 API calls 3 library calls 75678->75730 75680->75554 75681->75582 75682->75584 75683->75586 75684->75588 75685->75590 75686->75592 75687->75594 75688->75596 75689->75598 75690->75600 75691->75602 75692->75604 75693->75606 75694->75608 75695->75610 75696->75612 75697->75614 75698->75616 75699->75618 75700->75620 75701->75622 75702->75624 75703->75626 75704->75628 75705->75630 75706->75632 75707->75634 75708->75636 75709->75638 75710->75640 75711->75642 75712->75644 75713->75646 75714->75648 75715->75650 75716->75652 75717->75654 75718->75656 75719->75658 75720->75660 75721->75662 75722->75664 75723->75666 75724->75668 75725->75670 75726->75672 75727->75674 75728->75676 75729->75678 75730->75680 75732 1fe8fae2ea0 75733 1fe8fae2ee1 75732->75733 75736 1fe8fae2ee6 75732->75736 75754 1fe8fae4698 24 API calls _errno 75733->75754 75734 1fe8fae2fc6 SetWaitableTimer 75743 1fe8fae3a20 75734->75743 75736->75734 75742 1fe8fae2f62 _RunAllParam 75736->75742 75755 1fe8fae46d8 75736->75755 75738 1fe8fae300e 75742->75734 75744 1fe8fae3a29 75743->75744 75745 1fe8fae3a34 75744->75745 75746 1fe8fae6558 RtlCaptureContext RtlLookupFunctionEntry 75744->75746 75745->75738 75747 1fe8fae659c RtlVirtualUnwind 75746->75747 75748 1fe8fae65dd 75746->75748 75749 1fe8fae65ff IsDebuggerPresent 75747->75749 75748->75749 75750 1fe8fae665e _cftoe_l 75749->75750 75751 1fe8fae6666 UnhandledExceptionFilter 75750->75751 75752 1fe8fae667c _cftoe_l 75751->75752 75753 1fe8fae6686 GetCurrentProcess TerminateProcess 75751->75753 75752->75753 75753->75738 75754->75736 75756 1fe8fae476c 75755->75756 75768 1fe8fae46f0 malloc 75755->75768 75776 1fe8fae6de8 DecodePointer 75756->75776 75758 1fe8fae4771 75777 1fe8fae6bc0 24 API calls _getptd 75758->75777 75759 1fe8fae4708 75759->75768 75771 1fe8fae7dec 24 API calls 2 library calls 75759->75771 75772 1fe8fae7b8c 24 API calls 5 library calls 75759->75772 75763 1fe8fae2f47 75763->75742 75770 1fe8fae4698 24 API calls _errno 75763->75770 75764 1fe8fae4751 75774 1fe8fae6bc0 24 API calls _getptd 75764->75774 75767 1fe8fae4756 75775 1fe8fae6bc0 24 API calls _getptd 75767->75775 75768->75759 75768->75763 75768->75764 75768->75767 75773 1fe8fae6de8 DecodePointer 75768->75773 75770->75742 75771->75759 75772->75759 75773->75768 75774->75767 75775->75763 75776->75758 75777->75763 75778 14001dff0 WSAStartup 75783 14000dd6c 75778->75783 75782 14001e044 75797 14000dc60 71 API calls 2 library calls 75783->75797 75785 14000dd75 75786 14000bf30 75785->75786 75787 14000bf39 75786->75787 75788 14000bf44 75787->75788 75789 14000dee8 RtlCaptureContext RtlLookupFunctionEntry 75787->75789 75788->75782 75790 14000df2c RtlVirtualUnwind 75789->75790 75791 14000df6d 75789->75791 75792 14000df8f IsDebuggerPresent 75790->75792 75791->75792 75798 14001625c 75792->75798 75794 14000dfee SetUnhandledExceptionFilter UnhandledExceptionFilter 75795 14000e016 GetCurrentProcess TerminateProcess 75794->75795 75796 14000e00c _fltout2 75794->75796 75795->75782 75796->75795 75797->75785 75798->75794 75799 140006270 setsockopt 75800 140001470 setsockopt CancelIo closesocket SetEvent 75801 140001870 75802 1400018a0 75801->75802 75804 14000192e 75802->75804 75821 14001cd4c 75802->75821 75806 1400019e5 75804->75806 75807 140001967 75804->75807 75825 140001070 75806->75825 75809 14001cd4c 62 API calls 75807->75809 75811 14000197d VirtualAlloc 75809->75811 75810 140001a1d 75832 140001a80 75810->75832 75816 1400019a7 memcpy_s 75811->75816 75812 140001900 memcpy_s 75812->75804 75813 140001920 VirtualFree 75812->75813 75813->75804 75818 1400019d5 75816->75818 75819 1400019c7 VirtualFree 75816->75819 75818->75806 75819->75818 75820 140001a67 75822 14001cd88 75821->75822 75824 1400018d6 VirtualAlloc 75821->75824 75822->75824 75847 14001cf1c 62 API calls 4 library calls 75822->75847 75824->75812 75826 140001099 75825->75826 75827 14001cd4c 62 API calls 75826->75827 75829 140001129 memcpy_s 75826->75829 75828 1400010d2 VirtualAlloc 75827->75828 75830 1400010fa memcpy_s 75828->75830 75829->75810 75830->75829 75831 14000111b VirtualFree 75830->75831 75831->75829 75833 140001ab8 75832->75833 75837 140001b11 75832->75837 75835 140001a51 75833->75835 75836 140001ad0 send 75833->75836 75833->75837 75834 140001b20 send 75834->75835 75834->75837 75838 1400011e0 75835->75838 75836->75833 75837->75834 75837->75835 75839 1400011f0 75838->75839 75840 1400011fa 75839->75840 75841 14001cd4c 62 API calls 75839->75841 75840->75820 75842 14000121f 75841->75842 75843 140001239 VirtualAlloc 75842->75843 75844 14000122c 75842->75844 75845 140001263 memcpy_s 75843->75845 75844->75820 75846 140001279 VirtualFree 75845->75846 75846->75820 75847->75824 75848 1fe8fadb9a0 75870 1fe8fae53d0 75848->75870 75850 1fe8fadb9ec Sleep GetLocalTime wsprintfW 75859 1fe8fadba60 75850->75859 75851 1fe8fae3e78 31 API calls 75851->75859 75852 1fe8fae3d84 _RunAllParam 25 API calls 75852->75859 75853 1fe8fad13b0 9 API calls 75853->75859 75854 1fe8fad1de0 33 API calls 75854->75859 75855 1fe8fadbacf Sleep EnumWindows 75856 1fe8fadbafb 75855->75856 75857 1fe8fadbb29 Sleep 75855->75857 75858 1fe8fadbb00 Sleep EnumWindows 75856->75858 75857->75859 75858->75857 75858->75858 75859->75851 75859->75852 75859->75853 75859->75854 75859->75855 75860 1fe8fadbb88 CreateEventA 75859->75860 75861 1fe8fae3e0c malloc 24 API calls 75860->75861 75862 1fe8fadbbcd 75861->75862 75863 1fe8fad2b00 162 API calls 75862->75863 75867 1fe8fadbc09 75863->75867 75864 1fe8fae3fec 32 API calls 75864->75867 75865 1fe8fadbc16 CloseHandle 75865->75859 75866 1fe8fadbc5a Sleep 75866->75867 75867->75864 75867->75865 75867->75866 75868 1fe8fadbcb1 WaitForSingleObject CloseHandle CloseHandle 75867->75868 75869 1fe8fadbc7d WaitForSingleObject CloseHandle CloseHandle 75867->75869 75868->75859 75869->75859 75871 1400014f0 75872 140001522 ResetEvent timeGetTime socket 75871->75872 75873 140001587 lstrlenW WideCharToMultiByte 75872->75873 75874 140001580 75872->75874 75886 14000c364 75873->75886 75876 14000bf30 _fltout2 8 API calls 75874->75876 75878 140001733 75876->75878 75881 140001626 htons connect 75881->75874 75882 14000166c setsockopt 75881->75882 75883 1400016e8 75882->75883 75884 140001699 WSAIoctl 75882->75884 75904 14000c4d8 75883->75904 75884->75883 75889 14000c36f 75886->75889 75888 1400015d2 lstrlenW WideCharToMultiByte gethostbyname 75898 14000c294 75888->75898 75889->75888 75893 14000c38e 75889->75893 75922 14000cc4c 75889->75922 75939 14000e5e0 DecodePointer 75889->75939 75891 14000c3df 75940 14000c9b4 61 API calls std::exception::operator= 75891->75940 75893->75891 75896 14000dd6c _cinit 71 API calls 75893->75896 75894 14000c3f0 75941 14000cbb8 RaiseException memcpy_s 75894->75941 75896->75891 75897 14000c406 75899 14000cdd8 75898->75899 75900 140001619 75899->75900 75901 14000cddd RtlFreeHeap 75899->75901 75900->75874 75900->75881 75901->75900 75902 14000cdf8 75901->75902 75950 14000e550 61 API calls __doserrno 75902->75950 75905 14000c503 75904->75905 75906 14000c518 75904->75906 75970 14000e550 61 API calls __doserrno 75905->75970 75951 14000f1cc 75906->75951 75908 14000c508 75971 14000e4e8 17 API calls _invalid_parameter_noinfo 75908->75971 75911 14000c513 75911->75874 75913 14000c59c 75972 14000cdd8 75913->75972 75921 14000c594 GetLastError 75921->75913 75923 14000cce0 75922->75923 75937 14000cc64 75922->75937 75948 14000e5e0 DecodePointer 75923->75948 75925 14000cc9c HeapAlloc 75930 14000ccd5 75925->75930 75925->75937 75926 14000cc7c 75926->75925 75942 14000f5ec 61 API calls 2 library calls 75926->75942 75943 14000f38c 61 API calls 4 library calls 75926->75943 75944 14000edc8 GetModuleHandleW GetProcAddress ExitProcess malloc 75926->75944 75927 14000cce5 75949 14000e550 61 API calls __doserrno 75927->75949 75930->75889 75931 14000ccc5 75946 14000e550 61 API calls __doserrno 75931->75946 75935 14000ccca 75947 14000e550 61 API calls __doserrno 75935->75947 75937->75925 75937->75926 75937->75931 75937->75935 75945 14000e5e0 DecodePointer 75937->75945 75939->75889 75940->75894 75941->75897 75942->75926 75943->75926 75945->75937 75946->75935 75947->75930 75948->75927 75949->75930 75950->75900 75952 14000f1f1 75951->75952 75954 14000c52c 75952->75954 75955 14000f20f Sleep 75952->75955 75978 140011bac 75952->75978 75954->75913 75956 14000e7a0 75954->75956 75955->75952 75955->75954 75988 14000e71c GetLastError FlsGetValue 75956->75988 75958 14000e7ab 75959 14000c539 75958->75959 76000 14000f124 61 API calls 2 library calls 75958->76000 75961 14000e664 75959->75961 76001 140016470 75961->76001 75963 14000e6bd 75964 140016370 type_info::_Type_info_dtor LeaveCriticalSection 75963->75964 75965 14000e6d2 75964->75965 75966 140016470 _lock 61 API calls 75965->75966 75967 14000e6dc __doserrno 75966->75967 75968 140016370 type_info::_Type_info_dtor LeaveCriticalSection 75967->75968 75969 14000c548 CreateThread 75968->75969 75969->75911 75969->75921 75970->75908 75971->75911 75973 14000c5a4 75972->75973 75974 14000cddd RtlFreeHeap 75972->75974 75973->75911 75977 14000e590 61 API calls 2 library calls 75973->75977 75974->75973 75975 14000cdf8 75974->75975 76009 14000e550 61 API calls __doserrno 75975->76009 75977->75911 75979 140011bc1 75978->75979 75985 140011bde 75978->75985 75980 140011bcf 75979->75980 75979->75985 75986 14000e550 61 API calls __doserrno 75980->75986 75981 140011bf6 HeapAlloc 75983 140011bd4 75981->75983 75981->75985 75983->75952 75985->75981 75985->75983 75987 14000e5e0 DecodePointer 75985->75987 75986->75983 75987->75985 75989 14000e742 75988->75989 75990 14000e78a SetLastError 75988->75990 75991 14000f1cc __onexitinit 56 API calls 75989->75991 75990->75958 75992 14000e74f 75991->75992 75992->75990 75993 14000e757 FlsSetValue 75992->75993 75994 14000e783 75993->75994 75995 14000e76d 75993->75995 75997 14000cdd8 free 56 API calls 75994->75997 75996 14000e664 __doserrno 56 API calls 75995->75996 75998 14000e774 GetCurrentThreadId 75996->75998 75999 14000e788 75997->75999 75998->75990 75999->75990 76002 14001648e 76001->76002 76003 14001649f EnterCriticalSection 76001->76003 76007 140016388 61 API calls 6 library calls 76002->76007 76005 140016493 76005->76003 76008 14000f124 61 API calls 2 library calls 76005->76008 76007->76005 76009->75973 76010 14000b3b0 76011 14000b3f1 76010->76011 76015 14000b3f6 76010->76015 76012 14000cdd8 free 61 API calls 76011->76012 76012->76015 76013 14000b4d6 SetWaitableTimer 76014 14000bf30 _fltout2 8 API calls 76013->76014 76016 14000b51e 76014->76016 76015->76013 76017 14000cc4c malloc 61 API calls 76015->76017 76018 14000b4c0 76015->76018 76020 14000b457 76017->76020 76018->76013 76019 14000b472 76023 14000cbb8 RaiseException memcpy_s 76019->76023 76020->76018 76020->76019 76021 14000cdd8 free 61 API calls 76020->76021 76021->76019 76023->76018 76024 7ff665c31c00 76025 7ff665c31c4b 76024->76025 76029 7ff665c31c0f _invalid_parameter_noinfo 76024->76029 76032 7ff665c28cf4 14 API calls _invalid_parameter_noinfo 76025->76032 76027 7ff665c31c32 HeapAlloc 76028 7ff665c31c49 76027->76028 76027->76029 76029->76025 76029->76027 76031 7ff665c309f0 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 76029->76031 76031->76029 76032->76028 76033 1fe8fae21f0 GetCurrentThreadId 76076 1fe8fae0680 76033->76076 76035 1fe8fae223f GetCurrentThreadId 76036 1fe8fae2253 _flush 76035->76036 76037 1fe8fae2390 76036->76037 76094 1fe8fae3e78 76036->76094 76045 1fe8fae23af 76037->76045 76105 1fe8fae4698 24 API calls _errno 76037->76105 76040 1fe8fae2336 76044 1fe8fae2339 SetWaitableTimer 76040->76044 76041 1fe8fae2310 CreateWaitableTimerW 76043 1fe8fae232c 76041->76043 76041->76044 76104 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76043->76104 76044->76037 76048 1fe8fae46d8 malloc 24 API calls 76045->76048 76058 1fe8fae2429 _RunAllParam 76045->76058 76047 1fe8fae25a2 GetCurrentThreadId 76050 1fe8fae25b6 GetCurrentThreadId 76047->76050 76056 1fe8fae240e 76048->76056 76049 1fe8fae24b0 WSAWaitForMultipleEvents 76049->76058 76055 1fe8fae25e5 76050->76055 76054 1fe8fae259f 76054->76047 76059 1fe8fae2610 76055->76059 76064 1fe8fae2608 76055->76064 76065 1fe8fae25f3 CloseHandle 76055->76065 76056->76058 76106 1fe8fae4698 24 API calls _errno 76056->76106 76058->76047 76058->76049 76058->76054 76061 1fe8fae2578 76058->76061 76063 1fe8fae2503 76058->76063 76073 1fe8fae2554 GetLastError 76058->76073 76077 1fe8fae2040 WSAEnumNetworkEvents 76058->76077 76107 1fe8fae1a60 76058->76107 76062 1fe8fae3a20 _cftoe_l 7 API calls 76059->76062 76068 1fe8fae2588 WSAGetLastError 76061->76068 76119 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76061->76119 76067 1fe8fae261e 76062->76067 76063->76047 76063->76058 76117 1fe8fae1280 recv SetLastError GetLastError WSAGetLastError 76063->76117 76118 1fe8fae1130 send WSAGetLastError 76063->76118 76121 1fe8fae3d84 76064->76121 76065->76064 76070 1fe8fae25fd 76065->76070 76068->76047 76120 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76070->76120 76073->76047 76074 1fe8fae2587 76074->76068 76075 1fe8fae2607 76075->76064 76076->76035 76078 1fe8fae2086 WSAGetLastError 76077->76078 76080 1fe8fae20d7 76077->76080 76079 1fe8fae2097 WSAResetEvent 76078->76079 76079->76080 76082 1fe8fae20cd 76079->76082 76089 1fe8fae211a 76080->76089 76093 1fe8fae2174 76080->76093 76127 1fe8fae0d80 76080->76127 76139 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76082->76139 76084 1fe8fae3a20 _cftoe_l 7 API calls 76086 1fe8fae21d4 76084->76086 76085 1fe8fae2133 76140 1fe8fae1280 recv SetLastError GetLastError WSAGetLastError 76085->76140 76086->76058 76089->76085 76091 1fe8fae213f 76089->76091 76089->76093 76090 1fe8fae213b 76090->76091 76092 1fe8fae1a60 6 API calls 76091->76092 76091->76093 76092->76093 76093->76084 76097 1fe8fae3e83 76094->76097 76095 1fe8fae46d8 malloc 24 API calls 76095->76097 76096 1fe8fae2304 76096->76040 76096->76041 76097->76095 76097->76096 76101 1fe8fae3ea2 76097->76101 76142 1fe8fae6de8 DecodePointer 76097->76142 76099 1fe8fae3ef3 76144 1fe8fae435c 24 API calls std::exception::operator= 76099->76144 76101->76099 76143 1fe8fae4a08 31 API calls _cinit 76101->76143 76102 1fe8fae3f04 _RunAllParam 76104->76040 76105->76045 76106->76058 76145 1fe8fae13f0 76107->76145 76109 1fe8fae1a8b _fflush_nolock 76110 1fe8fae1ab0 send 76109->76110 76111 1fe8fae1b6e WSAGetLastError 76109->76111 76112 1fe8fae1adc LeaveCriticalSection SetLastError 76109->76112 76113 1fe8fae1b69 76109->76113 76114 1fe8fae13f0 LeaveCriticalSection 76109->76114 76110->76109 76111->76113 76115 1fe8fae1b7b _fflush_nolock 76111->76115 76112->76109 76113->76058 76114->76109 76116 1fe8fae1bb4 LeaveCriticalSection 76115->76116 76116->76113 76117->76063 76118->76063 76119->76074 76120->76075 76122 1fe8fae4698 76121->76122 76123 1fe8fae469d HeapFree 76122->76123 76124 1fe8fae46cf 76122->76124 76123->76124 76125 1fe8fae46b8 76123->76125 76124->76059 76149 1fe8fae6bc0 24 API calls _getptd 76125->76149 76128 1fe8fae0db0 WSAEventSelect 76127->76128 76129 1fe8fae0d90 76127->76129 76130 1fe8fae0dc9 WSAGetLastError 76128->76130 76131 1fe8fae0def SetLastError 76128->76131 76129->76089 76130->76089 76132 1fe8fae0e12 76131->76132 76133 1fe8fae0e17 send 76132->76133 76134 1fe8fae0e55 GetLastError 76132->76134 76135 1fe8fae0e49 76133->76135 76136 1fe8fae0e2e WSAGetLastError 76133->76136 76134->76089 76135->76089 76136->76135 76137 1fe8fae0e3b 76136->76137 76137->76135 76141 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76137->76141 76139->76080 76140->76090 76141->76135 76142->76097 76143->76099 76144->76102 76146 1fe8fae1490 76145->76146 76148 1fe8fae140d _fflush_nolock 76145->76148 76146->76109 76147 1fe8fae146b LeaveCriticalSection 76147->76109 76148->76147 76149->76124 76150 1fe8fae1830 76151 1fe8fae1861 _fflush_nolock 76150->76151 76152 1fe8fae188a ResetEvent ResetEvent ResetEvent 76151->76152 76167 1fe8fae4698 24 API calls _errno 76151->76167 76159 1fe8fae18b9 76152->76159 76155 1fe8fae1875 76155->76152 76157 1fe8fae192c _RunAllParam 76168 1fe8fae0b00 GdipDisposeImage GdipFree _RunAllParam 76157->76168 76158 1fe8fae1926 HeapDestroy 76158->76157 76163 1fe8fadc7a0 76159->76163 76161 1fe8fae1959 SetEvent LeaveCriticalSection 76162 1fe8faf8228 76161->76162 76164 1fe8fadc7be 76163->76164 76166 1fe8fadc80e 76164->76166 76169 1fe8fae4698 24 API calls _errno 76164->76169 76166->76157 76166->76158 76167->76155 76168->76161 76169->76166 76179 1fe8fae5530 76181 1fe8fae5556 76179->76181 76180 1fe8fae5593 76190 1fe8fae555e 76180->76190 76237 1fe8fadbce0 76180->76237 76181->76180 76181->76190 76191 1fe8fae53dc 76181->76191 76185 1fe8fae55d8 76187 1fe8fae53dc 74 API calls 76185->76187 76185->76190 76186 1fe8fadbce0 3 API calls 76188 1fe8fae55cb 76186->76188 76187->76190 76189 1fe8fae53dc 74 API calls 76188->76189 76189->76185 76192 1fe8fae546b 76191->76192 76193 1fe8fae53ee 76191->76193 76195 1fe8fae54bc 76192->76195 76201 1fe8fae546f 76192->76201 76241 1fe8fae95ac 76193->76241 76197 1fe8fae5517 76195->76197 76198 1fe8fae54c1 76195->76198 76199 1fe8fae53f7 76197->76199 76271 1fe8fae7100 24 API calls 2 library calls 76197->76271 76260 1fe8fae79cc 76198->76260 76199->76180 76201->76199 76206 1fe8fae54a6 76201->76206 76256 1fe8faea6f8 25 API calls free 76201->76256 76204 1fe8fae5403 _RTC_Initialize 76212 1fe8fae5413 GetCommandLineA 76204->76212 76228 1fe8fae5407 76204->76228 76206->76199 76259 1fe8fae6e44 27 API calls free 76206->76259 76207 1fe8fae549c 76257 1fe8fae6e44 27 API calls free 76207->76257 76208 1fe8fae54d5 _getptd 76208->76199 76216 1fe8fae550d 76208->76216 76217 1fe8fae54f7 76208->76217 76249 1fe8faeab64 29 API calls 2 library calls 76212->76249 76213 1fe8fae54a1 76258 1fe8fae9604 HeapDestroy 76213->76258 76270 1fe8fae4698 24 API calls _errno 76216->76270 76265 1fe8fae6e6c 76217->76265 76218 1fe8fae5425 76250 1fe8faea424 31 API calls __onexitinit 76218->76250 76222 1fe8fae54fe GetCurrentThreadId 76222->76199 76223 1fe8fae5431 76224 1fe8fae543c 76223->76224 76225 1fe8fae5435 76223->76225 76252 1fe8faeaa6c 43 API calls 2 library calls 76224->76252 76251 1fe8fae6e44 27 API calls free 76225->76251 76248 1fe8fae9604 HeapDestroy 76228->76248 76229 1fe8fae5441 76230 1fe8fae5455 76229->76230 76253 1fe8faea76c 42 API calls 5 library calls 76229->76253 76236 1fe8fae5459 76230->76236 76255 1fe8faea6f8 25 API calls free 76230->76255 76233 1fe8fae5469 76233->76225 76234 1fe8fae544a 76234->76230 76254 1fe8fae76c8 31 API calls 2 library calls 76234->76254 76236->76199 76238 1fe8fadbce8 76237->76238 76239 1fe8fadbd4f 76237->76239 76238->76239 76240 1fe8fadbcf2 CreateThread CreateThread WaitForSingleObject 76238->76240 76239->76185 76239->76186 76240->76239 76242 1fe8fae95c8 _RunAllParam 76241->76242 76243 1fe8fae53f3 76242->76243 76244 1fe8fae95d4 GetVersion 76242->76244 76243->76199 76247 1fe8fae7140 30 API calls 2 library calls 76243->76247 76245 1fe8fae95f8 76244->76245 76246 1fe8fae95de HeapSetInformation 76244->76246 76245->76243 76246->76245 76247->76204 76248->76199 76249->76218 76250->76223 76251->76228 76252->76229 76253->76234 76254->76230 76255->76233 76256->76207 76257->76213 76258->76206 76259->76199 76261 1fe8fae79f1 76260->76261 76263 1fe8fae7a31 76261->76263 76264 1fe8fae7a0f Sleep 76261->76264 76272 1fe8faead7c 76261->76272 76263->76208 76264->76261 76264->76263 76281 1fe8faeea40 76265->76281 76267 1fe8fae6ec5 76268 1fe8faeea40 _freefls 24 API calls 76267->76268 76269 1fe8fae6ee4 _getptd 76268->76269 76269->76222 76270->76199 76271->76199 76273 1fe8faead91 76272->76273 76275 1fe8faeadae malloc 76272->76275 76274 1fe8faead9f 76273->76274 76273->76275 76279 1fe8fae6bc0 24 API calls _getptd 76274->76279 76277 1fe8faeada4 76275->76277 76280 1fe8fae6de8 DecodePointer 76275->76280 76277->76261 76279->76277 76280->76275 76282 1fe8faeea5e 76281->76282 76284 1fe8faeea6f 76281->76284 76285 1fe8faee958 24 API calls 6 library calls 76282->76285 76285->76284 76286 1fe8fad3830 CreateMutexW CreateMutexExW 76287 1fe8fad3867 76286->76287 76295 1fe8fad3899 _recalloc 76286->76295 76288 1fe8fad3870 Sleep CreateMutexW GetLastError 76287->76288 76288->76288 76288->76295 76289 1fe8fad3920 _amsg_exit 76290 1fe8fad3928 GetConsoleWindow 76289->76290 76325 1fe8fadbdd0 18 API calls _cftoe_l 76290->76325 76292 1fe8fad38c0 lstrlenW 76304 1fe8fad4900 76292->76304 76294 1fe8fad3947 76296 1fe8fad394b 76294->76296 76297 1fe8fad3965 76294->76297 76295->76289 76295->76292 76298 1fe8fad390c Sleep 76295->76298 76299 1fe8fad38f6 lstrcmpW 76295->76299 76300 1fe8fae3a20 _cftoe_l 7 API calls 76296->76300 76326 1fe8fadc1b0 42 API calls 4 library calls 76297->76326 76298->76289 76298->76295 76299->76289 76299->76298 76302 1fe8fad395d 76300->76302 76327 1fe8fae5ee0 76304->76327 76307 1fe8fad497d 76309 1fe8fad4a7c 76307->76309 76310 1fe8fad498c 76307->76310 76308 1fe8fad4b20 RegCloseKey RegCloseKey 76311 1fe8fae3a20 _cftoe_l 7 API calls 76308->76311 76309->76308 76315 1fe8fad4a91 RegQueryValueExW 76309->76315 76312 1fe8fad4a0f 76310->76312 76313 1fe8fad4990 76310->76313 76314 1fe8fad4b46 76311->76314 76312->76308 76316 1fe8fad4a24 RegQueryValueExW 76312->76316 76313->76308 76319 1fe8fad49ad RegQueryValueExW 76313->76319 76314->76295 76317 1fe8fad4aca GetSystemInfo wsprintfW 76315->76317 76318 1fe8fad4b0f 76315->76318 76320 1fe8fad4b12 lstrcpyW 76316->76320 76321 1fe8fad4a64 lstrcpyW 76316->76321 76322 1fe8fad4af7 lstrcpyW 76317->76322 76318->76320 76319->76308 76323 1fe8fad49ea lstrcmpW 76319->76323 76320->76308 76321->76308 76322->76308 76323->76322 76324 1fe8fad4975 76323->76324 76324->76308 76325->76294 76328 1fe8fad4951 RegOpenKeyExW 76327->76328 76328->76307 76328->76324 76329 140003ac0 76344 14000c9e0 76329->76344 76331 140003b08 Sleep 76336 140003b30 76331->76336 76332 140003b40 SleepEx 76332->76332 76332->76336 76333 1400012c0 6 API calls 76333->76336 76334 14000c364 72 API calls 76334->76336 76335 14000c294 _RunAllParam 62 API calls 76335->76336 76336->76332 76336->76333 76336->76334 76336->76335 76337 14000c2f8 61 API calls _FF_MSGBANNER 76336->76337 76338 140001e00 75 API calls 76336->76338 76339 1400013b0 10 API calls 76336->76339 76340 140003cac SleepEx 76336->76340 76341 140003cff CreateEventA 76336->76341 76342 140003d4a SleepEx 76336->76342 76343 140003d77 CloseHandle 76336->76343 76337->76336 76338->76336 76339->76336 76340->76336 76341->76336 76342->76336 76343->76336 76345 1400112b0 76344->76345 76346 1400066c0 76347 1400066fb WSAStringToAddressW 76346->76347 76348 1400066dd 76346->76348 76351 1400066ee 76347->76351 76352 14000672b 76347->76352 76348->76347 76349 1400066e3 WSASetLastError 76348->76349 76349->76351 76353 14000673d 76352->76353 76354 140006730 htons 76352->76354 76354->76353 76355 1fe8fad14f0 76356 1fe8fad1522 ResetEvent 76355->76356 76372 1fe8faf8680 76356->76372 76358 1fe8fad153b socket 76359 1fe8fad1587 lstrlenW WideCharToMultiByte 76358->76359 76360 1fe8fad1580 76358->76360 76361 1fe8fae3e78 31 API calls 76359->76361 76362 1fe8fae3a20 _cftoe_l 7 API calls 76360->76362 76363 1fe8fad15d2 lstrlenW WideCharToMultiByte gethostbyname 76361->76363 76364 1fe8fad1733 76362->76364 76365 1fe8fae3d84 _RunAllParam 25 API calls 76363->76365 76366 1fe8fad1619 76365->76366 76366->76360 76367 1fe8fad1626 htons connect 76366->76367 76367->76360 76368 1fe8fad166c setsockopt 76367->76368 76369 1fe8fad1699 WSAIoctl 76368->76369 76370 1fe8fad16e8 76368->76370 76369->76370 76371 1fe8fae3fec 32 API calls 76370->76371 76371->76360 76373 1fe8faf8697 76372->76373 76374 14000a700 GetCurrentThreadId 76419 140008b90 76374->76419 76376 14000a74f GetCurrentThreadId 76377 14000a763 _flush 76376->76377 76378 14000a8a0 76377->76378 76379 14000c364 72 API calls 76377->76379 76383 14000cdd8 free 61 API calls 76378->76383 76386 14000a8bf 76378->76386 76380 14000a814 76379->76380 76381 14000a846 76380->76381 76382 14000a820 CreateWaitableTimerW 76380->76382 76384 14000a849 SetWaitableTimer 76381->76384 76382->76384 76385 14000a83c 76382->76385 76383->76386 76384->76378 76437 140004a70 RaiseException _RunAllParam 76385->76437 76389 14000cc4c malloc 61 API calls 76386->76389 76403 14000a986 76386->76403 76388 14000aab2 GetCurrentThreadId 76391 14000aac6 GetCurrentThreadId 76388->76391 76398 14000a91e 76389->76398 76390 14000a9c0 WSAWaitForMultipleEvents 76390->76403 76395 14000aaf5 76391->76395 76394 14000aaaf 76394->76388 76401 14000ab20 76395->76401 76404 14000ab03 CloseHandle 76395->76404 76405 14000ab18 76395->76405 76397 14000aa13 76397->76388 76397->76403 76455 140009790 recv SetLastError GetLastError WSAGetLastError 76397->76455 76456 140009640 send WSAGetLastError 76397->76456 76399 14000a939 76398->76399 76402 14000cdd8 free 61 API calls 76398->76402 76398->76403 76438 14000cbb8 RaiseException memcpy_s 76399->76438 76407 14000bf30 _fltout2 8 API calls 76401->76407 76402->76399 76403->76388 76403->76390 76403->76394 76403->76397 76406 14000aa88 76403->76406 76416 14000aa64 GetLastError 76403->76416 76420 14000a550 WSAEnumNetworkEvents 76403->76420 76439 140009f70 76403->76439 76404->76405 76411 14000ab0d 76404->76411 76412 14000c294 _RunAllParam 62 API calls 76405->76412 76409 14000aa98 WSAGetLastError 76406->76409 76457 140004a70 RaiseException _RunAllParam 76406->76457 76408 14000ab2e 76407->76408 76409->76388 76458 140004a70 RaiseException _RunAllParam 76411->76458 76412->76401 76416->76388 76417 14000aa97 76417->76409 76418 14000ab17 76418->76405 76419->76376 76421 14000a596 WSAGetLastError 76420->76421 76426 14000a5e7 76420->76426 76423 14000a5a7 WSAResetEvent 76421->76423 76424 14000a5dd 76423->76424 76423->76426 76471 140004a70 RaiseException _RunAllParam 76424->76471 76427 14000a62a 76426->76427 76436 14000a684 76426->76436 76459 140009290 76426->76459 76429 14000a64f 76427->76429 76431 14000a643 76427->76431 76427->76436 76428 14000bf30 _fltout2 8 API calls 76432 14000a6e4 76428->76432 76435 140009f70 10 API calls 76429->76435 76429->76436 76472 140009790 recv SetLastError GetLastError WSAGetLastError 76431->76472 76432->76403 76434 14000a64b 76434->76429 76435->76436 76436->76428 76437->76381 76438->76403 76474 140009900 76439->76474 76441 140009f9b 76442 140009fc0 send 76441->76442 76443 14000a079 76441->76443 76445 14000a07e WSAGetLastError 76441->76445 76453 140009900 2 API calls 76441->76453 76479 140008b70 HeapFree 76441->76479 76442->76441 76444 140009fdf EnterCriticalSection LeaveCriticalSection SetLastError 76442->76444 76451 14000a111 76443->76451 76481 140008b70 HeapFree 76443->76481 76444->76441 76446 14000a08b EnterCriticalSection 76445->76446 76449 14000a0e1 76445->76449 76448 14000a0a4 LeaveCriticalSection 76446->76448 76448->76451 76449->76451 76480 140008b70 HeapFree 76449->76480 76451->76403 76453->76441 76455->76397 76456->76397 76457->76417 76458->76418 76460 1400092c0 WSAEventSelect 76459->76460 76461 1400092a0 76459->76461 76462 1400092d9 WSAGetLastError 76460->76462 76463 1400092ff SetLastError 76460->76463 76461->76427 76462->76427 76464 140009322 76463->76464 76465 140009365 GetLastError 76464->76465 76466 140009327 send 76464->76466 76465->76427 76467 140009359 76466->76467 76468 14000933e WSAGetLastError 76466->76468 76467->76427 76468->76467 76469 14000934b 76468->76469 76469->76467 76473 140004a70 RaiseException _RunAllParam 76469->76473 76471->76426 76472->76434 76473->76467 76475 14000991d EnterCriticalSection 76474->76475 76476 1400099a0 76474->76476 76477 140009944 LeaveCriticalSection 76475->76477 76476->76441 76477->76441 76482 140009d40 EnterCriticalSection 76483 140009d9a ResetEvent ResetEvent ResetEvent 76482->76483 76484 140009d80 76482->76484 76486 140009e1e 76483->76486 76493 140009dc9 76483->76493 76485 14000cdd8 free 61 API calls 76484->76485 76488 140009d85 76485->76488 76496 140004cb0 76486->76496 76488->76483 76490 140009e36 HeapDestroy 76491 140009e3c HeapCreate 76490->76491 76502 140009010 76491->76502 76493->76486 76506 140008b70 HeapFree 76493->76506 76497 140004d01 76496->76497 76499 140004cce 76496->76499 76498 140004d1e 76497->76498 76500 14000cdd8 free 61 API calls 76497->76500 76498->76490 76498->76491 76499->76497 76507 140008b70 HeapFree 76499->76507 76500->76498 76503 14000902e 76502->76503 76505 140009044 SetEvent LeaveCriticalSection 76502->76505 76503->76505 76508 140004a70 RaiseException _RunAllParam 76503->76508 76508->76505 76509 1fe8fad1470 setsockopt CancelIo 76512 1fe8faf8770 76509->76512 76513 1fe8faf8777 76512->76513 76514 1fe8fa90000 76516 1fe8fa90448 76514->76516 76515 1fe8fa905b1 76516->76515 76518 1fe8fa900dc 76516->76518 76519 1fe8fa90116 76518->76519 76523 1fe8fa9032a 76518->76523 76520 1fe8fa90147 VirtualAlloc 76519->76520 76519->76523 76522 1fe8fa90168 76520->76522 76520->76523 76521 1fe8fa902b7 LoadLibraryA 76521->76522 76521->76523 76522->76521 76522->76523 76523->76515 76524 1fe8fadd5c0 76532 1fe8fadcbf0 CreateEventW 76524->76532 76527 1fe8fadd697 76553 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76527->76553 76528 1fe8fadd6a1 76554 1fe8fadc610 GdipDisposeImage GdipFree InitializeCriticalSectionAndSpinCount InitializeCriticalSectionAndSpinCount _RunAllParam 76528->76554 76531 1fe8fadd6ae 76533 1fe8fadcc42 76532->76533 76535 1fe8fadcc4c 76532->76535 76561 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76533->76561 76555 1fe8fadc9f0 76535->76555 76538 1fe8fadcd3d CreateEventW 76541 1fe8fadcd7b 76538->76541 76542 1fe8fadcd86 CreateEventW 76538->76542 76539 1fe8fadcd32 76562 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76539->76562 76563 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76541->76563 76545 1fe8fadcda9 76542->76545 76546 1fe8fadcdb4 CreateEventW 76542->76546 76543 1fe8fadcd3c 76543->76538 76564 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76545->76564 76547 1fe8fadcdd7 76546->76547 76548 1fe8fadcde1 CreateWaitableTimerW 76546->76548 76565 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76547->76565 76548->76527 76548->76528 76549 1fe8fadcd85 76549->76542 76552 1fe8fadcdb3 76552->76546 76553->76528 76554->76531 76556 1fe8fadca35 _RunAllParam 76555->76556 76557 1fe8fadca47 76556->76557 76566 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76556->76566 76559 1fe8fadca72 InitializeCriticalSectionAndSpinCount 76557->76559 76567 1fe8fae4698 24 API calls _errno 76557->76567 76559->76538 76559->76539 76561->76535 76562->76543 76563->76549 76564->76552 76565->76548 76566->76557 76567->76559 76568 140005ad0 76576 140005100 CreateEventW 76568->76576 76571 140005bb1 76598 140004b10 InitializeCriticalSectionAndSpinCount InitializeCriticalSectionAndSpinCount RaiseException _RunAllParam 76571->76598 76572 140005ba7 76597 140004a70 RaiseException _RunAllParam 76572->76597 76575 140005bbe 76577 140005152 76576->76577 76578 14000515c 76576->76578 76605 140004a70 RaiseException _RunAllParam 76577->76605 76599 140004f00 HeapCreate 76578->76599 76582 140005242 76606 140004a70 RaiseException _RunAllParam 76582->76606 76583 14000524d CreateEventW 76585 140005296 CreateEventW 76583->76585 76586 14000528b 76583->76586 76589 1400052c4 CreateEventW 76585->76589 76590 1400052b9 76585->76590 76607 140004a70 RaiseException _RunAllParam 76586->76607 76587 14000524c 76587->76583 76591 1400052f1 CreateWaitableTimerW 76589->76591 76592 1400052e7 76589->76592 76608 140004a70 RaiseException _RunAllParam 76590->76608 76591->76571 76591->76572 76609 140004a70 RaiseException _RunAllParam 76592->76609 76593 140005295 76593->76585 76596 1400052c3 76596->76589 76597->76571 76598->76575 76600 140004f4d 76599->76600 76603 140004f57 76599->76603 76610 140004a70 RaiseException _RunAllParam 76600->76610 76602 14000cdd8 free 61 API calls 76604 140004f82 InitializeCriticalSectionAndSpinCount 76602->76604 76603->76602 76603->76604 76604->76582 76604->76583 76605->76578 76606->76587 76607->76593 76608->76596 76609->76591 76610->76603 76611 140002b10 76612 140002b32 76611->76612 76620 140002c5d 76611->76620 76613 140002c62 memcpy_s 76612->76613 76618 140002b44 memcpy_s vscan_fn 76612->76618 76614 140002c96 VirtualAlloc 76613->76614 76615 140002cc8 memcpy_s 76614->76615 76616 14000c4d8 63 API calls 76615->76616 76617 140002ce4 CloseHandle 76616->76617 76617->76620 76619 14000c294 _RunAllParam 62 API calls 76618->76619 76618->76620 76619->76620 76621 140001750 76622 14000c364 72 API calls 76621->76622 76628 140001780 memcpy_s 76622->76628 76623 140001824 76624 14000184b 76623->76624 76626 14000c294 _RunAllParam 62 API calls 76623->76626 76627 14000bf30 _fltout2 8 API calls 76624->76627 76625 1400017d0 select 76625->76623 76625->76628 76626->76624 76629 14000185e 76627->76629 76628->76623 76628->76625 76630 1400017f4 recv 76628->76630 76630->76623 76631 140001814 76630->76631 76633 140001bd0 68 API calls memcpy_s 76631->76633 76633->76628 76634 14000c458 76635 14000c466 76634->76635 76636 14000c4a6 76635->76636 76640 14000c47a 76635->76640 76649 14000e7c4 61 API calls 4 library calls 76636->76649 76638 14000c4d2 76644 14000c42c 76638->76644 76642 14000c49c GetCurrentThreadId 76640->76642 76643 14000c48d GetLastError ExitThread 76640->76643 76642->76638 76645 14000e7a0 _getptd 61 API calls 76644->76645 76646 14000c435 76645->76646 76650 14000c408 76646->76650 76649->76638 76651 14000e71c __doserrno 61 API calls 76650->76651 76652 14000c415 76651->76652 76653 14000c422 ExitThread 76652->76653 76655 14000e8f8 63 API calls _freefls 76652->76655 76655->76653 76656 7ff665c327a0 GetLastError 76657 7ff665c327c7 76656->76657 76658 7ff665c327c2 76656->76658 76676 7ff665c327cf SetLastError 76657->76676 76679 7ff665c31574 76657->76679 76691 7ff665c3152c 6 API calls try_get_function 76658->76691 76665 7ff665c3281b 76667 7ff665c31574 _invalid_parameter_noinfo 6 API calls 76665->76667 76666 7ff665c3280b 76668 7ff665c31574 _invalid_parameter_noinfo 6 API calls 76666->76668 76670 7ff665c32823 76667->76670 76669 7ff665c32812 76668->76669 76692 7ff665c310cc 14 API calls 2 library calls 76669->76692 76671 7ff665c32839 76670->76671 76672 7ff665c32827 76670->76672 76693 7ff665c323d4 14 API calls _invalid_parameter_noinfo 76671->76693 76674 7ff665c31574 _invalid_parameter_noinfo 6 API calls 76672->76674 76674->76669 76677 7ff665c32841 76694 7ff665c310cc 14 API calls 2 library calls 76677->76694 76695 7ff665c3110c 76679->76695 76682 7ff665c315ac 76682->76676 76684 7ff665c31054 76682->76684 76683 7ff665c315b4 TlsSetValue 76683->76682 76689 7ff665c31065 _invalid_parameter_noinfo 76684->76689 76685 7ff665c310b6 76706 7ff665c28cf4 14 API calls _invalid_parameter_noinfo 76685->76706 76686 7ff665c3109a HeapAlloc 76687 7ff665c310b4 76686->76687 76686->76689 76687->76665 76687->76666 76689->76685 76689->76686 76705 7ff665c309f0 EnterCriticalSection LeaveCriticalSection _invalid_parameter_noinfo 76689->76705 76692->76676 76693->76677 76694->76676 76696 7ff665c3116d 76695->76696 76703 7ff665c31168 try_get_function 76695->76703 76696->76682 76696->76683 76697 7ff665c31250 76697->76696 76700 7ff665c3125e GetProcAddress 76697->76700 76698 7ff665c3119c LoadLibraryExW 76699 7ff665c311bd GetLastError 76698->76699 76698->76703 76699->76703 76701 7ff665c3126f 76700->76701 76701->76696 76702 7ff665c31235 FreeLibrary 76702->76703 76703->76696 76703->76697 76703->76698 76703->76702 76704 7ff665c311f7 LoadLibraryExW 76703->76704 76704->76703 76705->76689 76706->76687 76708 1fe8fae1710 GetCurrentThreadId 76725 1fe8fae1650 76708->76725 76711 1fe8fae1733 76712 1fe8fae1750 SetEvent 76732 1fe8fae0450 7 API calls _RunAllParam 76712->76732 76713 1fe8fae1781 CloseHandle 76714 1fe8fae1792 76713->76714 76716 1fe8fae17b0 76714->76716 76731 1fe8faddf80 send 76714->76731 76719 1fe8fae17d4 WSACloseEvent 76716->76719 76720 1fe8fae17de 76716->76720 76717 1fe8fae1772 76717->76713 76733 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76717->76733 76719->76720 76723 1fe8fae17e8 shutdown 76720->76723 76724 1fe8fae17fd _RunAllParam 76720->76724 76722 1fe8fae1780 76722->76713 76723->76724 76726 1fe8fae16e7 SetLastError 76725->76726 76730 1fe8fae1679 76725->76730 76727 1fe8fae16c6 76726->76727 76727->76711 76727->76712 76727->76713 76727->76714 76728 1fe8fae16b9 76728->76726 76728->76727 76729 1fe8fae169d SwitchToThread 76729->76730 76730->76728 76730->76729 76732->76717 76733->76722 76734 1fe8fae2690 76735 1fe8fae26bb 76734->76735 76736 1fe8fae284c 76735->76736 76761 1fe8fae15c0 SwitchToThread SetLastError 76735->76761 76738 1fe8fae26cb 76738->76736 76762 1fe8fae1ef0 76738->76762 76740 1fe8fae2734 76741 1fe8fae273c 76740->76741 76742 1fe8fae2800 WSAGetLastError 76740->76742 76799 1fe8fae0ef0 htons bind 76741->76799 76744 1fe8fae280d 76742->76744 76746 1fe8fae280f SetLastError GetLastError 76744->76746 76745 1fe8fae2757 76747 1fe8fae27f1 WSAGetLastError 76745->76747 76748 1fe8fae275f SetLastError 76745->76748 76749 1fe8fae2838 SetLastError 76746->76749 76747->76744 76750 1fe8fae2778 76748->76750 76749->76736 76751 1fe8fae277d 76750->76751 76752 1fe8fae27d8 GetLastError 76750->76752 76783 1fe8fae0fd0 76751->76783 76752->76744 76754 1fe8fae278d 76755 1fe8fae27c9 WSAGetLastError 76754->76755 76756 1fe8fae2791 76754->76756 76755->76744 76800 1fe8fae2640 32 API calls 76756->76800 76758 1fe8fae2799 76759 1fe8fae279d ResetEvent 76758->76759 76760 1fe8fae27bb 76758->76760 76759->76736 76760->76746 76761->76738 76801 1fe8fae0690 StrChrW 76762->76801 76764 1fe8fae1f27 76805 1fe8fade620 76764->76805 76766 1fe8fae1f92 socket 76768 1fe8fae1fb1 76766->76768 76781 1fe8fae1f40 76766->76781 76767 1fe8fae1f3c 76767->76766 76770 1fe8fade240 25 API calls 76767->76770 76767->76781 76769 1fe8faddeb0 WSAIoctl WSAGetLastError 76768->76769 76771 1fe8fae1fbb 76769->76771 76772 1fe8fae1f75 76770->76772 76773 1fe8fae1fd2 76771->76773 76774 1fe8fad72b0 _RunAllParam GdipDisposeImage GdipFree 76771->76774 76772->76766 76776 1fe8fae1f84 WSASetLastError 76772->76776 76772->76781 76775 1fe8fadddc0 setsockopt setsockopt setsockopt setsockopt SetLastError 76773->76775 76774->76773 76777 1fe8fae1fdf 76775->76777 76776->76781 76778 1fe8fae1ff4 WSACreateEvent 76777->76778 76779 1fe8fad72b0 _RunAllParam GdipDisposeImage GdipFree 76777->76779 76780 1fe8fae1ec0 GdipDisposeImage GdipFree WideCharToMultiByte WideCharToMultiByte 76778->76780 76782 1fe8fae1ff3 76779->76782 76780->76781 76781->76740 76782->76778 76784 1fe8fae0fec WSAEventSelect 76783->76784 76785 1fe8fae1050 connect 76783->76785 76787 1fe8fae1039 76784->76787 76788 1fe8fae1003 connect 76784->76788 76786 1fe8fae1072 WSAEventSelect 76785->76786 76785->76787 76786->76787 76789 1fe8fae108b SetLastError 76786->76789 76787->76754 76788->76787 76790 1fe8fae1027 76788->76790 76792 1fe8fae10ae 76789->76792 76790->76787 76791 1fe8fae102c WSAGetLastError 76790->76791 76791->76787 76793 1fe8fae10dd send 76792->76793 76794 1fe8fae10b3 GetLastError WSASetLastError 76792->76794 76795 1fe8fae10f4 WSAGetLastError 76793->76795 76796 1fe8fae1104 76793->76796 76794->76754 76795->76796 76796->76787 76809 1fe8fad72b0 GdipDisposeImage GdipFree _RunAllParam 76796->76809 76798 1fe8fae1126 76799->76745 76800->76758 76802 1fe8fae06bb 76801->76802 76803 1fe8fae06d8 lstrlenW 76801->76803 76802->76764 76804 1fe8fae0711 memcpy_s 76803->76804 76804->76764 76808 1fe8faddc70 25 API calls 2 library calls 76805->76808 76807 1fe8fade63d 76808->76807 76809->76798 76810 140009c20 GetCurrentThreadId 76827 140009b60 76810->76827 76813 140009c43 76814 140009c91 CloseHandle 76816 140009ca2 76814->76816 76815 140009c60 SetEvent 76834 140008960 9 API calls _RunAllParam 76815->76834 76818 140009cc0 76816->76818 76833 140006490 send 76816->76833 76821 140009ce4 WSACloseEvent 76818->76821 76822 140009cee 76818->76822 76819 140009c82 76819->76814 76835 140004a70 RaiseException _RunAllParam 76819->76835 76821->76822 76824 140009d15 76822->76824 76825 140009cf8 shutdown closesocket 76822->76825 76825->76824 76826 140009c90 76826->76814 76828 140009bf7 SetLastError 76827->76828 76829 140009b89 76827->76829 76831 140009bd6 76828->76831 76830 140009bad SwitchToThread 76829->76830 76832 140009bc9 76829->76832 76830->76829 76831->76813 76831->76814 76831->76815 76831->76816 76832->76828 76832->76831 76834->76819 76835->76826 76836 1fe8fad1750 76837 1fe8fae3e78 31 API calls 76836->76837 76843 1fe8fad1780 memcpy_s 76837->76843 76838 1fe8fad184b 76841 1fe8fae3a20 _cftoe_l 7 API calls 76838->76841 76839 1fe8fad17d0 select 76842 1fe8fad1824 76839->76842 76839->76843 76840 1fe8fae3d84 _RunAllParam 25 API calls 76840->76838 76844 1fe8fad185e 76841->76844 76842->76838 76842->76840 76843->76839 76843->76842 76845 1fe8fad17f4 recv 76843->76845 76845->76842 76846 1fe8fad1814 76845->76846 76848 1fe8fad1bc0 27 API calls 2 library calls 76846->76848 76848->76843 76850 140003da0 76851 14000c9e0 76850->76851 76852 140003de8 SleepEx 76851->76852 76857 140003e10 76852->76857 76853 140003e20 SleepEx 76853->76853 76853->76857 76855 14000c364 72 API calls 76855->76857 76856 14000c294 _RunAllParam 62 API calls 76856->76857 76857->76853 76857->76855 76857->76856 76860 140003ea3 SleepEx SleepEx 76857->76860 76863 140003ee3 76857->76863 76865 1400012c0 6 API calls 76857->76865 76866 1400013b0 10 API calls _fltout2 76857->76866 76867 140001e00 75 API calls 76857->76867 76860->76857 76861 140003f01 CreateEventA 76861->76863 76862 140003f4c Sleep 76862->76863 76863->76861 76863->76862 76864 140003f79 CloseHandle 76863->76864 76864->76857 76865->76857 76866->76857 76867->76857 76868 14000aba0 76869 14000abcb 76868->76869 76870 14000ad5c 76869->76870 76895 140009ad0 SwitchToThread SetLastError 76869->76895 76872 14000abdb 76872->76870 76896 14000a400 76872->76896 76874 14000ac44 76875 14000ac4c 76874->76875 76876 14000ad10 WSAGetLastError 76874->76876 76933 140009400 htons bind 76875->76933 76878 14000ad1d 76876->76878 76880 14000ad1f SetLastError GetLastError 76878->76880 76879 14000ac67 76881 14000ad01 WSAGetLastError 76879->76881 76882 14000ac6f SetLastError 76879->76882 76883 14000ad48 SetLastError 76880->76883 76881->76878 76884 14000ac88 76882->76884 76883->76870 76885 14000ace8 GetLastError 76884->76885 76886 14000ac8d 76884->76886 76885->76878 76917 1400094e0 76886->76917 76888 14000ac9d 76889 14000aca1 76888->76889 76890 14000acd9 WSAGetLastError 76888->76890 76934 14000ab50 63 API calls 76889->76934 76890->76878 76892 14000aca9 76893 14000accb 76892->76893 76894 14000acad ResetEvent 76892->76894 76893->76880 76894->76870 76895->76872 76935 140008ba0 StrChrW 76896->76935 76898 14000a437 76939 140006b30 76898->76939 76900 14000a450 76900->76874 76901 14000a4a2 socket 76901->76900 76902 14000a4c1 76901->76902 76905 1400063c0 WSAIoctl WSAGetLastError 76902->76905 76903 14000a44c 76903->76900 76903->76901 76904 140006750 62 API calls 76903->76904 76906 14000a485 76904->76906 76907 14000a4cb 76905->76907 76906->76900 76906->76901 76908 14000a494 WSASetLastError 76906->76908 76909 140004a70 _RunAllParam RaiseException 76907->76909 76911 14000a4e2 76907->76911 76908->76900 76909->76911 76910 1400062d0 setsockopt setsockopt setsockopt setsockopt SetLastError 76912 14000a4ef 76910->76912 76911->76910 76913 14000a504 WSACreateEvent 76912->76913 76914 140004a70 _RunAllParam RaiseException 76912->76914 76915 14000a3d0 WideCharToMultiByte WideCharToMultiByte RaiseException 76913->76915 76916 14000a503 76914->76916 76915->76900 76916->76913 76918 1400094fc WSAEventSelect 76917->76918 76919 140009560 connect 76917->76919 76921 140009549 76918->76921 76922 140009513 connect 76918->76922 76920 140009582 WSAEventSelect 76919->76920 76919->76921 76920->76921 76923 14000959b SetLastError 76920->76923 76921->76888 76922->76921 76924 140009537 76922->76924 76926 1400095be 76923->76926 76924->76921 76925 14000953c WSAGetLastError 76924->76925 76925->76921 76927 1400095c3 GetLastError WSASetLastError 76926->76927 76928 1400095ed send 76926->76928 76927->76888 76929 140009614 76928->76929 76930 140009604 WSAGetLastError 76928->76930 76929->76921 76943 140004a70 RaiseException _RunAllParam 76929->76943 76930->76929 76932 140009636 76933->76879 76934->76892 76936 140008be8 lstrlenW 76935->76936 76937 140008bcb 76935->76937 76938 140008c21 memcpy_s 76936->76938 76937->76898 76938->76898 76942 140006180 62 API calls 2 library calls 76939->76942 76941 140006b4d 76942->76941 76943->76932

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 1fe8fad2b00-1fe8fad2bd1 call 1fe8fae5800 call 1fe8fae3e78 call 1fe8fae5ee0 * 2 gethostname gethostbyname 9 1fe8fad2bd7-1fe8fad2c21 inet_ntoa call 1fe8fae45fc * 2 0->9 10 1fe8fad2c7f-1fe8fad2db4 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 1fe8fad4d10 GetSystemInfo wsprintfW call 1fe8fad4770 call 1fe8fad4b60 0->10 9->10 19 1fe8fad2c23-1fe8fad2c26 9->19 21 1fe8fad2db9-1fe8fad2dc2 GetForegroundWindow 10->21 22 1fe8fad2c30-1fe8fad2c7d inet_ntoa call 1fe8fae45fc * 2 19->22 23 1fe8fad2dda-1fe8fad2e24 lstrlenW call 1fe8fad4900 21->23 24 1fe8fad2dc4-1fe8fad2dd4 GetWindowTextW 21->24 22->10 30 1fe8fad2e26-1fe8fad2e39 call 1fe8fae3e0c 23->30 31 1fe8fad2e3e-1fe8fad2e8b call 1fe8fae3e0c lstrlenW call 1fe8fad4900 23->31 24->23 30->31 38 1fe8fad2e8d-1fe8fad2ea0 call 1fe8fae3e0c 31->38 39 1fe8fad2ea5-1fe8fad2ee8 call 1fe8faf8350 call 1fe8faf8168 31->39 38->39 45 1fe8fad2eea-1fe8fad2eec 39->45 46 1fe8fad2eee GetSystemInfo 39->46 47 1fe8fad2ef4-1fe8fad2f01 45->47 46->47 49 1fe8fad2f03-1fe8fad2f0e 47->49 50 1fe8fad2f10 47->50 49->50 51 1fe8fad2f15-1fe8fad2f66 wsprintfW call 1fe8fad4570 call 1fe8fad4140 49->51 50->51 56 1fe8fad2f68 51->56 57 1fe8fad2f6f-1fe8fad2f8e call 1fe8fae3e0c call 1fe8fad3fe0 51->57 56->57 62 1fe8fad2f97-1fe8fad3085 call 1fe8fae3e0c call 1fe8fad3db0 call 1fe8fad3a60 call 1fe8fae4118 GetLocalTime wsprintfW GetLocaleInfoW call 1fe8fae5ee0 EnumDisplayMonitors 57->62 63 1fe8fad2f90 57->63 74 1fe8fad308b-1fe8fad30a4 call 1fe8fae3de8 62->74 75 1fe8fad311c-1fe8fad3123 lstrcatW 62->75 63->62 77 1fe8fad3129-1fe8fad315f GetSystemDirectoryW GetCurrentHwProfileW 74->77 81 1fe8fad30aa 74->81 75->77 79 1fe8fad316c 77->79 80 1fe8fad3161-1fe8fad316a 77->80 82 1fe8fad3175-1fe8fad31d2 call 1fe8fad31e0 call 1fe8fae3d84 call 1fe8fae3a20 79->82 80->82 84 1fe8fad30b1-1fe8fad30fe 81->84 86 1fe8fad3107-1fe8fad3118 call 1fe8fae3de8 84->86 87 1fe8fad3100 84->87 86->84 92 1fe8fad311a 86->92 87->86 92->77
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharInfoMultiWidewsprintf$System$Window_errnoinet_ntoalstrlenswprintf$AddressCountCurrentDirectoryDisplayEnumForegroundHandleInputLastLocalLocaleModuleMonitorsProcProfileTextTickTime_invalid_parameter_noinfogethostbynamegethostnamelstrcatmalloc
            • String ID: %d min$1.0$2024. 9. 2$>f:yhV:$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$Run:%s Con:%4d.%2d.%2d-%2d:%2d:%2d$X64 %s$kernel32.dll$x64$x86
            • API String ID: 3092165503-1594994734
            • Opcode ID: 6f9a26f35435b5e38f586dea0dd05bdbbb2e27cbbf1188ae0f7fa3827131af10
            • Instruction ID: 429fea298dce1b84a952d30ef6383a8d3e0da74f6edc15be503b50ba607ff936
            • Opcode Fuzzy Hash: 6f9a26f35435b5e38f586dea0dd05bdbbb2e27cbbf1188ae0f7fa3827131af10
            • Instruction Fuzzy Hash: A702A436200BC296EB20EF61E8447EA77E0F7447A8F904266DB5E576B5DF38C64AC740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleSleep$EnumObjectSingleWaitWindows$CreateEventLocalTimemallocwsprintf
            • String ID: %4d.%2d.%2d-%2d:%2d:%2d$192.168.1.2$6341
            • API String ID: 2252640433-291747511
            • Opcode ID: e11e14edb89984939ee2fba468cc7826a2202fde34ed19499967ef9fe7804308
            • Instruction ID: 8c1606e782706e0927ed71dbea0b70106a8976eb55918ad51e8da492ec53f680
            • Opcode Fuzzy Hash: e11e14edb89984939ee2fba468cc7826a2202fde34ed19499967ef9fe7804308
            • Instruction Fuzzy Hash: 68916A72204A8286EB24BF25E8507FE77E0F785BE4F504265DB8A4BAB4DF38C546C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 148 7ff665b44610-7ff665b4463f 149 7ff665b44641-7ff665b4465e GetModuleHandleW GetProcAddress 148->149 150 7ff665b44665-7ff665b44686 148->150 149->150 151 7ff665b4468c-7ff665b446a0 150->151 152 7ff665b44b72-7ff665b44b7d SetLastError 150->152 153 7ff665b446b4-7ff665b446c7 151->153 154 7ff665b446a2-7ff665b446af SetLastError 151->154 153->152 156 7ff665b446cd-7ff665b446d6 153->156 155 7ff665b4488b-7ff665b448b7 call 7ff665c20a50 154->155 156->152 157 7ff665b446dc-7ff665b446e1 156->157 157->152 159 7ff665b446e7-7ff665b446fa 157->159 161 7ff665b44728-7ff665b44758 GetNativeSystemInfo 159->161 162 7ff665b446fc-7ff665b446ff 159->162 161->152 164 7ff665b4475e-7ff665b44785 VirtualAlloc 161->164 163 7ff665b44703-7ff665b4470a 162->163 165 7ff665b4470c-7ff665b44710 163->165 166 7ff665b44712 163->166 167 7ff665b44787-7ff665b447a2 VirtualAlloc 164->167 168 7ff665b447b4-7ff665b447df GetProcessHeap HeapAlloc 164->168 172 7ff665b44714-7ff665b44726 165->172 166->172 167->168 169 7ff665b447a4-7ff665b447af SetLastError 167->169 170 7ff665b447e1-7ff665b447fd VirtualFree SetLastError 168->170 171 7ff665b447ff-7ff665b4485f 168->171 173 7ff665b44883 169->173 174 7ff665b4487b 170->174 175 7ff665b448b8-7ff665b44908 VirtualAlloc call 7ff665c225e0 171->175 176 7ff665b44861-7ff665b44866 SetLastError 171->176 172->161 172->163 173->155 174->173 181 7ff665b449cc-7ff665b449d4 175->181 182 7ff665b4490e 175->182 177 7ff665b4486c-7ff665b44874 call 7ff665b44b90 176->177 187 7ff665b44876 177->187 184 7ff665b449da-7ff665b449e2 181->184 185 7ff665b44a7e-7ff665b44a83 181->185 186 7ff665b44911-7ff665b44916 182->186 184->177 189 7ff665b449e8-7ff665b449ef 184->189 188 7ff665b44a85-7ff665b44a92 call 7ff665b44410 185->188 190 7ff665b44918-7ff665b4491e 186->190 191 7ff665b44962-7ff665b4496d 186->191 187->174 188->177 202 7ff665b44a98-7ff665b44aa2 call 7ff665b44280 188->202 193 7ff665b449fd-7ff665b44a0a 189->193 194 7ff665b449f1-7ff665b449f8 189->194 195 7ff665b44924-7ff665b44948 190->195 196 7ff665b449b3-7ff665b449c4 190->196 191->176 197 7ff665b44973-7ff665b44993 VirtualAlloc 191->197 193->185 200 7ff665b44a0c-7ff665b44a0e 193->200 194->188 195->177 207 7ff665b4494e-7ff665b44960 call 7ff665c22bb0 195->207 196->186 198 7ff665b449ca 196->198 197->177 201 7ff665b44999-7ff665b449b0 call 7ff665c225e0 197->201 198->181 204 7ff665b44a10-7ff665b44a2b 200->204 201->196 202->177 215 7ff665b44aa8-7ff665b44ab6 202->215 208 7ff665b44a2d 204->208 209 7ff665b44a6c-7ff665b44a77 204->209 207->196 213 7ff665b44a30-7ff665b44a41 208->213 209->204 214 7ff665b44a79 209->214 217 7ff665b44a4e 213->217 218 7ff665b44a43-7ff665b44a46 213->218 214->185 219 7ff665b44ab8-7ff665b44ac4 215->219 220 7ff665b44aea-7ff665b44af4 215->220 222 7ff665b44a52-7ff665b44a6a 217->222 221 7ff665b44a48-7ff665b44a4c 218->221 218->222 219->220 225 7ff665b44ac6-7ff665b44acc 219->225 223 7ff665b44af6-7ff665b44b1f RtlAddFunctionTable 220->223 224 7ff665b44b22-7ff665b44b28 220->224 221->222 222->209 222->213 223->224 226 7ff665b44b2a-7ff665b44b31 224->226 227 7ff665b44b62-7ff665b44b6d 224->227 225->220 228 7ff665b44ace 225->228 229 7ff665b44b56-7ff665b44b5d 226->229 230 7ff665b44b33-7ff665b44b3f 226->230 227->187 231 7ff665b44ad0-7ff665b44ae5 228->231 229->187 234 7ff665b44b4b-7ff665b44b51 230->234 235 7ff665b44b41 230->235 236 7ff665b44ae7 231->236 234->187 235->234 236->220
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocErrorLastVirtual$Heap$FreeProcess$AddressFunctionHandleInfoModuleNativeProcSystemTable
            • String ID: RtlAddFunctionTable$ntdll
            • API String ID: 1700573182-1103699993
            • Opcode ID: 1198e67249c0b7e84dde9154b3b4e9c9355052bda3a350e5c94f78a972d0fa75
            • Instruction ID: aa0a6f233529620cc722009a057f98c944196e638f9b54405c6e7a291f4c52b2
            • Opcode Fuzzy Hash: 1198e67249c0b7e84dde9154b3b4e9c9355052bda3a350e5c94f78a972d0fa75
            • Instruction Fuzzy Hash: 93F10A32A09A42C6EB648F16E46177973B1FB49F84F444139DA8E8B798EF3DE855C700

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcmp
            • String ID: %s-%d$error
            • API String ID: 4288439342-992067998
            • Opcode ID: 339020dc813d921992459e6716a65cd383114c8633f93e4cc4539f4e2fb5fbc3
            • Instruction ID: 2e6781875911672bde0c156df7814767ee8bf7d887f8bb34026b01f7eddf801b
            • Opcode Fuzzy Hash: 339020dc813d921992459e6716a65cd383114c8633f93e4cc4539f4e2fb5fbc3
            • Instruction Fuzzy Hash: 53513431315AC282EBA0AB11F494BEB63E4F784BD5F505271EB8987AB4DF38C556CB00

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Crypt$ContextHash$AcquireCloseDestroyHandle$CreateDataDecryptDeriveRelease
            • String ID: 2b134t52mhhbGaN4$Error creating a keyset!$Microsoft Enhanced Cryptographic Provider v1.0
            • API String ID: 3666277636-84394693
            • Opcode ID: f172555bccba036a97b3cd1372cebb2be6ca885063ea5db245dcb55184fec282
            • Instruction ID: f8c200430ea3a714b2a41c7600a546a2d14bcffeac726977d6edf308be553ead
            • Opcode Fuzzy Hash: f172555bccba036a97b3cd1372cebb2be6ca885063ea5db245dcb55184fec282
            • Instruction Fuzzy Hash: F4414A32B04A52C5F720CF61E856AB933B1FB88B58B404235D95E9BBA8DF3CD949C704

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValue_vswprintf_s_lswprintf
            • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
            • API String ID: 1494749741-3190923360
            • Opcode ID: 63a278c1726442162d98cc2237712d9ccc026d0492f426b623a28aeacd60e9e6
            • Instruction ID: f31d641789857ebd4976b49026e3df6267a8fe587f58213e11c0ef7d3088fd6f
            • Opcode Fuzzy Hash: 63a278c1726442162d98cc2237712d9ccc026d0492f426b623a28aeacd60e9e6
            • Instruction Fuzzy Hash: FA315E36215BC296EA60AB11E4507E973A0FB85FE4F444361EF9A57BA8DF38C516CB00

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
            • String ID:
            • API String ID: 950253168-0
            • Opcode ID: e4f1b628e603b8c0e271cec45e5bcd3519c32228a8b6efe7a25591412e67fb9e
            • Instruction ID: ed47b133812dd781fefe460404a514a0b40200c84aacb472891bc64b054dfc42
            • Opcode Fuzzy Hash: e4f1b628e603b8c0e271cec45e5bcd3519c32228a8b6efe7a25591412e67fb9e
            • Instruction Fuzzy Hash: D1511B36204B8186DB60DF65F4407AAB7E4F789BA4F104229EB9A57B74DF3CD0469B00

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
            • String ID:
            • API String ID: 950253168-0
            • Opcode ID: 6be368349b335f687857114e3581a3aed3ff549df64c905fc01b56a36ba75a01
            • Instruction ID: e00b2aa1afe8dc942cd989892e5c322118a8095490c56380a45fdb8c14d7f693
            • Opcode Fuzzy Hash: 6be368349b335f687857114e3581a3aed3ff549df64c905fc01b56a36ba75a01
            • Instruction Fuzzy Hash: 76512A72204B8087DB65CF66F8407AAB7A4F789B98F004219EB9E57B65DF3DC149DB00

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$CreateWindow$CloseConsoleCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
            • String ID:
            • API String ID: 1785272045-0
            • Opcode ID: ee474838568d569156a9ab4685564af73a3dd786a2dd2134ad0acab19430d296
            • Instruction ID: fe11c5c89b342f1589b79449597d4b3e4c24726e3e961e716cd572b682034483
            • Opcode Fuzzy Hash: ee474838568d569156a9ab4685564af73a3dd786a2dd2134ad0acab19430d296
            • Instruction Fuzzy Hash: 52111575610A0082F717DB72FC697EA33A2BB8C795F44412ABB5A4B671CF3985899200

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: swprintf$DiskDriveFreeGlobalMemorySpaceStatusType
            • String ID: %sFree%d Gb $:$@$HDD:%d
            • API String ID: 2105347210-3501811827
            • Opcode ID: 921d8f27bbcfc5cac4d84ec7f6df4691689466164058b9f85b3ed9747272aa44
            • Instruction ID: d5cb8dfea97e23ebff8790d1277cc878c118b0d51b949dbe91249d175ad44430
            • Opcode Fuzzy Hash: 921d8f27bbcfc5cac4d84ec7f6df4691689466164058b9f85b3ed9747272aa44
            • Instruction Fuzzy Hash: 2D314836608BC586E760EF16B84079BB7A4F389794F901226EBCD43B29DF39C556CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Close$CreateInitializeInstanceOpenlstrlenswprintf
            • String ID: %s $DriverDesc$SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
            • API String ID: 900129089-2074342395
            • Opcode ID: 414001dd6f4b59178dfbdb8a04c3b81a196c16d8098a2c073610e78b58e0a71d
            • Instruction ID: b7dd906dde1eadeb58f75accb662451bdfd556c31a4431f292fb692660d8fd05
            • Opcode Fuzzy Hash: 414001dd6f4b59178dfbdb8a04c3b81a196c16d8098a2c073610e78b58e0a71d
            • Instruction Fuzzy Hash: F1216F36224A8A83EB11EF25E4457D977A0F7C8B95F805222EB4E47764DF39C90ACB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: 14f04c64a592990b04a434c863bea14f9e693fb1411986df20686f0e1fcf2037
            • Instruction ID: 26dd35d8292e17f3a1a80a383d0c12133b572318fe7e3146576035a2fd5506be
            • Opcode Fuzzy Hash: 14f04c64a592990b04a434c863bea14f9e693fb1411986df20686f0e1fcf2037
            • Instruction Fuzzy Hash: 5F314D32214F8186DB60DB25E8507EE73E4F7887A4F540265EB9D47BA9EF38C546CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Heap$CreateInformationVersion
            • String ID:
            • API String ID: 3563531100-0
            • Opcode ID: 2da6a33331be37aea9e041944a378e02ae9d1d2031e246c02c7f00763c845b9d
            • Instruction ID: 9762234abf56566a40acbb21629f865e49837f74366e360dbcd12cc7b60ef2a7
            • Opcode Fuzzy Hash: 2da6a33331be37aea9e041944a378e02ae9d1d2031e246c02c7f00763c845b9d
            • Instruction Fuzzy Hash: 4FE03974211AC282EB84BB54A859BE92294F7883E2F900564EA0A026A4EF38804B8610
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocVirtualmallocrecvselect
            • String ID:
            • API String ID: 1241053632-0
            • Opcode ID: a988ccf7a066a7ec199917bd5ea2c0e45977bb7d9429f392867354966ccba78a
            • Instruction ID: da906946f811fe3034de1551e16bdf189c9d97e0d602735662b5d46e6c8cd5bf
            • Opcode Fuzzy Hash: a988ccf7a066a7ec199917bd5ea2c0e45977bb7d9429f392867354966ccba78a
            • Instruction Fuzzy Hash: E3218B72714AC181EB71AB25E5543BE67E1F789BE8F404275DB8A87BA9DF38C0468700

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateMutex$Sleep$ConsoleErrorHandleLastModuleWindowlstrcmplstrlen
            • String ID: 2024. 9. 2$key$open
            • API String ID: 4141083079-93764921
            • Opcode ID: 66d0600071f0f3915794d2991b8f21b3d63c5bbc832a269f4ff7be3149a67255
            • Instruction ID: d5a63bec561d879295f4e84790fbbc96d57bab469218344727215ff51fdcece3
            • Opcode Fuzzy Hash: 66d0600071f0f3915794d2991b8f21b3d63c5bbc832a269f4ff7be3149a67255
            • Instruction Fuzzy Hash: 60312935210AC382FB54BB21E8647FA23E1FB847A4F9443B5E74A4A6B5DF39C50AC740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Sleep$CloseCreateEventHandle
            • String ID: 206.238.220.204$206.238.220.204$206.238.220.204$6666$6666$8888
            • API String ID: 1603472376-913434440
            • Opcode ID: a0f3fcac8467a186e70fc3d0f1e9634cb6668e8e39ecb6f8bf227a2d123b2ab3
            • Instruction ID: f9672b19bd4d940d0eafbb644b3287daaa15567fe727fe739266967074bb03a5
            • Opcode Fuzzy Hash: a0f3fcac8467a186e70fc3d0f1e9634cb6668e8e39ecb6f8bf227a2d123b2ab3
            • Instruction Fuzzy Hash: B2812475220A4086E713DB66E854BE977A5F78DBC4F80412AFB1A47AF1CF38C945C740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$EventSelectconnect$send
            • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
            • API String ID: 1826129850-4236689219
            • Opcode ID: dcf0498b7daf1886a9e955b361d597334a96f5170af3cf8f91b6c37e3f771d0e
            • Instruction ID: 4a2788d7c579988a2cf66795f4b4f92f396d46f87ab15a38d39c27d1577bcaad
            • Opcode Fuzzy Hash: dcf0498b7daf1886a9e955b361d597334a96f5170af3cf8f91b6c37e3f771d0e
            • Instruction Fuzzy Hash: 6231753131099282EBA0AF66E5947A923E0F748BF0F504775DB5987AF4DF79C8978700

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$EventSelectconnect$send
            • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
            • API String ID: 1826129850-4236689219
            • Opcode ID: 139d6e0b11e75e2d957019177b71ab07b7833485f606efeb0368cc19468fda0d
            • Instruction ID: 99e2289132232311c34ceb59dbb758c0b81f7082a8ce3018f105167220c7fc9e
            • Opcode Fuzzy Hash: 139d6e0b11e75e2d957019177b71ab07b7833485f606efeb0368cc19468fda0d
            • Instruction Fuzzy Hash: 22316171714A1082FBA2DB67E8957A92260FB4CBE4F500624EB1D87AF0CF79C8D59700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 483 7ff665b49920-7ff665b49997 call 7ff665b495f0 call 7ff665b51d90 488 7ff665b499ac-7ff665b499b5 call 7ff665b4d970 483->488 489 7ff665b49999-7ff665b4999b 483->489 491 7ff665b499ba-7ff665b499d8 call 7ff665b59470 call 7ff665b79080 488->491 489->491 492 7ff665b4999d-7ff665b499a6 489->492 498 7ff665b49b42 491->498 499 7ff665b499de-7ff665b499f7 GetProcAddress 491->499 492->491 493 7ff665b499a8 492->493 493->488 502 7ff665b49b45-7ff665b49b4d 498->502 500 7ff665b49a17 499->500 501 7ff665b499f9-7ff665b49a15 call 7ff665b59470 call 7ff665b79080 499->501 506 7ff665b49a1b-7ff665b49a1e 500->506 501->506 504 7ff665b49b4f-7ff665b49b52 502->504 505 7ff665b49b61-7ff665b49b6a call 7ff665b4d970 502->505 511 7ff665b49b54-7ff665b49b5b 504->511 512 7ff665b49b6f-7ff665b49b9a call 7ff665c20a50 504->512 505->512 508 7ff665b49a25-7ff665b49a3c GetProcAddress 506->508 509 7ff665b49a20-7ff665b49a23 506->509 513 7ff665b49a40-7ff665b49a42 508->513 509->513 511->512 516 7ff665b49b5d 511->516 517 7ff665b49a44-7ff665b49a5b call 7ff665b59470 call 7ff665b79080 513->517 518 7ff665b49a5f-7ff665b49a62 513->518 516->505 517->518 522 7ff665b49a68-7ff665b49a78 GetProcAddress 518->522 523 7ff665b49a64-7ff665b49a66 518->523 525 7ff665b49a7b-7ff665b49a7e 522->525 523->525 525->498 527 7ff665b49a84-7ff665b49a87 525->527 527->498 529 7ff665b49a8d-7ff665b49a90 527->529 529->498 530 7ff665b49a96-7ff665b49aca GetFileVersionInfoSizeExW 529->530 530->498 531 7ff665b49acc-7ff665b49aec call 7ff665c20d2c GetFileVersionInfoW 530->531 534 7ff665b49b35 531->534 535 7ff665b49aee-7ff665b49b0d 531->535 536 7ff665b49b38-7ff665b49b40 call 7ff665c20d24 534->536 535->534 539 7ff665b49b0f-7ff665b49b33 535->539 536->502 539->536
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc$FileInfoVersion$Size
            • String ID: GetFileVersionInfoSizeW$GetFileVersionInfoW$VerQueryValueW
            • API String ID: 2598009218-981298171
            • Opcode ID: efbc4de875c51c5db1a2f3792e47a6250654341176fabd58788366e8468207f5
            • Instruction ID: f3472d5887935b2a9dbb74b1273dbb18f07282c16cae14f2efe9160f38c73f4c
            • Opcode Fuzzy Hash: efbc4de875c51c5db1a2f3792e47a6250654341176fabd58788366e8468207f5
            • Instruction Fuzzy Hash: FC716022B09A52CAFB60CF65D5622BD23B0AB49F98F444135ED4E9B799DE38DD06C340
            APIs
            Strings
            • <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!, xrefs: 000001FE8FAE1B14
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ErrorLast$send
            • String ID: <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!
            • API String ID: 484515946-1981346945
            • Opcode ID: 3feb2db3476dfe5488b86a50e82330a31573681218d9595143e5917083d90cfd
            • Instruction ID: 9d51d9839f57b3090a93184d24b1d6a4a86d3322c67346e1047a5db010c6b810
            • Opcode Fuzzy Hash: 3feb2db3476dfe5488b86a50e82330a31573681218d9595143e5917083d90cfd
            • Instruction Fuzzy Hash: 33516132205F9282EBA4AB25E5503FEB3E0F7487E0F540265DB9A47BA1EF38D056C700
            APIs
            Strings
            • <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!, xrefs: 000000014000A024
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ErrorLast$send
            • String ID: <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!
            • API String ID: 484515946-1981346945
            • Opcode ID: 5d57d71f2378e127ec58ca066b800eec07ab1c04eeec1237c94df71af28c7d82
            • Instruction ID: e19302107cfcd4d779bf577067bd819c2068326c636a879e7a686293c695ea1d
            • Opcode Fuzzy Hash: 5d57d71f2378e127ec58ca066b800eec07ab1c04eeec1237c94df71af28c7d82
            • Instruction Fuzzy Hash: D35158B2205B4086EA66DB22F5403EEB3A5F74DBE0F440216EB9A47BA5DF38D595C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Event$HeapReset$CreateCriticalDestroyEnterFreeSection_errnofree
            • String ID:
            • API String ID: 1991875446-0
            • Opcode ID: de5582a7b0bf2a448274a9d0fdd65a3dc77adcada3569edc15a99a045779d6d1
            • Instruction ID: fa369fae2dab27230243fc406dd7b77efbba9b72aa4849e436242899f75c9f8e
            • Opcode Fuzzy Hash: de5582a7b0bf2a448274a9d0fdd65a3dc77adcada3569edc15a99a045779d6d1
            • Instruction Fuzzy Hash: F2412936211BD1D6EA5CAF60D5603ECB3A4F784BA0F144266DBA9476A0CF74A476C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Event$HeapReset$CreateCriticalDestroyEnterFreeSection_errnofree
            • String ID:
            • API String ID: 1991875446-0
            • Opcode ID: 6ef91d862449374a31e2c21f56ecfbe812c5402d2ca77ce0ef17b07c2c2b9022
            • Instruction ID: 1ffd33958d62e9c4de6f4506ee27df3a5b23c8e9bdd76c965bdead2542330309
            • Opcode Fuzzy Hash: 6ef91d862449374a31e2c21f56ecfbe812c5402d2ca77ce0ef17b07c2c2b9022
            • Instruction Fuzzy Hash: 55413976211B80E6E65ECB22EA503ECB364F788BD0F144226EBA9476B1CF74D475C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Sleep$CreateEvent$CloseHandleTimemalloctime
            • String ID:
            • API String ID: 3316233393-0
            • Opcode ID: 482f008a18393b0adca5cb6b4fb91beae11170d46349654fa1bb411dd128e68f
            • Instruction ID: 8082ef83bc92b70553dfdb52a9dee960ae8875b1953704e18da45eb19ea91207
            • Opcode Fuzzy Hash: 482f008a18393b0adca5cb6b4fb91beae11170d46349654fa1bb411dd128e68f
            • Instruction Fuzzy Hash: B7514572205B4086EB26DB22E5587E973A9E78DBD4F40421AFB5A47BE5CF38C944CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: InfoSystem$AddressHandleModuleNativeProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 3433367815-192647395
            • Opcode ID: 4c543a427f66828ddaee1c6b6b9de7146d4486ede89bd39138456da059a21970
            • Instruction ID: 8bf49acd1307d2ba9f5b6e7f1904ed7732a87c9a18b761cea5135c8828ec0c58
            • Opcode Fuzzy Hash: 4c543a427f66828ddaee1c6b6b9de7146d4486ede89bd39138456da059a21970
            • Instruction Fuzzy Hash: E6014F35605FC282DAA1BB10B8503A673E0F788B90F940275DBCE87764EF3CC2668700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Error$Mode$AttributesCreateFileInstance$InitializeLast
            • String ID: .lnk
            • API String ID: 3954637025-24824748
            • Opcode ID: b24c9fa08b6c10a9395fee26efdd86fb9591dd87fe76247a54ad9b3307d2d46f
            • Instruction ID: 409b9a290bd7454b945bc6841e4f194643b963740e37db3aacc2eaead3ec88af
            • Opcode Fuzzy Hash: b24c9fa08b6c10a9395fee26efdd86fb9591dd87fe76247a54ad9b3307d2d46f
            • Instruction Fuzzy Hash: 81F1C232609A45CAE724DF25D5A22BD73B0FB89B48F144135EA8ECB698DF7CD841CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseEventThread$CurrentHandleSwitchclosesocketshutdown
            • String ID:
            • API String ID: 3526870478-0
            • Opcode ID: 932c4ec2da38c0ac6b1f6ceccf3195afbf5e37ca85e201a0a25c999c6e004dca
            • Instruction ID: aa69897c604cba4f4ffd3be8b145b177c30753f577c629232c220703556eac1a
            • Opcode Fuzzy Hash: 932c4ec2da38c0ac6b1f6ceccf3195afbf5e37ca85e201a0a25c999c6e004dca
            • Instruction Fuzzy Hash: BB310876200A9282EB90AF25D4602AC33B1E788FF8F150371DF2A477E9CF34C8968740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseEventThread$CurrentHandleSwitchclosesocketshutdown
            • String ID:
            • API String ID: 3526870478-0
            • Opcode ID: 341751bcb2a9e39f1c64cda1b8c336d908026eaed392cb499eb77cff94f1bf09
            • Instruction ID: ee6b78ee20e75a199ac0f8d51655120480989cb093c4aabf2c1e140e6d99fe91
            • Opcode Fuzzy Hash: 341751bcb2a9e39f1c64cda1b8c336d908026eaed392cb499eb77cff94f1bf09
            • Instruction Fuzzy Hash: 51310BB6600A5082E762DF36E4507AD23A1E78CFE4F151221EF2A477E9CF34C885C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorEventLastSelect
            • String ID:
            • API String ID: 1135597009-0
            • Opcode ID: 69ada47511ffae6a1b2352c791967df792aaf6681adecbb36eed45c614523dad
            • Instruction ID: 31b5910cf31b44e5ea78f643df273c7faa510b9a495c62ee2f3ffb54a410b743
            • Opcode Fuzzy Hash: 69ada47511ffae6a1b2352c791967df792aaf6681adecbb36eed45c614523dad
            • Instruction Fuzzy Hash: FF21A1F26006418BF768AF75D4997A937E0E708B68F244268CB19862E4DB79C8D7CB44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorEventLastSelect
            • String ID:
            • API String ID: 1135597009-0
            • Opcode ID: ca51bb135ca9b6b53a41005a3fb522d120fffd9efbfa981f642130a86738c22e
            • Instruction ID: 9b8ff33ad4f21ee875c00557280bc8415497f07eb4acfa47184f87d0d427e899
            • Opcode Fuzzy Hash: ca51bb135ca9b6b53a41005a3fb522d120fffd9efbfa981f642130a86738c22e
            • Instruction Fuzzy Hash: E9218EF26006008BF759CF76E4493A936E0E70CB99F650218DB19C76E0CBBAC9D6DB44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
            • String ID:
            • API String ID: 3283625137-0
            • Opcode ID: 1fc69dd64072fa7bf409c8ce7061121ab39990cf21b2db261d2c093eb0dfa2fa
            • Instruction ID: 4f0c9fb3d29530dab6a41f390adf5bf1449a04a31fe3ca505be75641b33c4fa9
            • Opcode Fuzzy Hash: 1fc69dd64072fa7bf409c8ce7061121ab39990cf21b2db261d2c093eb0dfa2fa
            • Instruction Fuzzy Hash: F921A135214BC185EA14BB66E4617EAB2D8F784BF0F444675AF68037E6DF38D0128700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
            • String ID:
            • API String ID: 3283625137-0
            • Opcode ID: b11140e7446571eafd14e7012cf083d785f14c4c77ccc4c9425ccbac4b8ec313
            • Instruction ID: 37f882430a81e144da6995cd907b33d2ea7b296969054656d38c24131aaea18f
            • Opcode Fuzzy Hash: b11140e7446571eafd14e7012cf083d785f14c4c77ccc4c9425ccbac4b8ec313
            • Instruction Fuzzy Hash: A72195B1215B8086EA16DB67B9417DAB290F78CBD0F444625BF69037E6DF38D4508740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: timeKillEvent$timeSetEvent$winmm
            • API String ID: 190572456-1618422980
            • Opcode ID: 122c8a63f252d51b526212ba5446e8d602476a32e04a82d9a1aae74211740df4
            • Instruction ID: d54f7ba87f0b693fc7b157f43fa96286fe7e58617834e0c4b4fd3c7aee3a0d03
            • Opcode Fuzzy Hash: 122c8a63f252d51b526212ba5446e8d602476a32e04a82d9a1aae74211740df4
            • Instruction Fuzzy Hash: BF517132A05652CAFB50CB65D8626BC27B0AB49F68F140235E95ECB6D5DF3CEC45C340
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeapTimerWaitable_errnomalloc
            • String ID: bad allocation
            • API String ID: 996728788-2104205924
            • Opcode ID: 3164918fe516b5a880c1d5ebc565a3863ef63c33cab6ecf522e00527834a8d48
            • Instruction ID: 45a091ef39ce88ad0913170c82ed3b3baf2cfa82371694ffbb958c6b4615798d
            • Opcode Fuzzy Hash: 3164918fe516b5a880c1d5ebc565a3863ef63c33cab6ecf522e00527834a8d48
            • Instruction Fuzzy Hash: 64410436611FC589DB60AF24E9646E833E4F748B98F584175AF490BB68DF74C062C324
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeapTimerWaitable_errnomalloc
            • String ID: bad allocation
            • API String ID: 996728788-2104205924
            • Opcode ID: f8b2bde9cf209f261d56d6a1b00d68b5bb4cd4d590ef32a8494881bf267ae9a2
            • Instruction ID: 94c656a112711b9f92b20cc6127c6b9282d1092eb86de163954d4faba0118a15
            • Opcode Fuzzy Hash: f8b2bde9cf209f261d56d6a1b00d68b5bb4cd4d590ef32a8494881bf267ae9a2
            • Instruction Fuzzy Hash: 9A412472212B8489EB61DF66E9547D833A8F748BC8F984125EF4D0BB69DF78C551C304
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocCloseHandleVirtual
            • String ID: .$l$n
            • API String ID: 1420394295-2376909228
            • Opcode ID: ce9479c637d506cdde78aefb60dd895aff2b1a61f0d53a8078a23adf0ea733dc
            • Instruction ID: cecaae5f03fb596294a166a6b727b5315bd6c99abd8d4f327956ccdac3478328
            • Opcode Fuzzy Hash: ce9479c637d506cdde78aefb60dd895aff2b1a61f0d53a8078a23adf0ea733dc
            • Instruction Fuzzy Hash: 81519C76324A8086E721DF26E4447DAB761F78DB84F10902AFB4A87BA5DF3DC505CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt$ErrorLast
            • String ID:
            • API String ID: 1564866530-0
            • Opcode ID: 3616964d9e68d5e10b4d5a33af7c41ce66c25ecf9a3d6ccf82dd9a2d54687743
            • Instruction ID: 01b942bd8955c16eab64201daa872cd5b79745331722b5ca34fc8acc7215cf75
            • Opcode Fuzzy Hash: 3616964d9e68d5e10b4d5a33af7c41ce66c25ecf9a3d6ccf82dd9a2d54687743
            • Instruction Fuzzy Hash: A61175713045C687EB209F54F4447A9A7B1FB857A4F600735EB980BEE8CB7DC54A8B04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt$ErrorLast
            • String ID:
            • API String ID: 1564866530-0
            • Opcode ID: a4858c02dc920b4e29ad202f91ccd05f850526e49aa390ca8bb9a02fdcc47647
            • Instruction ID: 602cb659ebd87d0b786e6d9020230c23cdfcde8f81faa4eb3e089f71648bbc11
            • Opcode Fuzzy Hash: a4858c02dc920b4e29ad202f91ccd05f850526e49aa390ca8bb9a02fdcc47647
            • Instruction Fuzzy Hash: EC117271318981C3F720CF65F5043AAA761F7897A8FA40225FB9807EE8CB7EC5498B04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressFolderInit_thread_footerPathProcSpecial
            • String ID: /$/$/data
            • API String ID: 4283787320-2895359887
            • Opcode ID: d1e49fa3896eafa6007d938f4fdc5880bf972e46184820727c7f6e229fefdf32
            • Instruction ID: bd71f87d7ec8dace0965468cd48ac27af14011707d751de75685e540277c8984
            • Opcode Fuzzy Hash: d1e49fa3896eafa6007d938f4fdc5880bf972e46184820727c7f6e229fefdf32
            • Instruction Fuzzy Hash: 77B17332609641C6EB60DB25D4A21BD73B0EB8ABA4F584231EA5EC76D5DF38DC45CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: EnumErrorEventEventsLastNetworkReset
            • String ID:
            • API String ID: 1050048411-3916222277
            • Opcode ID: a43ef72c0ef5dea547670d24ae46d00b54fdd337623529927378a7758b4313cd
            • Instruction ID: 2bc7ce8c15e19359d4cafa592661da48b8c462759ab110e9958aae3fa268a1de
            • Opcode Fuzzy Hash: a43ef72c0ef5dea547670d24ae46d00b54fdd337623529927378a7758b4313cd
            • Instruction Fuzzy Hash: E651D472500B8686F364EF25D4143AA77E1FB88BE8F150164DF49873E9CB79C942CB50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: EnumErrorEventEventsLastNetworkReset
            • String ID:
            • API String ID: 1050048411-3916222277
            • Opcode ID: fa868995986a14abb85073b18f218ae2a53ef825df2d0f67fe1e49d6a425e339
            • Instruction ID: 5a56c2ca883d86df65ce7083488b71bfca8bd6176ccbe13178db47678fe34849
            • Opcode Fuzzy Hash: fa868995986a14abb85073b18f218ae2a53ef825df2d0f67fe1e49d6a425e339
            • Instruction Fuzzy Hash: BD513AB2204B448BE762CF26E40479A77F1F78DBD8F190215EB89472A9DB7EC9458B40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CancelEventclosesocketsetsockopt
            • String ID:
            • API String ID: 852421847-0
            • Opcode ID: 2a9ad9b7fa4f886587210fcf5cdafb31a936560bafd6b588060e346cf5de1bbb
            • Instruction ID: 64f05e41b89e0779b68a44c9df8347efe601dfe77c2381a53f0496b914ee1b5b
            • Opcode Fuzzy Hash: 2a9ad9b7fa4f886587210fcf5cdafb31a936560bafd6b588060e346cf5de1bbb
            • Instruction Fuzzy Hash: FAF03232204A8283DB049F25E5447A9A370F789BA4F644335DB6D4BBA4CF38D4AACB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CancelEventclosesocketsetsockopt
            • String ID:
            • API String ID: 852421847-0
            • Opcode ID: 49c26dcf36976051189be324e92bcf16e191800432304aafcf15dff69e109372
            • Instruction ID: 2d1809b97a9702a462fefa8dca50ef9d6389b22542af97769ffcb03c0baeda86
            • Opcode Fuzzy Hash: 49c26dcf36976051189be324e92bcf16e191800432304aafcf15dff69e109372
            • Instruction Fuzzy Hash: 28F0F936204A8097E751CF26E5443A9B370F789BB4F504325EB6D47BA5CF39C5AACB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: FileLibraryLoadModuleName
            • String ID: .dll$PATH
            • API String ID: 1159719554-3816765965
            • Opcode ID: c5343b12e3117846d8bc79dda1a13aca70fa381a8a0851b60b5b434cecc1e18b
            • Instruction ID: b1ff1aa1e3164f9565dff597ef616d956adc1dc417a13899c2d1fcef16090c64
            • Opcode Fuzzy Hash: c5343b12e3117846d8bc79dda1a13aca70fa381a8a0851b60b5b434cecc1e18b
            • Instruction Fuzzy Hash: 29E16D32B05511DAEB20DA79C4622BC73B0EB4AF68F544631DA2DDB6D9DF28EC16C740
            APIs
            • GetVersionExW.KERNEL32 ref: 00007FF665B4A496
              • Part of subcall function 00007FF665B49920: GetProcAddress.KERNEL32 ref: 00007FF665B499E8
              • Part of subcall function 00007FF665B49920: GetFileVersionInfoSizeExW.KERNELBASE ref: 00007FF665B49AC1
              • Part of subcall function 00007FF665B497B0: VerSetConditionMask.KERNEL32 ref: 00007FF665B497E4
              • Part of subcall function 00007FF665B497B0: VerSetConditionMask.KERNEL32 ref: 00007FF665B497F3
              • Part of subcall function 00007FF665B497B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF665B49842
              • Part of subcall function 00007FF665B497B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF665B4986A
              • Part of subcall function 00007FF665B497B0: VerSetConditionMask.KERNEL32 ref: 00007FF665B49889
              • Part of subcall function 00007FF665B497B0: VerSetConditionMask.KERNEL32 ref: 00007FF665B4989A
              • Part of subcall function 00007FF665B497B0: VerSetConditionMask.KERNEL32 ref: 00007FF665B498AB
              • Part of subcall function 00007FF665B497B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF665B498C1
              • Part of subcall function 00007FF665B497B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF665B498EA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Version$ConditionInfoMask$Verify$AddressFileProcSize
            • String ID: Qt: Untested Windows version %d.%d detected!$default
            • API String ID: 3189366613-4050888621
            • Opcode ID: 56fe74357d412eeec9feb3abae344f86caa2346e8b58c8be68436d8c79f3f852
            • Instruction ID: e5bea087012db4c7a5d1c72e0b56a810463d264ce1d32362dbda725688fbb3dc
            • Opcode Fuzzy Hash: 56fe74357d412eeec9feb3abae344f86caa2346e8b58c8be68436d8c79f3f852
            • Instruction Fuzzy Hash: 69413271E0C282C2FA748615E6A237D72B2EF5FB50F604135D64ECA698EE2DEC459F01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocFreesend
            • String ID:
            • API String ID: 2354595252-0
            • Opcode ID: d32468d94f511778c6efb9e4a37247997571d09d1ecdf759417b344c15647baf
            • Instruction ID: c386b83460c13cd3b43a28069926cd7ebcb420af6f38d37e418ea9263e80ce11
            • Opcode Fuzzy Hash: d32468d94f511778c6efb9e4a37247997571d09d1ecdf759417b344c15647baf
            • Instruction Fuzzy Hash: BE513C72210B4087E766DF2BF45079AB7A5F788BC4F148129EB8A97B64DF78D445CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateErrorEventLastsocket
            • String ID:
            • API String ID: 2854923884-0
            • Opcode ID: 1f2bb71204ac77dbbf842b20c3a86081802b1dd4a822a36c56d4e184d26bc510
            • Instruction ID: a93af316eb7f70187091c80541da5927bc72a654fe905cf837b1ee95f8529c39
            • Opcode Fuzzy Hash: 1f2bb71204ac77dbbf842b20c3a86081802b1dd4a822a36c56d4e184d26bc510
            • Instruction Fuzzy Hash: D0319231204BD286FA64BB62A4503F963D5F784BF0F1442B6AB9607AF9DF38C452C750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateErrorEventLastsocket
            • String ID:
            • API String ID: 2854923884-0
            • Opcode ID: e0cbaf7c63bf1ec2e30ce2e462ca0de58b14044d59c9cdb963edb7254d9caeaa
            • Instruction ID: 6f895d5ae6b0c7e0c03d244604886a8c65f5e7e6555a5c7cfe512488f2747cee
            • Opcode Fuzzy Hash: e0cbaf7c63bf1ec2e30ce2e462ca0de58b14044d59c9cdb963edb7254d9caeaa
            • Instruction Fuzzy Hash: 883183B5604B5086E666DB23B8043EA62E1F7CEBE4F040215BB9A47AF6DFBCC551C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressErrorLastStringhtons
            • String ID:
            • API String ID: 1418563660-0
            • Opcode ID: d9d705e35dec7f7c8533af68aa056b56a6f5a7199e4bd55976b9687a2b746dc9
            • Instruction ID: 99cd9b9ee042d794480b09effe4b01b24bc1fb89a5a17a59764ba35a8894383b
            • Opcode Fuzzy Hash: d9d705e35dec7f7c8533af68aa056b56a6f5a7199e4bd55976b9687a2b746dc9
            • Instruction Fuzzy Hash: DB01F2363046E282E715BB25F480BB963E0FB54BE4F544271BF8947BA4EA3CC8829704
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressErrorLastStringhtons
            • String ID:
            • API String ID: 1418563660-0
            • Opcode ID: a3fb8ebb527ba10d12834dcc094aead56c5fcf668bc44d138c8b989b3c6a5e40
            • Instruction ID: b0cac0e71a32bd63811cbb38c6314f16192b3d890269d803ef2ef19208760f43
            • Opcode Fuzzy Hash: a3fb8ebb527ba10d12834dcc094aead56c5fcf668bc44d138c8b989b3c6a5e40
            • Instruction Fuzzy Hash: 4D01A2B62186A082E7158B26F4153B9A3A1FB48BC8F844025FFDD477A4DA39C9919700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateThread$ObjectSingleWait
            • String ID:
            • API String ID: 1771687473-0
            • Opcode ID: 81b2f335489e0c723144b70b464700628b019d4b610a67576bf3cf9a64e068e0
            • Instruction ID: a0745af60a820d9a1258fe17796c9cb0bb776b425812922b616ebc7b8f4cdf7f
            • Opcode Fuzzy Hash: 81b2f335489e0c723144b70b464700628b019d4b610a67576bf3cf9a64e068e0
            • Instruction Fuzzy Hash: EE013171A04AC682E738AF61B8417E637E1F3883A8F544379D79986A74CF3CC1568604
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Heap$CreateInformationVersion
            • String ID:
            • API String ID: 3563531100-0
            • Opcode ID: dab1620e64bba2d977448fbcf9058565a5723aec7899ea49ad2290dc2e13d490
            • Instruction ID: 11b2e8d63657c493eb38dd465c5d544629449580d8c01811b72ebb2c961a9503
            • Opcode Fuzzy Hash: dab1620e64bba2d977448fbcf9058565a5723aec7899ea49ad2290dc2e13d490
            • Instruction Fuzzy Hash: 33E01A79612A8082FB8AAB56E8497EA2261FB8C785F805019FB4E077A5DF3DC4468704
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940080645.000001FE8FA90000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FA90000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fa90000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocLibraryLoadVirtual
            • String ID:
            • API String ID: 3550616410-0
            • Opcode ID: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
            • Instruction ID: 2bfe3f3fb83df2c0cd2d534183b0dd59125da905726bc7e53e6a9ed2936d898d
            • Opcode Fuzzy Hash: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
            • Instruction Fuzzy Hash: D8C1D630314E4B8BDB68AE68C8C47B5B3E0FB543A1F15817DD99AC7291DA74E892C7C1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: FullNamePath$ExceptionThrow
            • String ID:
            • API String ID: 606229857-0
            • Opcode ID: cef41dd83b95d9f355ff0fae64ef258b4847377f3d45da9317d33ccdc43f3009
            • Instruction ID: bff2fc85b9690ef908c3db03db7cb8354a0f27189130f6399897e4a1ad53ed2a
            • Opcode Fuzzy Hash: cef41dd83b95d9f355ff0fae64ef258b4847377f3d45da9317d33ccdc43f3009
            • Instruction Fuzzy Hash: D451B332608A81C6DB20DF55E4912AEB3B0FB89F94F444135EA8D8B798DFBCD945CB40
            APIs
            • VirtualFree.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,00000000,?,00007FF665B44AA0), ref: 00007FF665B441F7
            • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,00000000,?,00007FF665B44AA0), ref: 00007FF665B4425E
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$FreeProtect
            • String ID:
            • API String ID: 2581862158-0
            • Opcode ID: 8f8e47707ebd93ed1f71c6a183001e7ecbe9b94e491bc39c99885a78eb5476a0
            • Instruction ID: 45340099e2154cce9334292ac0b17a40097591dd5c21c3bc75ac04a5bf35665a
            • Opcode Fuzzy Hash: 8f8e47707ebd93ed1f71c6a183001e7ecbe9b94e491bc39c99885a78eb5476a0
            • Instruction Fuzzy Hash: D821B0B6B14A45C2EE20CF06D462A682771FBA9F84F945032CA4E8B754DF3CD992C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: send
            • String ID:
            • API String ID: 2809346765-0
            • Opcode ID: 4d82d8ce8297748054077ff5a83405a44117ba6789b74d22cb788790d759d827
            • Instruction ID: a9a0367f8085be0a3a8f34c5c9eb81f2418d8be8a90d8d859ca2e5cd89ffc5f9
            • Opcode Fuzzy Hash: 4d82d8ce8297748054077ff5a83405a44117ba6789b74d22cb788790d759d827
            • Instruction Fuzzy Hash: B921E1B2704A9041E3618F27B8407EAB694F7CDBD4F045121FF5983BA2FBB8C4828300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocVirtualmallocrecvselect
            • String ID:
            • API String ID: 1241053632-0
            • Opcode ID: 505b6903d59803aef40d8381a865ccc397fe224001b798411c91ea7f351c35a7
            • Instruction ID: e79e53effcdf3112c95f2337ea6b6acd2f53d3d590a13a7037282b1afe0fdc01
            • Opcode Fuzzy Hash: 505b6903d59803aef40d8381a865ccc397fe224001b798411c91ea7f351c35a7
            • Instruction Fuzzy Hash: 1D219CB2714A8081EB71DF26F5543EA63A0E789FC8F408125EB5D87BA9EF38C1458B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Gdip$CreateDisposeFreeHeapImagefree
            • String ID:
            • API String ID: 1469048323-0
            • Opcode ID: 1e852e01241bb4f9f199057eb3e4331d9c0c2a302e0f1085875ebc1fe2c2c545
            • Instruction ID: 6c95ca2979a7d77f45896ddeb8280675a22751790812eefb024ca809a9b66f68
            • Opcode Fuzzy Hash: 1e852e01241bb4f9f199057eb3e4331d9c0c2a302e0f1085875ebc1fe2c2c545
            • Instruction Fuzzy Hash: D6118CB3114B80CAE754DF25E48065D77F8F788B98F685529DF8917B28CB34C8A1CB44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateHeapfree
            • String ID:
            • API String ID: 2345683253-0
            • Opcode ID: 28c10530bac5da55857837622ebc9bb0a9222c4d30909a16d0c3f2103b32b967
            • Instruction ID: e9c3ad32272f9072ca89ff6d639c6e7b0cee97d95a3e8c3e1d0d463da563d760
            • Opcode Fuzzy Hash: 28c10530bac5da55857837622ebc9bb0a9222c4d30909a16d0c3f2103b32b967
            • Instruction Fuzzy Hash: C8116AB3114B808AD751CF26E48075D77B8F788B88F685029EF9917B29CB34C8A1CB48
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorIoctlLast
            • String ID:
            • API String ID: 4052769934-0
            • Opcode ID: ce17200a24629c4b9b126d947a8803227bd7e5b596f43e01a5a8fcac86845cd1
            • Instruction ID: 19d5fff39cf38192e27c3e3f744f9c5f878935686b34c264234245eb5a5386ff
            • Opcode Fuzzy Hash: ce17200a24629c4b9b126d947a8803227bd7e5b596f43e01a5a8fcac86845cd1
            • Instruction Fuzzy Hash: 37F08272604B80C3D7109F20B48059AB7B5F784330FA40339EB9D42AA8CB3CC99ADE50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorIoctlLast
            • String ID:
            • API String ID: 4052769934-0
            • Opcode ID: 312aed48b350a6209cc86974967232855cb715dd87e6e1548b6b0fe6eba230ae
            • Instruction ID: f01f3c849799de985b5d5e858bfb08d7df10fa5871a8be8eb346f901d8f668c6
            • Opcode Fuzzy Hash: 312aed48b350a6209cc86974967232855cb715dd87e6e1548b6b0fe6eba230ae
            • Instruction Fuzzy Hash: F7F08272504740C3D7118F20B48029AB7A5F7C8760F940339FBAD46AA4CB3CC699DE00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 0b4d83cdc7f3374882a2405b78c883344f199d32df5bac03a6686caa87e666e1
            • Instruction ID: 70cb798ce691b1d1b3747c3c80cce9e382c7a2f5387daa1aeb325cd09070d138
            • Opcode Fuzzy Hash: 0b4d83cdc7f3374882a2405b78c883344f199d32df5bac03a6686caa87e666e1
            • Instruction Fuzzy Hash: B241E4B2700A8486D71ACF2AE9407D9A7A1F788BC8F048529FF4A47B69DE34C891C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 35ec61db66e325779c8396a2d5ca1d82070d184fb1970e64289eed608e10a2fb
            • Instruction ID: f16518db71c21787d7e0962e8ac704ec91cd38b893080e9dde5852ea236419e3
            • Opcode Fuzzy Hash: 35ec61db66e325779c8396a2d5ca1d82070d184fb1970e64289eed608e10a2fb
            • Instruction Fuzzy Hash: E2217F72714A4086D746CB2AF54039963A1F78CBC4F548525FB5997B58DF34D8E28B40
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF665C28CFD,?,?,?,?,00007FF665B784A7), ref: 00007FF665C327AF
            • SetLastError.KERNEL32(?,?,?,00007FF665C28CFD,?,?,?,?,00007FF665B784A7), ref: 00007FF665C3284D
              • Part of subcall function 00007FF665C3152C: try_get_function.LIBVCRUNTIME ref: 00007FF665C3154E
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$try_get_function
            • String ID:
            • API String ID: 762735579-0
            • Opcode ID: 4ce17350b16d627d44a51ebfd242cee0539828d90e1a6124d64c26c9feeafd87
            • Instruction ID: 5f6aee2290f5cb4df6ddea6a4602359a6f3c6fcdfb3dce3eff670ea2d2cccfc0
            • Opcode Fuzzy Hash: 4ce17350b16d627d44a51ebfd242cee0539828d90e1a6124d64c26c9feeafd87
            • Instruction Fuzzy Hash: 30216D23E0C64AC6FE54A736E9A307921B25F45FB0F04473CD97E8E6D6DE2CAC418240
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: DecodePointer
            • String ID:
            • API String ID: 3527080286-0
            • Opcode ID: 9da76b86c43469502cb9962a14670a8e5049ec898b9d5911d73b5e2543db7b42
            • Instruction ID: e03762022864b4d305895945a872637202d1629847e8d2168bd14b89519e8678
            • Opcode Fuzzy Hash: 9da76b86c43469502cb9962a14670a8e5049ec898b9d5911d73b5e2543db7b42
            • Instruction Fuzzy Hash: 13018F36B14BC082E720AB62B44175AB7A4F799BD0F588525EF8C07F29CF3CD1128B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressCurrentProcThread
            • String ID:
            • API String ID: 3962317920-0
            • Opcode ID: acc812e3850b7be8dd11515c35d5aee543ce9ef8fc169abd74eb55cbd8338b55
            • Instruction ID: 4cfcb1589d8f82aa532ec76f1504c0bcf637fabc9be6a514054dfc036de026fb
            • Opcode Fuzzy Hash: acc812e3850b7be8dd11515c35d5aee543ce9ef8fc169abd74eb55cbd8338b55
            • Instruction Fuzzy Hash: 27119332505F81C9D7908F24F94539973F8F709B58F584239DAAC8B7A9EF389465C710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CurrentThreadstd::bad_exception::bad_exception
            • String ID:
            • API String ID: 299378639-0
            • Opcode ID: 058f0110385e271502d91cabf9693d420978a267fc73d507fc430bd55fc21fba
            • Instruction ID: 859ee91894a18d8db9a97bad27d72a1a1eca800698f55011f0f8342354e2cc11
            • Opcode Fuzzy Hash: 058f0110385e271502d91cabf9693d420978a267fc73d507fc430bd55fc21fba
            • Instruction Fuzzy Hash: 78F03721A09B4281DA509B15F815169A2B4AF8AFE0F544339EFBD8B7E5DE3CE4508700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Startup
            • String ID:
            • API String ID: 724789610-0
            • Opcode ID: 90d8150e3757ef238170da936ae11fff972097fbe498c69ec85e5f8ebc6fd6bb
            • Instruction ID: 2911937ff579bdcfe6b4ac6631c023d3c56698f6ad4b92838af04f44b9dc91a7
            • Opcode Fuzzy Hash: 90d8150e3757ef238170da936ae11fff972097fbe498c69ec85e5f8ebc6fd6bb
            • Instruction Fuzzy Hash: 84F05276220A84DAEB12EF25E8193D873A4F74C784F808016FB8D8B768DF38C2118B00
            APIs
              • Part of subcall function 000000014000E71C: GetLastError.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E726
              • Part of subcall function 000000014000E71C: FlsGetValue.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E734
              • Part of subcall function 000000014000E71C: FlsSetValue.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E760
              • Part of subcall function 000000014000E71C: GetCurrentThreadId.KERNEL32 ref: 000000014000E774
              • Part of subcall function 000000014000E71C: SetLastError.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E78C
            • ExitThread.KERNEL32 ref: 000000014000C424
              • Part of subcall function 000000014000E8F8: FlsGetValue.KERNEL32(?,?,?,000000014000C422,?,?,?,?,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000E911
              • Part of subcall function 000000014000E8F8: FlsSetValue.KERNEL32(?,?,?,000000014000C422,?,?,?,?,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000E922
              • Part of subcall function 000000014000E8F8: _freefls.LIBCMT ref: 000000014000E92B
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Value$ErrorLastThread$CurrentExit_freefls
            • String ID:
            • API String ID: 1216290073-0
            • Opcode ID: 50720535ccd6fb1326abae26ff6c97f43710cf1c4642367276e24177af361050
            • Instruction ID: b3ac20aaedd1452b9766895f4c06c775f723c0e6f08f999d19768f29f34785b6
            • Opcode Fuzzy Hash: 50720535ccd6fb1326abae26ff6c97f43710cf1c4642367276e24177af361050
            • Instruction Fuzzy Hash: 73C002B471238441FE2EB7B6345A7A811506B5D780E441438BA5A1B3A3DD7984094300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt
            • String ID:
            • API String ID: 3981526788-0
            • Opcode ID: 4c71799af792aa104f0d233dd33903cd3c71c1c3b67126271428965dbd002654
            • Instruction ID: 8d48b97c306739909ce633bb44dea509040781915155f3a24660b39a62461b37
            • Opcode Fuzzy Hash: 4c71799af792aa104f0d233dd33903cd3c71c1c3b67126271428965dbd002654
            • Instruction Fuzzy Hash: A1C012B16141C187D720AF14D4056556B70FB85344FA00625E78806AA4C77DC21ACF04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt
            • String ID:
            • API String ID: 3981526788-0
            • Opcode ID: 5430b48c897f6ed4bf1239ba44f7872b55cb598c5994d6d473fb0253ef00896f
            • Instruction ID: 405e9175dfeb334f3541202b252c5c92f45ab0b174248597fee9a5a42d972c4c
            • Opcode Fuzzy Hash: 5430b48c897f6ed4bf1239ba44f7872b55cb598c5994d6d473fb0253ef00896f
            • Instruction Fuzzy Hash: FBC012716141C187D720AF14D4046556B70FB85344FA00625EB8806AA4C77DC25ACF04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt
            • String ID:
            • API String ID: 3981526788-0
            • Opcode ID: e95747ce8f3f3750f5459e05a253b64576bad900133d075150429dbf0668e463
            • Instruction ID: cf5048b8f6b0cb3c2e2677f4137b1ab2fc995b420aa23efcee12e8e639857660
            • Opcode Fuzzy Hash: e95747ce8f3f3750f5459e05a253b64576bad900133d075150429dbf0668e463
            • Instruction Fuzzy Hash: 5AC012716141C187E720DF14D4053966B20F789344F900525F78806AA4C77DC25ACF04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: setsockopt
            • String ID:
            • API String ID: 3981526788-0
            • Opcode ID: aad93ee022f5210646a99c84337d3774725d5d85ae8e5a47ae194036c45a8d95
            • Instruction ID: f9c991f187c9692375a014dc1883362d59b838f17bd84156b4685b9339654db1
            • Opcode Fuzzy Hash: aad93ee022f5210646a99c84337d3774725d5d85ae8e5a47ae194036c45a8d95
            • Instruction Fuzzy Hash: D0C012716141C187E720DF14D4043966B20F789348F900525FB8806AA4C77EC25ACF04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _amsg_exit_getptd
            • String ID:
            • API String ID: 4217099735-0
            • Opcode ID: 213a6e2b15a75dbbc5b6985e12d8423eb37278cc3a763c8166efefaf3e9b0e9f
            • Instruction ID: e1d54d7ada819d3920cb34be146c4277efd13b2d0bb692ff175e69950cf6b4bc
            • Opcode Fuzzy Hash: 213a6e2b15a75dbbc5b6985e12d8423eb37278cc3a763c8166efefaf3e9b0e9f
            • Instruction Fuzzy Hash: 97C09225A11AC581DA04777184667FC2AE1ABC5BA1F0584B0DB2E433A3DE2484464320
            APIs
            • HeapAlloc.KERNEL32(?,?,00000000,00007FF665C327FD,?,?,?,00007FF665C28CFD,?,?,?,?,00007FF665B784A7), ref: 00007FF665C310A9
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: 7865fc895f06e5d261083154053c5d09f8bae565a87a491178ac8ce2072efa4a
            • Instruction ID: 4243fbcb7d2471ead942f50545499b3b8e173031c726b1577ef17014c33fb626
            • Opcode Fuzzy Hash: 7865fc895f06e5d261083154053c5d09f8bae565a87a491178ac8ce2072efa4a
            • Instruction Fuzzy Hash: 2BF06D56B0968BC9FE54A669D9533B842B05F88F80F0C5178C90ECE3D1EE2CED81C221
            APIs
            • HeapAlloc.KERNEL32(?,?,?,00007FF665C339B5,?,?,00000000,00007FF665C3803F,?,?,?,00007FF665C30B83,?,?,?,00007FF665C30A79), ref: 00007FF665C31C3E
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: 460da5771890f454806aba5e565a12d6929184467c6de6092689245f29d5b967
            • Instruction ID: 21327a92336880723dfc6fb5a559cc3e604b70ae66038176e9d001b781aa04b0
            • Opcode Fuzzy Hash: 460da5771890f454806aba5e565a12d6929184467c6de6092689245f29d5b967
            • Instruction Fuzzy Hash: D0F08213B0D64AC9FE59566AE84337412B05F94FA0F080638DC2FCE2E1DE2CAC814124
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$AddressLibraryLoadProc$AllocCreateCurrentDirectoryFileMemoryModuleNameOpenSystemVirtualWrite
            • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
            • API String ID: 675209239-4110464286
            • Opcode ID: cb6061bd00fcf5d5817a298436270a70da75f0555b869f46bbdfee4cd9ce1f11
            • Instruction ID: 726405caa4de6d2aa80646377a94f56ed9a4641eea4e893f775fca2e1c7dc400
            • Opcode Fuzzy Hash: cb6061bd00fcf5d5817a298436270a70da75f0555b869f46bbdfee4cd9ce1f11
            • Instruction Fuzzy Hash: EDA15031710B8285EB21EF22E8147E963E5FB49BE8F804265DB494BB68DF3DC246C704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: File$ClipboardCloseGloballstrlen$CountCreateHandleMutexObjectPointerReleaseSingleTickWaitWritewsprintf$DataLockOpenSizeSleepUnlock
            • String ID: [$[esc]$f
            • API String ID: 4024049034-3848119899
            • Opcode ID: 97fd7cb3ef38961945420586d2202e0037aa361a794408fddb7f4b1b4befad8b
            • Instruction ID: 27f0029682fe937c6432bff7d76c217814d21acda88ec42d3b74c0796b3c8252
            • Opcode Fuzzy Hash: 97fd7cb3ef38961945420586d2202e0037aa361a794408fddb7f4b1b4befad8b
            • Instruction Fuzzy Hash: A5913B71210AC696EA20FF25E854BFA77E0F784BE4F944275DB4A86674DF38C54ACB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch$BitmapBitsDesktopModeSelectWindowmalloc
            • String ID: $gfff$gfff
            • API String ID: 1524144516-4202476792
            • Opcode ID: d936499b14b76e66d130f8d05095c3ee707fe66b3643cec9522bfb7bd31049c9
            • Instruction ID: a1f49a1af14ad262180fdb8492e398854b21ffa398e0cdd58ffcf9427bcd6d89
            • Opcode Fuzzy Hash: d936499b14b76e66d130f8d05095c3ee707fe66b3643cec9522bfb7bd31049c9
            • Instruction Fuzzy Hash: 5ED1BD36714B818AE705EB76E4547AD63E1FB89BD8F104279DF0A6B7A8DF38C4468700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno_invalid_parameter_noinfo
            • String ID: U
            • API String ID: 3902385426-4171548499
            • Opcode ID: 30f2d96b9074e97b7c7e9f06a6e76ee1250dada0a486160a752ccb230227623d
            • Instruction ID: 451ba738ecfc4b6ee17813012619acf07ef1b3b1563fceefe9fffb3edea1854b
            • Opcode Fuzzy Hash: 30f2d96b9074e97b7c7e9f06a6e76ee1250dada0a486160a752ccb230227623d
            • Instruction Fuzzy Hash: 9912E132214EC386EB20AF25E4A43FE67E1F3847E4F554165EB4A47AB4EB39C446CB10
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandle$Sleep$_errno$EnumObjectSingleWaitWindows_invalid_parameter_noinfo$CreateEventExceptionFilterLocalTimeUnhandledmallocwsprintf
            • String ID: %4d.%2d.%2d-%2d:%2d:%2d$206.238.220.204$206.238.220.204$6666$8888
            • API String ID: 1954332545-3840522574
            • Opcode ID: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
            • Instruction ID: 648d6ee6eec857974b65e14051a8240e3050cee98fc38dd964bffde7d9a09b42
            • Opcode Fuzzy Hash: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
            • Instruction Fuzzy Hash: 31E13675204AC686EB21BF21E8503FA37E0F785BE5F504275EB4A466B5CF78C54ACB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: iswctype$_errno_invalid_parameter_noinfo_whiteout
            • String ID: %$*$F$I$L$N$h$w
            • API String ID: 3700623789-4081125726
            • Opcode ID: 5a47cfcad9870c6166d9b56845e0fa845daf07801b6f0568e4e7a86a5554995e
            • Instruction ID: de49631c28e3436e3a2d328af9b9c82aacad6a2f80808c2b654935129433fe51
            • Opcode Fuzzy Hash: 5a47cfcad9870c6166d9b56845e0fa845daf07801b6f0568e4e7a86a5554995e
            • Instruction Fuzzy Hash: 02C2D372614AC286FB60AF2590A03FE7BE0F7507E4F550175EB8657BA9DB38C846CB10
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
            • String ID: $@
            • API String ID: 1084558760-1077428164
            • Opcode ID: ee6108753ae09ad0e7615fab02f18fe333000af5f4b43b756ad295984d004589
            • Instruction ID: a037e0bca2090a49e608da9cf892f971785984791d5dea9db18db7eb4fc2503c
            • Opcode Fuzzy Hash: ee6108753ae09ad0e7615fab02f18fe333000af5f4b43b756ad295984d004589
            • Instruction Fuzzy Hash: 5B5203726087A486FB668B56D4443EE6BA0B78D7C8F644006FBC55F6F5CBBAC841CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_getptdfree
            • String ID: $@
            • API String ID: 3872287888-1077428164
            • Opcode ID: 4ad68d052edb4066e7183ac2d39c2eb6e9cce887ff5bc7de5fef0a40779fa4e1
            • Instruction ID: e48e7314efc5960fd5bef39a2f7b4c95df11012b250d2878e5c55797fb80356d
            • Opcode Fuzzy Hash: 4ad68d052edb4066e7183ac2d39c2eb6e9cce887ff5bc7de5fef0a40779fa4e1
            • Instruction Fuzzy Hash: 02521072208FC286FB64AB9894643FE6BE1B7897F4F6410A9DB45676F5D738C842C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_getptdfree
            • String ID: $@
            • API String ID: 3872287888-1077428164
            • Opcode ID: de789989f5679af20ad6b3dcbe4606d5ff2aeb23094d55da5cea7cfbe456f95e
            • Instruction ID: 1aa2b1f9e566e1a2ad52b604ba8658db2fac6751ad5a090063e60e7dd146668f
            • Opcode Fuzzy Hash: de789989f5679af20ad6b3dcbe4606d5ff2aeb23094d55da5cea7cfbe456f95e
            • Instruction Fuzzy Hash: F352EE72618EC28AFB65AB1494603FE6BE0F7417E8FB814A5DB56476F4CB79C842C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
            • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
            • API String ID: 2977986460-1099148085
            • Opcode ID: d4b34376749ff32eba99456bda1799e250470724f7914fc7af70a848fadcdb06
            • Instruction ID: e10a062fadbc2c3e748dc53a776e894d82bde9b27b6309dfc7fa3b1bc76754e9
            • Opcode Fuzzy Hash: d4b34376749ff32eba99456bda1799e250470724f7914fc7af70a848fadcdb06
            • Instruction Fuzzy Hash: 0A416136315AC286EA21AB11B9147BA67E0FB89BF5F5403609F8A07B74DF3DC5468B04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CurrentErrorLastThread$TimerWaitablefree$CloseCreateEventsHandleMultipleWaitmallocrecv
            • String ID: ---------------> Client Worker Thread 0x%08X started <---------------$---------------> Client Worker Thread 0x%08X stoped <---------------$bad allocation
            • API String ID: 1496484581-800104984
            • Opcode ID: a483d8a4f07ee7daca44cb9bd2cf3cbe87aec68c923bb870d730149bae29c94a
            • Instruction ID: 3899cc218a9f275a38ce4c504b84abc2162644ddd6012ad8b844b9ec429301da
            • Opcode Fuzzy Hash: a483d8a4f07ee7daca44cb9bd2cf3cbe87aec68c923bb870d730149bae29c94a
            • Instruction Fuzzy Hash: 5FC15B32601F8286EB64AF25E9603BE63E4F748BE4F544275DB9A877A4DF38C456C310
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 808467561-2761157908
            • Opcode ID: 32cef84cd1dc972d3f30f67bf0faffc5798012c0ccfd2e5b877c42ffa3d6f4fc
            • Instruction ID: 6d1076c65b2ae30a5fc8e10983aeaf41ab0be3b685c7492aac44063a55a61ad7
            • Opcode Fuzzy Hash: 32cef84cd1dc972d3f30f67bf0faffc5798012c0ccfd2e5b877c42ffa3d6f4fc
            • Instruction Fuzzy Hash: 9CB2A373A18296CAE7658F64D442BF977B1FB54B88F505139DA0EDBA84DF38AD00CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
            • String ID: $"%1$%s\shell\open\command$WinSta0\Default$h
            • API String ID: 1783372451-2159495357
            • Opcode ID: dfd323aeb03c13e2d7b38d1d30753097b8c80399a4e347c45ec02a5e266f6bc6
            • Instruction ID: db1171a98fec2c2fbc2fda8d690aabdcb1d22cfff0f3c3716c39e427dd6014c6
            • Opcode Fuzzy Hash: dfd323aeb03c13e2d7b38d1d30753097b8c80399a4e347c45ec02a5e266f6bc6
            • Instruction Fuzzy Hash: 95617232320AC695EB21FB61D8507F963E5FB887D8F440265DB4D5AAB9DF78C206C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeTickWaitlstrcat
            • String ID: <$\sys_vdio.key
            • API String ID: 3264482950-1798576524
            • Opcode ID: 1c1d0dc86c9ff9c9df10a55f1d15d96183aa64237dc76bcdb1e2e0bd592c1929
            • Instruction ID: dabe7d034f22c7fd8263536fcc49135b9a6c198271903df2c5935192ef8ddab5
            • Opcode Fuzzy Hash: 1c1d0dc86c9ff9c9df10a55f1d15d96183aa64237dc76bcdb1e2e0bd592c1929
            • Instruction Fuzzy Hash: EC511031300A8696EB20EF26E854BAA37A0F784BD8F508665DB4987774DF39C54AC700
            APIs
            Strings
            • CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}, xrefs: 000001FE8FAD3C3A
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: lstrcat$CloseCreateProcess32$FirstHandleInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
            • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}
            • API String ID: 2719888535-4035668053
            • Opcode ID: d33f07defdf78316018c5fc0878d74b5aedf32f29980ee74f23bdecb8d2c4bf9
            • Instruction ID: 9b766272b38d3c29fef1b14fbe7f0a980f5a6b463d2ebf42aa0216ddc9c1efa5
            • Opcode Fuzzy Hash: d33f07defdf78316018c5fc0878d74b5aedf32f29980ee74f23bdecb8d2c4bf9
            • Instruction Fuzzy Hash: 44915C76700B9186EB10EF65E8506ED3BB1F784BA8F504266DF895BB68DF38C506CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: DecodePointerwrite_multi_char$_errno_invalid_parameter_noinfo$_getptdfreewrite_char
            • String ID:
            • API String ID: 3562693915-0
            • Opcode ID: 43b494f0418648be60998cf239ea68d13273c4f8f163afde2bbbfde4244db2c5
            • Instruction ID: 0a8d0194a4afb4689444e99c16f835c381b1321765cf70508f278942cf86e70f
            • Opcode Fuzzy Hash: 43b494f0418648be60998cf239ea68d13273c4f8f163afde2bbbfde4244db2c5
            • Instruction Fuzzy Hash: 6D62C472604AC286FB64AB1594903FE6BF1F7817E4F2482B5DB465B6F4DB79C842CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcpy
            • String ID: %08X
            • API String ID: 2032971926-3773563069
            • Opcode ID: e5e4124dce340e64fc084ef5771f100bb91bccaaee7df38b6378f83399f0ca44
            • Instruction ID: 17ef9ae2c511079b50018cab1cb0fae5f91225b77501d61112ecaafd34fbe8bf
            • Opcode Fuzzy Hash: e5e4124dce340e64fc084ef5771f100bb91bccaaee7df38b6378f83399f0ca44
            • Instruction Fuzzy Hash: 39514E71318AC196E760EB11E4847EAA3E0F7C87E4F904275EB8946AB8DF38C546CB44
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountLookup
            • String ID: NONE_MAPPED$Network
            • API String ID: 1972796461-3150097737
            • Opcode ID: dc04e29aa2e29e93e0f6f97a95982f0179af726db92d6d1e0a5c71dd7b62d461
            • Instruction ID: 857414680e065d293d70e8fb3968d312326d659195b0965462510828fa12f769
            • Opcode Fuzzy Hash: dc04e29aa2e29e93e0f6f97a95982f0179af726db92d6d1e0a5c71dd7b62d461
            • Instruction Fuzzy Hash: EE414C32204AC286EA61BB15E8547EAA3E0F789BE5F544275EF494BB74DF3CC51AC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
            • String ID: %s%s$@$Windows\System32\svchost.exe$h
            • API String ID: 4033188109-2160973000
            • Opcode ID: 4603eddee24f2c2698b3de494bfe0deafb39d4e7db297f61fd0084748d6fe062
            • Instruction ID: 5a8aac706ce479c370bd0d092bd96a4a09965f40fb57a56939eccf08e28f81c8
            • Opcode Fuzzy Hash: 4603eddee24f2c2698b3de494bfe0deafb39d4e7db297f61fd0084748d6fe062
            • Instruction Fuzzy Hash: 8641A432214BC289EB20EF61E8007EAB7E5F7847D8F444165DB895BA68DF79C216CB04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
            • String ID: %s%s$@$Windows\System32\tracerpt.exe$h
            • API String ID: 4033188109-528786837
            • Opcode ID: eff8000e3a53d83792f7adea36c654d308863d7fa0e77b685c867a66f522848f
            • Instruction ID: d9c59347ba433200f8598016dfa5e5bf01fa7bfbe9b42c51a5adf8784e46ff0a
            • Opcode Fuzzy Hash: eff8000e3a53d83792f7adea36c654d308863d7fa0e77b685c867a66f522848f
            • Instruction Fuzzy Hash: 5F414B72204AC185E732DF22F85079AB3A5F7CCB89F444015EB8D47AA9EF39C555CB10
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$HandleOpenToken$AddressAdjustCloseCurrentLookupModulePrivilegePrivilegesProcValue
            • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
            • API String ID: 2787840106-1577477132
            • Opcode ID: de3b0c7de4938cd4d9b60420ee93e2d79fa07d28ae88f8e18ff7779c5da0ff56
            • Instruction ID: e164c8234c3397e57b38ccb96170548b66ff291fe3b09308a5cb6350ce4f740b
            • Opcode Fuzzy Hash: de3b0c7de4938cd4d9b60420ee93e2d79fa07d28ae88f8e18ff7779c5da0ff56
            • Instruction Fuzzy Hash: C7215C71310B8286EB10EB21F4147EA77E0FB89BA4F5402659B4E4B764DF79C18A8B40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: File_set_error_mode$HandleModuleNameWrite
            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
            • API String ID: 1085760375-4022980321
            • Opcode ID: a75b4c166f4ff9e0fa6da0bd796e45336551005c980250f4ac4646e2192a69c9
            • Instruction ID: 7044906b8dbc0a8cc0b2b94ea9d60a13714cb2958bdc8192a6e850c73157f449
            • Opcode Fuzzy Hash: a75b4c166f4ff9e0fa6da0bd796e45336551005c980250f4ac4646e2192a69c9
            • Instruction Fuzzy Hash: 1D51CF35310AC242FB64FB25E8617FA63E4F785BE4F4442B5AF6943BA6DB38C5078600
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorFormatFreeLastLocalMessage
            • String ID: No space left on device$No such file or directory$Permission denied$The specified module could not be found.$Too many open files
            • API String ID: 1365068426-3654939424
            • Opcode ID: be521251e698086a4d4e1ef04526cc968ae02a472e1e1e25b1f7a3c59cb21574
            • Instruction ID: 9928ad499c5d7f03717fb16cd827c2f307f1011553efe9c12e30b83773a5c03b
            • Opcode Fuzzy Hash: be521251e698086a4d4e1ef04526cc968ae02a472e1e1e25b1f7a3c59cb21574
            • Instruction Fuzzy Hash: B6513F32A04A11C6E7648F29D8A257C33B1BB8AF94F549135EA1EDBB98DF39DC45C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateEvent$Gdip$CountCriticalDisposeFreeImageInitializeSectionSpin
            • String ID: <$<$`
            • API String ID: 3048658606-2220807966
            • Opcode ID: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
            • Instruction ID: 81fb591f3e981caaa51f6d86859b1fc663d8d199127dcbc4591baa8a3b32ccf9
            • Opcode Fuzzy Hash: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
            • Instruction Fuzzy Hash: 18518B72201B9282E719AF34E8007AD37E9F745FA8F54423D9F594BBA8CF388452CB50
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateEvent$CountCriticalInitializeSectionSpin
            • String ID: <$<$`
            • API String ID: 1354401513-2220807966
            • Opcode ID: e16cce76c1c69b643359e72815a3e599258c26f66a7f0d5d82e61e046c666fe7
            • Instruction ID: 3b636f3733dae5a9be956b2963b6027ab5ad5dbd70e0a2f7adbe16c279c113d3
            • Opcode Fuzzy Hash: e16cce76c1c69b643359e72815a3e599258c26f66a7f0d5d82e61e046c666fe7
            • Instruction Fuzzy Hash: 29518AB2201B9182E719DF35F81079E36A8F74AF98F04422DAF594BBA9CF788455CB44
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
            • String ID: SeShutdownPrivilege
            • API String ID: 3435690185-3733053543
            • Opcode ID: 991f30af3a6744b5f69f974a0569d38b3971da61082ad6ce6e3ec9eac49991d0
            • Instruction ID: 6b27e3adf3b3831f395f18fd9879cecf68cb1600e2298e7c7e7f0ca02f634e67
            • Opcode Fuzzy Hash: 991f30af3a6744b5f69f974a0569d38b3971da61082ad6ce6e3ec9eac49991d0
            • Instruction Fuzzy Hash: E0119372320A8586E750AF24E4557AA77E0F788BE0F540661EB4E8B674DF3CC086C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$Exit$CloseHandleToken$AdjustCommandCreateCurrentErrorFileInfoLastLineLookupModuleNameOpenPrivilegePrivilegesStartupValueWindows
            • String ID:
            • API String ID: 2667809516-3916222277
            • Opcode ID: a274c2ab89dcb3f931120a1ddd554a39c3b12f7e05ca43a7662b359e7219e845
            • Instruction ID: 27e7fec709bc86e21e826ae1b9520898b3d8b5a2b73723a6aed15ab8f6973941
            • Opcode Fuzzy Hash: a274c2ab89dcb3f931120a1ddd554a39c3b12f7e05ca43a7662b359e7219e845
            • Instruction Fuzzy Hash: CD116376600A828AE764AF30F8557ED73A4FB847E4F5403659B4A07AB8CF3DC146C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
            • String ID: gfffffff
            • API String ID: 1282097019-1523873471
            • Opcode ID: 556f12f472df7c314a951936d8e99cd1d3ce7c173c0ae253b973df429c375633
            • Instruction ID: 144f073464c2cf205b3bf5e7f8cf5075c96caaa5800e2c1d8e3a4c9f4cea63b1
            • Opcode Fuzzy Hash: 556f12f472df7c314a951936d8e99cd1d3ce7c173c0ae253b973df429c375633
            • Instruction Fuzzy Hash: D4B16273714BC686EB11EB29D2603FD7BE5A3117E4F0486B1CB69877E6E6388416C300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
            • String ID: gfffffff
            • API String ID: 1282097019-1523873471
            • Opcode ID: ec41a007deb0b9d246c5b2927c9b2503f4cdaddccc49e3f3ffb37e787d51f368
            • Instruction ID: 648b1be543de883bf8739b7f96fd86269f1c3cb6cbbc0ac56d18a902ce507f8f
            • Opcode Fuzzy Hash: ec41a007deb0b9d246c5b2927c9b2503f4cdaddccc49e3f3ffb37e787d51f368
            • Instruction Fuzzy Hash: 0EB154B3B047C486FB16CB2A95453DD7BA5E7197E4F048621EF990B7E6EA3AC414C310
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
            • String ID:
            • API String ID: 3778485334-0
            • Opcode ID: a231cb6aec9b0e57251850d34f2610e13ffa11949d7c845deaba270be49158b0
            • Instruction ID: dcfb31734eecfb82d81d1bd8382e9da08a471523d492007498bea9a88a44a913
            • Opcode Fuzzy Hash: a231cb6aec9b0e57251850d34f2610e13ffa11949d7c845deaba270be49158b0
            • Instruction Fuzzy Hash: 4531F135204BC685EA20AF24F8503AA73E8F7897E4F500576DB8E437B4EF79C0968700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Event$ClearCloseOpen
            • String ID: Application$Security$System
            • API String ID: 1391105993-2169399579
            • Opcode ID: 64425f49ed47b34c4a421d998de9bdb23b72944f8aa1223f8da030d793edcbb5
            • Instruction ID: 9c718b912efaac75b27f64f5cb6cf1bbf0dba4edb5bf563f66d5b2641be17c0a
            • Opcode Fuzzy Hash: 64425f49ed47b34c4a421d998de9bdb23b72944f8aa1223f8da030d793edcbb5
            • Instruction Fuzzy Hash: C101DA36605B8285FA26AB25F4543F967E4FB887E8F5402768B5D47774EE38C1828600
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: MessageMultipleObjectsWait$PeekPost
            • String ID:
            • API String ID: 105686753-0
            • Opcode ID: bde40b9d549f6fae919aee2e8763a9875290cbc4817eaa1538dff8214ff397bc
            • Instruction ID: fe02b089ffe7294fbf662c1a2dc951d4ab1ccf13c7b7b858236301b3edccfc01
            • Opcode Fuzzy Hash: bde40b9d549f6fae919aee2e8763a9875290cbc4817eaa1538dff8214ff397bc
            • Instruction Fuzzy Hash: 2022C532E09A81C6EB50CB24C8623BD6770FB9AB88F545131DA4D9BA95DF38FD85C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
            • String ID:
            • API String ID: 435049134-0
            • Opcode ID: 137aa6c628618abedf1ddfa1769073cfff43dc3b72dfa687c4f3e24b5cce473d
            • Instruction ID: c2b4b0c913983ed802639f1c4ecbfd5fbcf2d75ed2147b5926465ea49122a889
            • Opcode Fuzzy Hash: 137aa6c628618abedf1ddfa1769073cfff43dc3b72dfa687c4f3e24b5cce473d
            • Instruction Fuzzy Hash: BCB1D123A08642C6E710EF26D8525BA7771BB84F94F446139EA4DCBAD5DF7CEC418700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: 87ff3d6eeb635e790895d91028e87dc3f406e0927c6df138aeb043b668ae2b89
            • Instruction ID: f205b57ae8caca4ab87d6bb7653a084eada612bf6c5f861baf2cd4302dc0f601
            • Opcode Fuzzy Hash: 87ff3d6eeb635e790895d91028e87dc3f406e0927c6df138aeb043b668ae2b89
            • Instruction Fuzzy Hash: F1315D33618F81C6EB60CF25E8416AA73B4FB88B54F501139EA8D87B98DF3CD9458B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseControlCreateDeviceFileHandle
            • String ID: \\?\$^Volume\{([a-z]|[0-9]|-)+\}\\
            • API String ID: 33631002-4034573397
            • Opcode ID: a2c130af8c3b6cf50b6a52d76a7e523c0275167e47f78f66250d50651771c600
            • Instruction ID: 0a39c67c8c44419bef25b1aa37e300bc9fb01d880b24c1439868ba6a575f7ee7
            • Opcode Fuzzy Hash: a2c130af8c3b6cf50b6a52d76a7e523c0275167e47f78f66250d50651771c600
            • Instruction Fuzzy Hash: C1D18F32A08A11C6EB20DF25E4A266D73B0EB8AB94F544231DA5DCB6D4DF7CDC42CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
            • String ID: SeDebugPrivilege
            • API String ID: 2349140579-2896544425
            • Opcode ID: 3df3e9674ee82a8dd9461d8c8e16cfb09a5d387e4b33b5c3f15a18fe30b99d19
            • Instruction ID: 0fdc09aa7aa71e8e8b8f1b235ccd94793b74b2d7419a3381aaaf67889640ec68
            • Opcode Fuzzy Hash: 3df3e9674ee82a8dd9461d8c8e16cfb09a5d387e4b33b5c3f15a18fe30b99d19
            • Instruction Fuzzy Hash: 68118236315BC282EB10AF55F4556AAB7E0F788798F840165EB8E47B68DF7DC009CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: DirectoryGlobalMemoryPathStatus
            • String ID: @$C:\Program Files\VMware\VMware Tools\$VMware
            • API String ID: 2404642766-3945705589
            • Opcode ID: 9eef2ea4262c92f19372715fd3c3978f4fca6487c545fe70191300ad05ea55d3
            • Instruction ID: 3ddc528a5c913fa7ee6992a479804db3e3848d8ce63e90fe8c20ae5d6ed70f92
            • Opcode Fuzzy Hash: 9eef2ea4262c92f19372715fd3c3978f4fca6487c545fe70191300ad05ea55d3
            • Instruction Fuzzy Hash: 55113C36614AC281FA60FB11E4213FA63D0F7947D4F8041A59B4E466A5DF2CC10ACB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorFileLastWrite$ConsoleOutput
            • String ID:
            • API String ID: 1443284424-0
            • Opcode ID: 401fe4669268a13e147bc2a0c3f252077b6128bc5c543b1d41c0b6380ef1694e
            • Instruction ID: 8a428a5d137ea67088e0517af247bf869092587195785e8ea62d1a20d7ed69d8
            • Opcode Fuzzy Hash: 401fe4669268a13e147bc2a0c3f252077b6128bc5c543b1d41c0b6380ef1694e
            • Instruction Fuzzy Hash: 19E10273B18A81CAE700CF64D0415AD7BB0FB55B98F14913ADE4E9BB99DE38D816C740
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: QDateTimeParser::parse Internal error (%s)$QDateTimeParser::parse Internal error 2$QDateTimeParser::parse Internal error 3 (%s %s)$QDateTimeParser::parse Internal error 4 (%s)$default
            • API String ID: 0-412086101
            • Opcode ID: 2f91bf01c8acce56a866329e44f367f359a3cfcc74283a7fccceca5c0ea94de4
            • Instruction ID: 890582ec052ccb4d137294520db5e1011ff05bc4912e941611ea2498be738947
            • Opcode Fuzzy Hash: 2f91bf01c8acce56a866329e44f367f359a3cfcc74283a7fccceca5c0ea94de4
            • Instruction Fuzzy Hash: 89D2A532A08642CAEB20CF24D4622ED77B1FB8AB98F504135DA4DDB699DF78ED45C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
            • String ID:
            • API String ID: 1789362936-0
            • Opcode ID: 0e6cdfb65babf1bf3c4be1fd3b5a506397d62204a4a8a4036368e1bef1891cbb
            • Instruction ID: dc4508cb2d76af8f63cb9a5d54891b5af4f089befe9778edfbb4c30398c5907f
            • Opcode Fuzzy Hash: 0e6cdfb65babf1bf3c4be1fd3b5a506397d62204a4a8a4036368e1bef1891cbb
            • Instruction Fuzzy Hash: 5A214F353146C286EB64AB15E4543BA67E0FB88BE4F448375DB9A467B4EF38C546C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AllocateCheckFreeInitializeMembershipToken
            • String ID: Network
            • API String ID: 3429775523-2939797024
            • Opcode ID: 8ad016942c7da11828b6f5aa434babc68504aae5a5167266cc484b2e2891f1f3
            • Instruction ID: 623846215554827cee43c52931aaab068613cdeaee9f8e6822c55899a05064a8
            • Opcode Fuzzy Hash: 8ad016942c7da11828b6f5aa434babc68504aae5a5167266cc484b2e2891f1f3
            • Instruction Fuzzy Hash: AA11FE7261878587E7109F25F49075BBBA0F788794F50122AE78A47B78DB3CD149CF00
            APIs
            • _get_daylight.LIBCMT ref: 00007FF665C2A406
              • Part of subcall function 00007FF665C2938C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF665C293A0
            • _get_daylight.LIBCMT ref: 00007FF665C2A417
              • Part of subcall function 00007FF665C2932C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF665C29340
            • _get_daylight.LIBCMT ref: 00007FF665C2A428
              • Part of subcall function 00007FF665C2935C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF665C29370
              • Part of subcall function 00007FF665C310CC: HeapFree.KERNEL32(?,?,?,00007FF665C37920,?,?,?,00007FF665C37963,?,?,00000001,00007FF665C37E28,?,?,?,00007FF665C37D5B), ref: 00007FF665C310E2
              • Part of subcall function 00007FF665C310CC: GetLastError.KERNEL32(?,?,?,00007FF665C37920,?,?,?,00007FF665C37963,?,?,00000001,00007FF665C37E28,?,?,?,00007FF665C37D5B), ref: 00007FF665C310F4
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF665C2A634), ref: 00007FF665C2A44F
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
            • String ID:
            • API String ID: 3458911817-0
            • Opcode ID: 2b8e42fba298950875784907ae90498541b511e2692174a64a3f91a37cb06da3
            • Instruction ID: 4f4a36c9f4c5f1af7426e15b32e8cb38c2742feeec9717a174fef90660697dc2
            • Opcode Fuzzy Hash: 2b8e42fba298950875784907ae90498541b511e2692174a64a3f91a37cb06da3
            • Instruction Fuzzy Hash: E3615F33A18642CAE710DF25D9925B97770BB88F84F446239EA4DCB6A5DF7CEC418740
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 0-2761157908
            • Opcode ID: 48b426091ca7310074e47ba4353bcb83d81d6977aa3c1439b94c3d96a45d4ada
            • Instruction ID: 0ebf4d39cef2465f3cd29ca2a0f3054db080138c8a72bf1685da33d1e682f981
            • Opcode Fuzzy Hash: 48b426091ca7310074e47ba4353bcb83d81d6977aa3c1439b94c3d96a45d4ada
            • Instruction Fuzzy Hash: 0962C176B242928BF724AFA5C000BFD37F1F754B98F509265DF057BAA8E6348926C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: gfffffff
            • API String ID: 3215553584-1523873471
            • Opcode ID: 7945e267a0154df2b998390322b850647b738dcd4beeb1d66246e91b04171181
            • Instruction ID: c2a04e71038a9fcf04c082cd35c8d5b9245b166d3c7cef3051c71fd0183ebeec
            • Opcode Fuzzy Hash: 7945e267a0154df2b998390322b850647b738dcd4beeb1d66246e91b04171181
            • Instruction Fuzzy Hash: C8912663B083CA86EF158F29D8217A96BB1AB51F84F05903ACE4D8B795DE3CED018340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: QMetaMethod::invoke: Dead lock detected in BlockingQueuedConnection: Receiver is %s(%p)$QMetaMethod::invoke: Unable to handle unregistered datatype '%s'$QMetaMethod::invoke: Unable to invoke methods with return values in queued connections$default
            • API String ID: 0-3719105355
            • Opcode ID: 0a1dd0c491e2e491c67967bac0761aa9f640679ed4053f5351dec3832318cb0d
            • Instruction ID: 0056f83235fd9ab42da047dea7c657cb4daef6ad858df02c3935d9b1e239623b
            • Opcode Fuzzy Hash: 0a1dd0c491e2e491c67967bac0761aa9f640679ed4053f5351dec3832318cb0d
            • Instruction Fuzzy Hash: 08225E32A09B85C9EB54CF25D8912AD77B4FB89B94F144136EE4D8BBA8DF78D840C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: memcpy_s
            • String ID:
            • API String ID: 1502251526-0
            • Opcode ID: 61c8d48a73c74d7b2b5693099c23eccbf95a4682f3061de545b2f75f73c9d44c
            • Instruction ID: 835fe12f2fb46709efb430a4d06a112b6469ffdc729603401acc02290e504ed3
            • Opcode Fuzzy Hash: 61c8d48a73c74d7b2b5693099c23eccbf95a4682f3061de545b2f75f73c9d44c
            • Instruction Fuzzy Hash: A6C19173A1928A87DB24CF19E545A6AB7B1F794B88F448139DB4ACB744DE3DEC01CB40
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF665C33376
              • Part of subcall function 00007FF665C2787C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF665C27859), ref: 00007FF665C27885
              • Part of subcall function 00007FF665C2787C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF665C27859), ref: 00007FF665C278AA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
            • String ID: -
            • API String ID: 4036615347-2547889144
            • Opcode ID: 4818ce36b43b8457feceb959f8c110170a1097cd530babca61bdf488c472f1ae
            • Instruction ID: 209f5fac8f6dc014a224acd7b314a42b0b3f9129ec6a17a7fb6c7b5b13a237e2
            • Opcode Fuzzy Hash: 4818ce36b43b8457feceb959f8c110170a1097cd530babca61bdf488c472f1ae
            • Instruction Fuzzy Hash: 9191D373A0C789C6E6648B15D541769BAB1FB95F94F444239EA9D8BB98DF3CDC00C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2959964966-0
            • Opcode ID: 2c31b7c5487f01d281f7e0ea84f95429dd58f40f530a4d6afe04b2f875753eb5
            • Instruction ID: 307ed28f31bcb7cc4824cffe0d9938211d30ff519c553a14c363a9da002aecb9
            • Opcode Fuzzy Hash: 2c31b7c5487f01d281f7e0ea84f95429dd58f40f530a4d6afe04b2f875753eb5
            • Instruction Fuzzy Hash: BA32B17AB142C68AF764AE65C0507FC37E2F7107E8F9402AACF466B6E5D6398957C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2959964966-0
            • Opcode ID: f8478baa82738ea8875c7523014a93e7ed9e7ab654d5ea21358459ba0bac151e
            • Instruction ID: e3fd4a5d009771f01900b24a36af7dab53df05fcca50917564f29c106c911974
            • Opcode Fuzzy Hash: f8478baa82738ea8875c7523014a93e7ed9e7ab654d5ea21358459ba0bac151e
            • Instruction Fuzzy Hash: E2320376B042408AF7668F66D0407FC37A2B71A7C8F95421AEF466BBE5D63F8946C301
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: e37cea3d6c78cc31d989566bfc0951e48ead2e3c7dd949fca7103c317dc8dc40
            • Instruction ID: 6a44ee6e18d3b3cc5cbdcf7f6578c6ad4fefdc5d873523bff21100165490de0e
            • Opcode Fuzzy Hash: e37cea3d6c78cc31d989566bfc0951e48ead2e3c7dd949fca7103c317dc8dc40
            • Instruction Fuzzy Hash: 7DB10A77604B89CBEB15CF29C88626877B0F784F58B198925DA5D877A4CF3AD861C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 41e6a5274b1e6dac8f16ab5682416ee48d99485c2ad493626b45c1f81abd2e0c
            • Instruction ID: 4e96402866aa06ad8acc35f754dc5b2e69a1a5f559d6737b3edbe4cfbebe74bc
            • Opcode Fuzzy Hash: 41e6a5274b1e6dac8f16ab5682416ee48d99485c2ad493626b45c1f81abd2e0c
            • Instruction Fuzzy Hash: A4319532608545C2EB209F25D5622796370AF8AFB8F148330E97DCB2E5DE6DDC068700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: bindhtons
            • String ID:
            • API String ID: 791846173-0
            • Opcode ID: 9171ba2a606171ecc4786a987eabdf1552a5d8aa28dfa7c78a1eb5a2f926cfbb
            • Instruction ID: 77a81a6b7303ab394a728ab5bfc3591e5b27bdaf4256d4fe5ec917b38b0f89c1
            • Opcode Fuzzy Hash: 9171ba2a606171ecc4786a987eabdf1552a5d8aa28dfa7c78a1eb5a2f926cfbb
            • Instruction Fuzzy Hash: D92149B260468187D7A4AB29E1906E977E0F3487A4F448175EB8983798D778C8E2CF54
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: bindhtons
            • String ID:
            • API String ID: 791846173-0
            • Opcode ID: 6925adac4821d2ed962af63ddee1dd4fd3ce71ae2cc773bd1999aba9ab4df3dd
            • Instruction ID: bd2a576e2ffe52d7c01e4800f3e05812210ccc8ab2bd70da35787ebc86e8efb7
            • Opcode Fuzzy Hash: 6925adac4821d2ed962af63ddee1dd4fd3ce71ae2cc773bd1999aba9ab4df3dd
            • Instruction Fuzzy Hash: C82141F26042508BD7A1DB2AF1807AA73E0F38C794F444126FB89877A8D738C9D1CB04
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: Qt: Dead lock detected while activating a BlockingQueuedConnection: Sender is %s(%p), receiver is %s(%p)$default
            • API String ID: 0-188496423
            • Opcode ID: a95adbecaaaae865c9a6235cf9876b8f58fef2973d9c2cf80c44910392610114
            • Instruction ID: 6f75dd72b049ccf8a3d11013bf00973d4b7344a57a5e3be7f0129bd9e0e68d32
            • Opcode Fuzzy Hash: a95adbecaaaae865c9a6235cf9876b8f58fef2973d9c2cf80c44910392610114
            • Instruction Fuzzy Hash: 78328F32B09B45C5EB548B66D4666A933B4FB49FA4F184235EE6D8B7D4CF38E851C300
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: QObject: shared QObject was deleted directly. The program is malformed and may crash.$default
            • API String ID: 0-1590212175
            • Opcode ID: e5aff6f39530e9404b11ef22b592e89cf7a9c916e3d653303b7a8b4dc03af99d
            • Instruction ID: 769207590c3694ec9b8d641b0ec364b05a8db52e94102177547e9f24a100b619
            • Opcode Fuzzy Hash: e5aff6f39530e9404b11ef22b592e89cf7a9c916e3d653303b7a8b4dc03af99d
            • Instruction Fuzzy Hash: 9222AF32609785C2EA648B26D16277963B4FF8AFA0F145635DA6D8BBD4DF3DE840C700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: [RO] %ld bytes
            • API String ID: 0-772938740
            • Opcode ID: f7cae8bca4d91966f46de86ca1ffd11b4dd1f0efa15ac6301475bef029487ce5
            • Instruction ID: 04b37f1ee5d5b6e2fa00dba164212404bca4de2715aec2034e45e33b44e791be
            • Opcode Fuzzy Hash: f7cae8bca4d91966f46de86ca1ffd11b4dd1f0efa15ac6301475bef029487ce5
            • Instruction Fuzzy Hash: 8B428B332092C58FC369DF28A4403AE7BE0F355B48F44826ADBC587B56DB78E965CB50
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: qt.
            • API String ID: 0-1039624776
            • Opcode ID: 02817b13b5f54e953de6f2b544777969141c6c08e9bdaa88296a4eb03950aaa7
            • Instruction ID: 502f378a06fe1a3cf75c5a2a9b773a6fdc14ec5604ae99dc0643ad580e09d311
            • Opcode Fuzzy Hash: 02817b13b5f54e953de6f2b544777969141c6c08e9bdaa88296a4eb03950aaa7
            • Instruction Fuzzy Hash: 28E17232B08752C6EB648A26C4726BD27B1FB4AF58F588135EA0DCB6D5DE38EC41C700
            APIs
              • Part of subcall function 000001FE8FAD56A0: GetCurrentProcess.KERNEL32 ref: 000001FE8FAD56B7
              • Part of subcall function 000001FE8FAD56A0: OpenProcessToken.ADVAPI32 ref: 000001FE8FAD56CA
              • Part of subcall function 000001FE8FAD56A0: LookupPrivilegeValueW.ADVAPI32 ref: 000001FE8FAD56F5
              • Part of subcall function 000001FE8FAD56A0: AdjustTokenPrivileges.ADVAPI32 ref: 000001FE8FAD5718
              • Part of subcall function 000001FE8FAD56A0: GetLastError.KERNEL32 ref: 000001FE8FAD571E
              • Part of subcall function 000001FE8FAD56A0: CloseHandle.KERNEL32 ref: 000001FE8FAD572D
            • ExitWindowsEx.USER32 ref: 000001FE8FAD8A3C
              • Part of subcall function 000001FE8FAD56A0: CloseHandle.KERNEL32 ref: 000001FE8FAD5748
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
            • String ID:
            • API String ID: 681424410-0
            • Opcode ID: 0177cb3e1cdb11d46ee6c13810d57ab7c6ed36ee73c6af6f37b08cae63a0b0c8
            • Instruction ID: 43a5d47c7503d2c92d519103a5c7f2be109cfed66f021dbb74924a9329b4d9fd
            • Opcode Fuzzy Hash: 0177cb3e1cdb11d46ee6c13810d57ab7c6ed36ee73c6af6f37b08cae63a0b0c8
            • Instruction Fuzzy Hash: 3EE04F763056C186F77AFB21E0663FD7395F788BF4F8801769B0E072968E39C2828600
            APIs
              • Part of subcall function 000001FE8FAD56A0: GetCurrentProcess.KERNEL32 ref: 000001FE8FAD56B7
              • Part of subcall function 000001FE8FAD56A0: OpenProcessToken.ADVAPI32 ref: 000001FE8FAD56CA
              • Part of subcall function 000001FE8FAD56A0: LookupPrivilegeValueW.ADVAPI32 ref: 000001FE8FAD56F5
              • Part of subcall function 000001FE8FAD56A0: AdjustTokenPrivileges.ADVAPI32 ref: 000001FE8FAD5718
              • Part of subcall function 000001FE8FAD56A0: GetLastError.KERNEL32 ref: 000001FE8FAD571E
              • Part of subcall function 000001FE8FAD56A0: CloseHandle.KERNEL32 ref: 000001FE8FAD572D
            • ExitWindowsEx.USER32 ref: 000001FE8FAD8A5D
              • Part of subcall function 000001FE8FAD56A0: CloseHandle.KERNEL32 ref: 000001FE8FAD5748
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
            • String ID:
            • API String ID: 681424410-0
            • Opcode ID: e6a5fa4d446211fe06beb4dab869005ee2c12317f8f14c7869f8b8567d4f9dba
            • Instruction ID: 786f97e5a89c50bbc579656aaf2c26b745f3c62fa642e7f6968b7a70f56d09e3
            • Opcode Fuzzy Hash: e6a5fa4d446211fe06beb4dab869005ee2c12317f8f14c7869f8b8567d4f9dba
            • Instruction Fuzzy Hash: 14E04F763056C186F77ABB21E0663FD7395F788BF4F8801769B0E072968E29C2829600
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: WriteOnly device
            • API String ID: 0-1802527306
            • Opcode ID: 4a57033495bddb99051febc7f191ded91fe92d2e0222cebf793c46ac7e716f0a
            • Instruction ID: b11b813b63f1b7586973d5385ee399a56f7d6438bdf92d7fea1f978b872634fe
            • Opcode Fuzzy Hash: 4a57033495bddb99051febc7f191ded91fe92d2e0222cebf793c46ac7e716f0a
            • Instruction Fuzzy Hash: 7E811423B286918AE714CB64C4616BE3A70FF1AF49F441136EF99DB784DE3C9A15CB10
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: 0
            • API String ID: 3215553584-4108050209
            • Opcode ID: c1934f50d4c005c5c6b6a34040f2f2f02356029904a6b0e8a89a5b866e439fbd
            • Instruction ID: 2c97d27bd79d0f82f988f59e5c13cee5bc348cf8c7c0d6749f02d2457a49c122
            • Opcode Fuzzy Hash: c1934f50d4c005c5c6b6a34040f2f2f02356029904a6b0e8a89a5b866e439fbd
            • Instruction Fuzzy Hash: 2471D223A0D646C6FA648A29D1063BB67B1AB45F44F543139CD8D8F3DEDE6DEC428701
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f266c445950e1297430ac87a0a67c37b17f20ecc0e40b636969d92f470b947e8
            • Instruction ID: e03ef5386dc2b73784a9fa8067c09a23bc456545bbd06d107b076083266cf4b3
            • Opcode Fuzzy Hash: f266c445950e1297430ac87a0a67c37b17f20ecc0e40b636969d92f470b947e8
            • Instruction Fuzzy Hash: 6822D577B785504BD71CCB19E892FA977A2F394308709A52CEA17D3F44DA3DEA06CA00
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b618b6dd7e769c3153b16458297dc523fa2e891019ddc6d672f21eeebca888b
            • Instruction ID: b3716a3be81bdfb20ded9e5a6861c2dfa1e9a5f4f6cf1558bf48a05e391d88a5
            • Opcode Fuzzy Hash: 8b618b6dd7e769c3153b16458297dc523fa2e891019ddc6d672f21eeebca888b
            • Instruction Fuzzy Hash: A802C132B05946D6EB20DF38C4622BC73B1EB49B98B549232DA1DDB6A4DF34ED46C740
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7f3db23d335aabe829bdd43622417786b09a7f35892de39b79545b5ac86ba9a
            • Instruction ID: d87c9cec6ed43171ceaf4151425c6c3d2b861ecbdabd99f1ec9d0f49c18771dd
            • Opcode Fuzzy Hash: e7f3db23d335aabe829bdd43622417786b09a7f35892de39b79545b5ac86ba9a
            • Instruction Fuzzy Hash: 3FE1B032B0A606DAE754CF68D86227C33B5AB89B94F549135DE4EDB794DE38EC01C740
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
            • Instruction ID: 5fd8d36055606a6c045ce57bb0d14fafb88e16ee618551501b978fbd4ecde6c2
            • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
            • Instruction Fuzzy Hash: 4451D476B152E28BE7589F18E004FAC3AEAF794392F61D139DB129BF50D676CC518B00
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
            • Instruction ID: 53659f113055ede85aaf2fc74df7715867b2c9a905a4beaaa91a52d4308609d6
            • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
            • Instruction Fuzzy Hash: 3551E577B252A18BE75A8F19E404FAC3AA5F398385F51D039EB129BF51D676CC50CB00
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6496731fa74dfd9424f69598ecc8c71401180258f910eac2dd5601b098a0783
            • Instruction ID: b6231261f87508f980087be44316f69390d273a48387de406f0291dc4d3dffcc
            • Opcode Fuzzy Hash: f6496731fa74dfd9424f69598ecc8c71401180258f910eac2dd5601b098a0783
            • Instruction Fuzzy Hash: 4A51E612F182D59FF7218EBD580059C2E31A766648F444569DE88EBF4BCD28EF06C790
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f8a8174c90d8608e81318d94b2c031deb892454abe5a591ccbc75316d7478f5c
            • Instruction ID: 91504cfb2a837a5924ecbbe09d393f26f0942865a8f5b6f8844433becf73d7ff
            • Opcode Fuzzy Hash: f8a8174c90d8608e81318d94b2c031deb892454abe5a591ccbc75316d7478f5c
            • Instruction Fuzzy Hash: AB519062A08751C2EB659B27D12227A63B0FB4AF98F545135DE4D8B7C8DF38EC45C740
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 80371e6dac681631be04dcf261c6f98bc6bea27ba4b5753d1749bcb0e5166604
            • Instruction ID: b6adf2cc68be882f789b83685ecc154c8dc9cf0b91686b7642cdec32b35ae1f7
            • Opcode Fuzzy Hash: 80371e6dac681631be04dcf261c6f98bc6bea27ba4b5753d1749bcb0e5166604
            • Instruction Fuzzy Hash: 1441D323714A59C6EF04CF2AD95616963B1F748FD8B099136DE4DDBB98DE3CC8428304
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c379b1aee352c79a0ecec65525e13c06bad3dfb5bf851640375506568d2c6066
            • Instruction ID: 008f911d6e85a0066a467c6db5cc88417307e8bd1875597a30b809246c7ccae8
            • Opcode Fuzzy Hash: c379b1aee352c79a0ecec65525e13c06bad3dfb5bf851640375506568d2c6066
            • Instruction Fuzzy Hash: 7FE048D7E9EFC16DD662A5500C7AA5C2FC1D772B5471C019B8B50462D3F5551D154201
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5331c69769e61ad5f7723b224dcbb812143a96d3905af38dd95695f4b8350872
            • Instruction ID: a5099a329219d0f12b45f1d1b85b9f0dc90f8824d82dfa83072b5f260145182d
            • Opcode Fuzzy Hash: 5331c69769e61ad5f7723b224dcbb812143a96d3905af38dd95695f4b8350872
            • Instruction Fuzzy Hash:
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeap_errno
            • String ID:
            • API String ID: 2737118440-0
            • Opcode ID: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
            • Instruction ID: dfe8f773b79a5bb752064c1f9af855695ac55012aecb910060fcd3995ce796ee
            • Opcode Fuzzy Hash: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
            • Instruction Fuzzy Hash: 7AA1653662298289EA41BB31C8B53FC1378ABC6FD4F8545729F4D6B1B7CE94C8568350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeap_errno
            • String ID:
            • API String ID: 2737118440-0
            • Opcode ID: 31d0535efea13f5530bd949da869d2d280bb43d073b1e494398dd8a19ee2e131
            • Instruction ID: abdc688e6b85bc31969d051ac78723e128bf216b56061f565fb57f4e7d3f478c
            • Opcode Fuzzy Hash: 31d0535efea13f5530bd949da869d2d280bb43d073b1e494398dd8a19ee2e131
            • Instruction Fuzzy Hash: E6A153726A254885EA47EB32DC957FC1721AF8AB84F844133BB4E6B5F7CE31C8459390
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc$Token$InformationProcess$CloseCopyCurrentHandleLengthLibraryLoadOpen
            • String ID: AllocateAndInitializeSid$BuildTrusteeWithSidW$GetEffectiveRightsFromAclW$GetNamedSecurityInfoW$GetUserProfileDirectoryW$GetVolumePathNamesForVolumeNameW$LookupAccountSidW$advapi32$kernel32$userenv
            • API String ID: 2696503892-3103641746
            • Opcode ID: 119ff1c74d3851af8e6b534a9a4d689b4cea124b3013ada68ca1587a54ffe470
            • Instruction ID: ff5768279154ea382b115022f2c336069dcf97b1833d267b4fd162a19aaa2383
            • Opcode Fuzzy Hash: 119ff1c74d3851af8e6b534a9a4d689b4cea124b3013ada68ca1587a54ffe470
            • Instruction Fuzzy Hash: 7E811A31A09B82C5FA11DB21E8A666967B4FF89F90F441239D95E8B7A4DF3CEC44C704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
            • API String ID: 2643518689-564504941
            • Opcode ID: 7acbe540bc04eb17a634a09565014fbe7794e89a6f31f33c4fabbf1735c0f02e
            • Instruction ID: 1290eccac37f9938142aab2d46ae785a4bd589c8bf15a7222c6c51feb2ad307f
            • Opcode Fuzzy Hash: 7acbe540bc04eb17a634a09565014fbe7794e89a6f31f33c4fabbf1735c0f02e
            • Instruction Fuzzy Hash: 2A51FB31212B8781FE55FB52B8547B967E4EB89BE0F5486B59E0A4B7B0EE3CC447C600
            APIs
            • LoadLibraryW.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 00000001400172F1
            • GetProcAddress.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001730D
            • EncodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001731F
            • GetProcAddress.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 0000000140017336
            • EncodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001733F
            • GetProcAddress.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 0000000140017356
            • EncodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001735F
            • GetProcAddress.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 0000000140017376
            • EncodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001737F
            • GetProcAddress.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001739E
            • EncodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 00000001400173A7
            • DecodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 00000001400173DA
            • DecodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 00000001400173EA
            • DecodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 0000000140017440
            • DecodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 0000000140017461
            • DecodePointer.KERNEL32(?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014001747B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
            • API String ID: 2643518689-564504941
            • Opcode ID: 133abd0a10ee1375612e9f9bcf34c38de31264588499f97252e3e7a14f67fc1d
            • Instruction ID: 7778e1b12d3fde63df6d1acb63cd759431b914f86ae814ee691b8e64ef29754c
            • Opcode Fuzzy Hash: 133abd0a10ee1375612e9f9bcf34c38de31264588499f97252e3e7a14f67fc1d
            • Instruction Fuzzy Hash: 5151F434206B1582FE57DB57B854BE427A0AB8DBD0F440529EF4E4B7B1EF3A8945D210
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$DisposeFreeFromImageLock$AllocBitmapDeleteGdiplusObjectShutdownUnlock
            • String ID:
            • API String ID: 562715702-0
            • Opcode ID: cdc0204bc30cf34552371714a5366ee355cd303610cee03585cb9d2d35280443
            • Instruction ID: c2154d35f4134fb8e037c1cae97452af71583c2373b1a65dbe812c1534734979
            • Opcode Fuzzy Hash: cdc0204bc30cf34552371714a5366ee355cd303610cee03585cb9d2d35280443
            • Instruction Fuzzy Hash: 6B911B32714B8286EB21FF61E8546ED23F1F788BE8F500665CE595BAB4DF38C54A8740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2315031519-0
            • Opcode ID: 4f621cab06cbba3612be9da7efe74c55c63dd12ab4e59da345fd03b90ec2a3b2
            • Instruction ID: d49c74b36467b3b77bad471cceb2aef24b31a01a7c48d520ee55f93b79db8357
            • Opcode Fuzzy Hash: 4f621cab06cbba3612be9da7efe74c55c63dd12ab4e59da345fd03b90ec2a3b2
            • Instruction Fuzzy Hash: 3622F57262468186F7239B67D4807EC2BA1F74DBD8F688116EB5A0B7F1DB76C841D302
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2315031519-0
            • Opcode ID: 54416721b11f383574e6eb75bbea4055506d4160d704af51a6d319baa15b6c74
            • Instruction ID: ca9463dbd5c05d3513c75cba2a7c3e4f8b13dabb3677383c0b15b17640ae6442
            • Opcode Fuzzy Hash: 54416721b11f383574e6eb75bbea4055506d4160d704af51a6d319baa15b6c74
            • Instruction Fuzzy Hash: D622DF326246C68AE762BB64D4803FC2BE1E751BF8F5883A6CB560B6F1D676C443D301
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
            • String ID: bad exception$csm$csm$csm
            • API String ID: 1639654010-820278400
            • Opcode ID: ee4cf200c058bec5ed6b23d82509feab73e8c37503a7504ed1a0638e07e7d0de
            • Instruction ID: 9bd28906d95404d446325837baea6df44b7ac1bd24029d7c24abdf8acb0f7d04
            • Opcode Fuzzy Hash: ee4cf200c058bec5ed6b23d82509feab73e8c37503a7504ed1a0638e07e7d0de
            • Instruction Fuzzy Hash: CFE18A32600A828AEB64BF6590A83FD37E0F758BE8F4441B5EF4947BA6DB34C456C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
            • String ID: bad exception$csm$csm$csm
            • API String ID: 1639654010-820278400
            • Opcode ID: bdae71a96226850f4cec86a3f0769fa3fb0752ab22783a132606b62290854c44
            • Instruction ID: 9b63747dd7160c9bab65c0d73adb3ec38049c598a4e35238ed204f797c5a215c
            • Opcode Fuzzy Hash: bdae71a96226850f4cec86a3f0769fa3fb0752ab22783a132606b62290854c44
            • Instruction Fuzzy Hash: C3E19A726046408AEB26DF67A1843EE37A0F74CBC8F444526FF4A1BBA6CB36C465C355
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocal$AllocCountErrorFreeLastVersionwsprintf
            • String ID: %d/$%d/$%d/$%d/$%d/None/%s
            • API String ID: 407931619-3175268128
            • Opcode ID: 66a97c90580ce347094714e55ca43378ea6e37b53cdfd1314d87ae6dfdcbb0e2
            • Instruction ID: 086254b0c1e089c5a20ad905575bb101010e5f43e0107a10b123c86e4888807c
            • Opcode Fuzzy Hash: 66a97c90580ce347094714e55ca43378ea6e37b53cdfd1314d87ae6dfdcbb0e2
            • Instruction Fuzzy Hash: 4F513831214AC2C6EBA1BB11E894BE963F0F785BE4F541275EB8A476A4DF38C556CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Gdip$Image$free$Dispose$BitmapCreateEncodersFromSaveStream$Scan0Sizemalloc
            • String ID: &
            • API String ID: 1890951399-3042966939
            • Opcode ID: 60ad61b9c2a00a2fb8edbd6bf83d103515c805d4293a766110f50120b13cc51f
            • Instruction ID: a07ea13d71bcbe9dd710da4819328bf106fade1a4279fb35c91cbec6e58edc4b
            • Opcode Fuzzy Hash: 60ad61b9c2a00a2fb8edbd6bf83d103515c805d4293a766110f50120b13cc51f
            • Instruction Fuzzy Hash: 1C914C32311AC285EF2ABF21D410BF923E5E754BF8F5847B19F1A0B6E4DE28C9468340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Gdip$Image$free$Bitmap_errno$BitsGraphicsHeapPalette$AllocContextCreateDeleteDisposeDrawFormatFreeFromHeightLockPixelScan0SizeUnlockWidth_callnewhmallocmemcpy_s
            • String ID:
            • API String ID: 3799618542-0
            • Opcode ID: e8420e5db0a413dcbbb5ff5e2a4ca2867ef6350a45bdd43dbb9f23277287debd
            • Instruction ID: b42b5e720108db3ebe85cc702d3c260d8c14de4c742207b6e688aec365453c11
            • Opcode Fuzzy Hash: e8420e5db0a413dcbbb5ff5e2a4ca2867ef6350a45bdd43dbb9f23277287debd
            • Instruction Fuzzy Hash: 4EC1AA762006C28AEB2ABF25D444BE93BE4F744BE8F4546A5DF094BBA5DB38C542C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: VisibleWindow
            • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
            • API String ID: 1208467747-3439171801
            • Opcode ID: 32ff9c33e7c21981f1e92648b8f3a94a06c835b35deeed59398db8ea4e336351
            • Instruction ID: 2cc244b393d159f878117fc65042957c5293751b106ab6aa3f1da4fcd9b67c76
            • Opcode Fuzzy Hash: 32ff9c33e7c21981f1e92648b8f3a94a06c835b35deeed59398db8ea4e336351
            • Instruction Fuzzy Hash: A151417C751BC340FD85FB12A4203F423E99B45BF4F4865B89F0A4A3B9FAA8D9568300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID:
            • API String ID: 1452528299-0
            • Opcode ID: a5f0163f4acb8b974cacfdb07cbf087a1492aeecdc8c13315bce12a0094e587a
            • Instruction ID: 0116af1a5038f0e07c892bca68370251e0bd2adb0d65ca3ed4a2dc04c868409e
            • Opcode Fuzzy Hash: a5f0163f4acb8b974cacfdb07cbf087a1492aeecdc8c13315bce12a0094e587a
            • Instruction Fuzzy Hash: 78B19D32301A828AEB62FB15D9507B923E5FB48BE4F444675DF4A47BA1EF38D456C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$Leave$Enter
            • String ID:
            • API String ID: 3650451384-0
            • Opcode ID: 21337f2ffdf3b93cbb6cca8b1675b67f4d5956b45ff553cf537671f279ca96a2
            • Instruction ID: 6a594ef86344e18ac4ca3fa30d4c78f8a758cc582ef67b9f8d403e52597f5b80
            • Opcode Fuzzy Hash: 21337f2ffdf3b93cbb6cca8b1675b67f4d5956b45ff553cf537671f279ca96a2
            • Instruction Fuzzy Hash: 51513F36204F8286EB71AB15A4107BDB7E0F785BB1F144274CB9A877B1DF78D44A8700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$Leave$Enter
            • String ID:
            • API String ID: 3650451384-0
            • Opcode ID: 1c300547cf81033922c0f2f8a93969f9d7edcc1f4596588974520377087e211c
            • Instruction ID: 7ad27bf34863c6bf8fe744d9ce82e7e9009ef55e81a34259adc1220e4f2661f0
            • Opcode Fuzzy Hash: 1c300547cf81033922c0f2f8a93969f9d7edcc1f4596588974520377087e211c
            • Instruction Fuzzy Hash: 8A51F776204A408AE772DB27B4443AAB7A1F78DBE0F145125EB9A477B0DF79D885C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeap__free_lconv_mon__free_lconv_num_errno
            • String ID:
            • API String ID: 2573795696-0
            • Opcode ID: cb00de6662f5520fdc5f3791fe64273e5581ddefffeafd99a740971fc32c6413
            • Instruction ID: b86f636edf46d08687b04d80d7f8a26ff18dd14a258ec429ef556dc8d04e9f86
            • Opcode Fuzzy Hash: cb00de6662f5520fdc5f3791fe64273e5581ddefffeafd99a740971fc32c6413
            • Instruction Fuzzy Hash: B441F936612EC688EF65BF21C4613FC23E4EB84FE4F4844759B4D4A6A6DF6888928310
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeap__free_lconv_mon__free_lconv_num_errno
            • String ID:
            • API String ID: 2573795696-0
            • Opcode ID: d75b551c36e4cdf0e0863f973bd3fdc533001a4c5333fda6d835f932719aced2
            • Instruction ID: 16ba26a8fd9490488f59f1c6bfc00149bb069836530eabfd1ba7492b4cef4162
            • Opcode Fuzzy Hash: d75b551c36e4cdf0e0863f973bd3fdc533001a4c5333fda6d835f932719aced2
            • Instruction Fuzzy Hash: 8641FA32612644C5FE67EB62D4543E823A0AB8CBD5F484432AB0A1F2E5DF35C991C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$CreateFrameInfo_amsg_exit
            • String ID: csm
            • API String ID: 2825728721-1018135373
            • Opcode ID: bc2077fb82e993c6a671ee9943b81fbe161145c008b44bcd5635a92dfd771e75
            • Instruction ID: 12396a63d9aed3818192607fabb08f35e8a67458488577cfb2ebcd8ca7e08b51
            • Opcode Fuzzy Hash: bc2077fb82e993c6a671ee9943b81fbe161145c008b44bcd5635a92dfd771e75
            • Instruction Fuzzy Hash: F4416C36114B8282DA70AB12E4503EE73E8F789BF4F444275EFAD07BA2DB38D0568710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$CreateFrameInfo_amsg_exit
            • String ID: csm
            • API String ID: 2825728721-1018135373
            • Opcode ID: 8f222e020112ae842c3c4c68fcc30c68a10daa5b881025fc26f49261b3f43a6e
            • Instruction ID: acdaeb1b95411d8282de9e9f47ccf94d55616218c24a67ee76c99068014e07bf
            • Opcode Fuzzy Hash: 8f222e020112ae842c3c4c68fcc30c68a10daa5b881025fc26f49261b3f43a6e
            • Instruction Fuzzy Hash: 1A415936114B8582E6719B12A4403EE77A4F388BE4F444625EF9D0BBA6DB39C5A5C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: 5e2c67101b115eefd770f9530645276a89eac283016001a0172ea502d058b9de
            • Instruction ID: fc58875e53b704ae01dc2c66b2516eda3f8662aa826a3883cff6222ef676e99c
            • Opcode Fuzzy Hash: 5e2c67101b115eefd770f9530645276a89eac283016001a0172ea502d058b9de
            • Instruction Fuzzy Hash: 15418F31710E9286F624BB26E8647FA23D1F785BF1F5442B19F56872B0CF38D4468360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: def6dd5b1c47440ac98d2b9d2c95777227165119e6d7f2433b2e2f5064c1cd78
            • Instruction ID: 0d0f588757f3907c692e3f93d38da76148eed5c00e8cc8052bc9189f3b05855d
            • Opcode Fuzzy Hash: def6dd5b1c47440ac98d2b9d2c95777227165119e6d7f2433b2e2f5064c1cd78
            • Instruction Fuzzy Hash: 77415E75310A8086E666DB2BB8153EE6251F78DBE1F585121BF6A877F4DF39C8849300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: PerformanceQuery$AddressCountCounterFrequencyHandleModuleProcTick
            • String ID: GetTickCount64$QueryPerformanceCounter failed, although QueryPerformanceFrequency succeeded.$default$kernel32
            • API String ID: 3248421294-3823320790
            • Opcode ID: c59a33e538b6d16315bac9845251cd1345709dcc26705cc9562fa14b61e4d09c
            • Instruction ID: 52dfb27d14476bcc42a61baa1ed047dd73a87366ac874dffb1532bb3c2bb16ee
            • Opcode Fuzzy Hash: c59a33e538b6d16315bac9845251cd1345709dcc26705cc9562fa14b61e4d09c
            • Instruction Fuzzy Hash: FC212A65F09B87C6FB008B60E99623563B0AF99F44F484139D44ECA3A4EF6CE984C704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseValue$CreateDeleteOpenlstrlen
            • String ID: AppEvents$Network
            • API String ID: 3197061591-3733486940
            • Opcode ID: 36e90fbbfea98bc956dd5aeff78b519238191f212cae5700653f1760c57783c9
            • Instruction ID: 4c491a5b61f04888b301c9977f51a6ff9124572e8417e50c7aef076cccecc85d
            • Opcode Fuzzy Hash: 36e90fbbfea98bc956dd5aeff78b519238191f212cae5700653f1760c57783c9
            • Instruction Fuzzy Hash: 4F212436314A8186EB10AB12F844B9AB3A1F784BF5F540231EE5947BA8CF7CC146CB04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
            • String ID:
            • API String ID: 1080698880-0
            • Opcode ID: 6d8b7b3dc11a15fff77c7ccf32e137587439f77b0189d775a4a507dbfda42e36
            • Instruction ID: 83a3a6060909d24d368d5337b72e80dfdd9bfd14edaeebcb55915b1a02ab89ef
            • Opcode Fuzzy Hash: 6d8b7b3dc11a15fff77c7ccf32e137587439f77b0189d775a4a507dbfda42e36
            • Instruction Fuzzy Hash: 57817032704BC286EB24AF2594807BA66D5F748BF4F548775AB598BBE4DB38C5028710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: String$CloseHandleProcess$FreeOpen$CurrentToken
            • String ID:
            • API String ID: 3697972778-0
            • Opcode ID: c0b0e474b926fcc330e320d504bf00c551296146189a67d64404ddb141be6ede
            • Instruction ID: 3d1772c91f47309d4b6c0dce76209b029146803892bbaf637fe608f91bcff23d
            • Opcode Fuzzy Hash: c0b0e474b926fcc330e320d504bf00c551296146189a67d64404ddb141be6ede
            • Instruction Fuzzy Hash: 76515E76201AC282EAA5BB11A4107F963E4FB84FE4F1842758F5A4B6A5DF38C8568740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
            • String ID:
            • API String ID: 2295021086-0
            • Opcode ID: 8a0d1357173deac69c26e3324236e112c1b1041ebc1a21b94e928fbcca27f017
            • Instruction ID: 1929503149e62f1094f8b893f0f8665382d47a5d76bdbfd505ce10182d904436
            • Opcode Fuzzy Hash: 8a0d1357173deac69c26e3324236e112c1b1041ebc1a21b94e928fbcca27f017
            • Instruction Fuzzy Hash: BB518F32601AC28AFB61BB21C4943FC76E0EB40BF8F5487B59F594AAE5DB3885478701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
            • String ID:
            • API String ID: 2295021086-0
            • Opcode ID: c6db97a4bb20f59843c30963b0e0be0a0672b1597ed532e94f36ced9df2088c5
            • Instruction ID: 5abd1bc9279174208ef5b362f3903396ae01f38917feaa785e0acb090f5a34c8
            • Opcode Fuzzy Hash: c6db97a4bb20f59843c30963b0e0be0a0672b1597ed532e94f36ced9df2088c5
            • Instruction Fuzzy Hash: 6251F572604B818AFB67CB2BD9407EC36B0AB4C7E8F184621FB1D1BAE5DB3984418711
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _amsg_exit$CommandInitializeLine__wsetargv_cinit
            • String ID:
            • API String ID: 2949660345-0
            • Opcode ID: 0f4283b1760a3c16a40ded28c3f021eb12903efaddd1541ce61f6a1fad5ddaeb
            • Instruction ID: 2683727396221e556a9897ded846af282ad421c8bea8ad49c2a50014e4c8efa3
            • Opcode Fuzzy Hash: 0f4283b1760a3c16a40ded28c3f021eb12903efaddd1541ce61f6a1fad5ddaeb
            • Instruction Fuzzy Hash: 31313EB071164586FB57EBA7B4527F92291AB8E3C4F044039B701876F3DF788840E652
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: MultipleObjectsWait$CloseErrorExceptionHandleLastThrowValue
            • String ID: @$QThread internal error while waiting for adopted threads: %d$default
            • API String ID: 260478653-2992040041
            • Opcode ID: a17424416e23380ba081f0f70fe6da9368696a7339bf18603e62f94c7f294120
            • Instruction ID: 61654f7538796bda9ea961b96ba8a1aa2230c6b72381fb13ca79788c912ce372
            • Opcode Fuzzy Hash: a17424416e23380ba081f0f70fe6da9368696a7339bf18603e62f94c7f294120
            • Instruction Fuzzy Hash: 95C1C072A18686C6EF149B25D4622B977B1FB8AF94F148236D91D8B7E5CE3CE841C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
            • String ID: @
            • API String ID: 3473179607-2766056989
            • Opcode ID: 70613ee20f0b469d2dc4fa8b7aa00a0ec4ba75fb24369761d5266e73a85542bd
            • Instruction ID: 29b2add211cf3e3c009c87497b217406fbe1fe14e3223f4a6b616f89e5c80ef5
            • Opcode Fuzzy Hash: 70613ee20f0b469d2dc4fa8b7aa00a0ec4ba75fb24369761d5266e73a85542bd
            • Instruction Fuzzy Hash: 3C814A72200BC296EB24AF24D8A47A937E4E745BB4F548375CB7A476E0EB38C45BC310
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: lstrlen$_errno$CloseEnumInfoOpenQuery_invalid_parameter_noinfo
            • String ID: Software\Tencent\Plugin\VAS
            • API String ID: 47975445-3343197220
            • Opcode ID: e7f4e84029ec382a2d93beb0de2337fa29a23218f62e48d748265e7efd93be2b
            • Instruction ID: 4d3c540ac3fe7fbc2930aa7ec1824fd19db227db47f64a0c6d21e651698029ff
            • Opcode Fuzzy Hash: e7f4e84029ec382a2d93beb0de2337fa29a23218f62e48d748265e7efd93be2b
            • Instruction Fuzzy Hash: 52516236614BC286E760EB21F8507EE73E4F788798F900266DB8D47A68DF38C556CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2959964966-0
            • Opcode ID: 5b15c66cd6d411bd027aebc04f631a0e3f4aaa2a84db44a19bfb65910699da26
            • Instruction ID: 1692bfa309ee7df44431f29efea48a696cef7733e47b6388b1c0a0edda1d582c
            • Opcode Fuzzy Hash: 5b15c66cd6d411bd027aebc04f631a0e3f4aaa2a84db44a19bfb65910699da26
            • Instruction Fuzzy Hash: 12A17F726116C286FBA0AB65A4503F976E4F7447F4F1447B5DF590AAF8DB38C4838720
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _fileno$_getbuf
            • String ID:
            • API String ID: 92340818-0
            • Opcode ID: cb7261e508c6910e47f60d76cd7adf87120ddc1c9827de64f9d8a6a9491afa45
            • Instruction ID: bd12791018685ae12ce60ba58c1b3ccf989c285c21f985114249dd3a83be8bb7
            • Opcode Fuzzy Hash: cb7261e508c6910e47f60d76cd7adf87120ddc1c9827de64f9d8a6a9491afa45
            • Instruction Fuzzy Hash: 9F51F83220564042EB769B2796843A837A0FB5D7D8F140215FF594B6E1DB39CA62C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: 647e02dd2c1bdac2cb0593e1bcada1d5777c8686bc1b852d6813ed41c29527b2
            • Instruction ID: 169804850c9e5c8eb619a9709744cb488e3a2e5ee206114489ae5d4b2ca706ef
            • Opcode Fuzzy Hash: 647e02dd2c1bdac2cb0593e1bcada1d5777c8686bc1b852d6813ed41c29527b2
            • Instruction Fuzzy Hash: C0416236200B818AE754BB21A458ABA37E5F759BE0F1552B5DF56877A1CF34C846CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: 2fbd16e4ec5510598824a37ba1205699a4bd40869d2e8a2b80a5097fdbc507e3
            • Instruction ID: 8ffbf57962d8f6b56271dbb7e8aa7d8ce0d2d0c9d8d6ac86f58dec523bcd15a7
            • Opcode Fuzzy Hash: 2fbd16e4ec5510598824a37ba1205699a4bd40869d2e8a2b80a5097fdbc507e3
            • Instruction Fuzzy Hash: 1F41A17620464086E756EB22B408BEE33A5F78DBD5F145239EF0A877A1DF39C845C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$Event$ResetSelectSwitchThreadbindconnecthtons
            • String ID:
            • API String ID: 1298600207-0
            • Opcode ID: 6976ed68a7b460f545eb79997a661905af692d36da6c8cd53b89725313569a83
            • Instruction ID: 4c23914e3dfb989917d6f90a5904bc1e6127408a7af01ded7465db83fb26b6c7
            • Opcode Fuzzy Hash: 6976ed68a7b460f545eb79997a661905af692d36da6c8cd53b89725313569a83
            • Instruction Fuzzy Hash: E1416D32604F8282EB50AB21DA647BE73E5F748BE0F104165DF8A47BA4DF78D466C750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ConditionMask$InfoVerifyVersion
            • String ID:
            • API String ID: 2793162063-0
            • Opcode ID: 10c6aff73516db3e0e7fc4b1498109461d770d16e70cbd1f77bc26cf72f8573f
            • Instruction ID: c981f04433680753e447494cc8844a74912169d29d14cb6a02fa6cb3c3d25525
            • Opcode Fuzzy Hash: 10c6aff73516db3e0e7fc4b1498109461d770d16e70cbd1f77bc26cf72f8573f
            • Instruction Fuzzy Hash: 9141FB36A09641C7E724CF21E85566AB7B1F788F84F048139DA8E8BB58DF3CD949CB44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2315031519-0
            • Opcode ID: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
            • Instruction ID: 837bef916605c8ac553493ff05beba084a74ecbb11fd3c8de8f430ef8a4a898e
            • Opcode Fuzzy Hash: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
            • Instruction Fuzzy Hash: 7D31BF326216C28AE212BF6598A53FE36D5A7807F0F054675AB110B3F2DA79D843C750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2315031519-0
            • Opcode ID: 336b4f771e014f07d6b5d16777afb6b36013b06194a566b8644ffbecc7b22c4c
            • Instruction ID: d67d9c6e19b896fe05e4031d09c239c26fa44e29737bb2cce02eac4e522d97ca
            • Opcode Fuzzy Hash: 336b4f771e014f07d6b5d16777afb6b36013b06194a566b8644ffbecc7b22c4c
            • Instruction Fuzzy Hash: 20313772320A9485E313AF67AC817DE36A0AB487E8F554919FB241F3F2EA79C8418351
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: aceef0d8f6cd6c68b7d24092875a9f92703ae0e2651d92f7e848195387b296dd
            • Instruction ID: 4d1ce156afcd9168f97d55c1247e61d8396d7c94bd1c6877a89045127428e143
            • Opcode Fuzzy Hash: aceef0d8f6cd6c68b7d24092875a9f92703ae0e2651d92f7e848195387b296dd
            • Instruction Fuzzy Hash: 20216F31604E828AE764AB25E8103BA23E5F789BF4F2403709F579B6B4CF38C4468710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: 878d48c2bd4a3e8e973cbacb6bf4c101ecbb597781cdf4372316b3ca222b11bc
            • Instruction ID: 55d2b20e9bc2e8957781bccd7ba62b74702bb4c1efc0d635e8e85446c446fb56
            • Opcode Fuzzy Hash: 878d48c2bd4a3e8e973cbacb6bf4c101ecbb597781cdf4372316b3ca222b11bc
            • Instruction Fuzzy Hash: 65216D75204A8086E7A6DB27B8203EE63A5F78DBD4F941221FF9A876B4CF38C445C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProcProcessToken$CurrentInformationOpen$CloseCopyHandleLength
            • String ID: HOME$HOMEDRIVE$HOMEPATH$USERPROFILE
            • API String ID: 2161948334-698974742
            • Opcode ID: 522bbb0ce41df5e904172ec52821add264b1887ae4c821b0e5e19679b0eeeca8
            • Instruction ID: 4f8a5d37a26711e69a771527ac0c4a57723b620f6844c51a254d16b8979b0540
            • Opcode Fuzzy Hash: 522bbb0ce41df5e904172ec52821add264b1887ae4c821b0e5e19679b0eeeca8
            • Instruction Fuzzy Hash: F3E12B32B05A01CAEB10DF65D8A22BD33B0EB4AB98F584531DA1DDB6D9DE79EC05C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: swprintf$_errno_invalid_parameter_noinfomalloc
            • String ID: %s %s$onlyloadinmyself$plugmark
            • API String ID: 3059695456-591889663
            • Opcode ID: bd173990919955496a5d2fd31b15c617698a0f7984e0d23985bbef0f184765d7
            • Instruction ID: e7fdc0437edfa76e26123e2c12e6c855a32f8b9588b84182fa9a0d8a3c3acee8
            • Opcode Fuzzy Hash: bd173990919955496a5d2fd31b15c617698a0f7984e0d23985bbef0f184765d7
            • Instruction Fuzzy Hash: 0FA19A36300AC696EB10FF66D4943F967A1EB89BE8F448075DF5C4BBA6DE39C1428350
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Priority$CurrentResume
            • String ID: QThread::start: Failed to create thread$QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 682968308-3963483154
            • Opcode ID: a895a4ec4cb16228a666090ac22768035e26b0b9b9618cbf51015f0cb63221b3
            • Instruction ID: a1ded69b3d065f431e0f22bc0a9608a5e670c05e6796fa01e221c4a43ce73c1f
            • Opcode Fuzzy Hash: a895a4ec4cb16228a666090ac22768035e26b0b9b9618cbf51015f0cb63221b3
            • Instruction Fuzzy Hash: 83418132A08746C2EA549B25E5262A863B0FF89B74F044335DA7D8B2E5DF3DF854CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: File$CloseCreateHandleWritelstrlenwsprintf
            • String ID: %s %s
            • API String ID: 2369136734-2939940506
            • Opcode ID: 09ce7afcb9fb6050578c75cf102adc5c64cf37ae564d7fe82caabfb4846adaf7
            • Instruction ID: 5e8c0b2c05086ff81545193b3df1766b050bd6e0c0a29536aaf338ece2553782
            • Opcode Fuzzy Hash: 09ce7afcb9fb6050578c75cf102adc5c64cf37ae564d7fe82caabfb4846adaf7
            • Instruction Fuzzy Hash: 5C315E31314AC695FB20EF21E4547EAA3A1F788BE4F5442619B4947AB8DF39D64ACB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$CodeExitOpenSleepwprintf
            • String ID: Unable to check if process %d is running.$denglupeizhi$houmenpeizhi
            • API String ID: 412140179-1807746241
            • Opcode ID: 5968e189d384624b144a4a2ebf5dec38f3adb6ed935af75678279542da2e5d03
            • Instruction ID: e11b3937a4fd89b096527d988a4285e19f56a7d78021119546ba1c0690918bab
            • Opcode Fuzzy Hash: 5968e189d384624b144a4a2ebf5dec38f3adb6ed935af75678279542da2e5d03
            • Instruction Fuzzy Hash: BC217CB171464182EB62DB23B8803F973A1A78D7D4F540529FB4A477B5EF78C8458B01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandle$Gdip$CriticalCurrentDeleteDisposeErrorFreeImageLastObjectSectionSingleThreadWaitfree
            • String ID:
            • API String ID: 1027730736-0
            • Opcode ID: 347c1ec12ef1d2ec7bf1145c1b6afb1a60276238f096c0ea2858b635a1103b41
            • Instruction ID: 097861fca859055c604faedc1cc27ebaa9a33627ea2ac9120ce1a40254926bd4
            • Opcode Fuzzy Hash: 347c1ec12ef1d2ec7bf1145c1b6afb1a60276238f096c0ea2858b635a1103b41
            • Instruction Fuzzy Hash: 33512C72202BC286EB56BF64D4507FD23E4EB80BE8F5847759F598A6B5CF34C8468310
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandle$CriticalCurrentDeleteErrorLastObjectSectionSingleThreadWaitfree
            • String ID:
            • API String ID: 429269332-0
            • Opcode ID: 940c03b3e391b6f0df8739824c821e814237e079157a3131c643470a4da37853
            • Instruction ID: d203ec23ff589d5f1a3d7843f840c05f4e4c625ef31925fb42e6c590769b3a67
            • Opcode Fuzzy Hash: 940c03b3e391b6f0df8739824c821e814237e079157a3131c643470a4da37853
            • Instruction Fuzzy Hash: F15176B6206B4185EB56EF26E4503ED23A4FB4ABE5F184235EF594B2F5CF34C8418314
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: strchr
            • String ID: in $QObject::%s: No such %s %s::%s%s%s$QObject::%s: Parentheses expected, %s %s::%s%s%s$default$method$signal$slot
            • API String ID: 2830005266-1438824482
            • Opcode ID: ed1abf882f2c03d4d3c043e58149050cc9689118d8bd9510a25f0b8134be170e
            • Instruction ID: ade573d5f165cfb7b2e581b7d0b3ee331e54b79dbd748431a6db4d7e83ba1569
            • Opcode Fuzzy Hash: ed1abf882f2c03d4d3c043e58149050cc9689118d8bd9510a25f0b8134be170e
            • Instruction Fuzzy Hash: 9641D722A09F55C2EB60CF11E9552A977B0FB8AF90F444135DAAE8BB95DF3CD885C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2959964966-0
            • Opcode ID: 5ee1e5f1307faef82a43cc4adb80dc0793dd143b06ed78ac7dba27c580814ce9
            • Instruction ID: a3e1252da51eb40aef0e1f1842fc989bfeecaf9cbbee513c674de7a38251166d
            • Opcode Fuzzy Hash: 5ee1e5f1307faef82a43cc4adb80dc0793dd143b06ed78ac7dba27c580814ce9
            • Instruction Fuzzy Hash: 5341C53221064146EB668B6BD6913EC37A0FF0D7D4F680619FB598B6E1DB36C8A2C741
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2959964966-0
            • Opcode ID: b463df3787636ec145c702a7e3d2ae7b8437b1aa176ea829ece4ebc51790ba93
            • Instruction ID: 19bf9ec2fef539587d3f7cbfad646731e590394261dcb9038f5f8cf91364423f
            • Opcode Fuzzy Hash: b463df3787636ec145c702a7e3d2ae7b8437b1aa176ea829ece4ebc51790ba93
            • Instruction Fuzzy Hash: 9541C83221064192EB6A9B7BE6413EC37A0F75D7D4F280615FB598B6F1DB35C862C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$AllocHeap_callnewhfreemalloc
            • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
            • API String ID: 3198430600-868042568
            • Opcode ID: 71f902fbc9141746ee0dab03b95b383ee8bd6d96c1cc4bade1ccfda00f101f5a
            • Instruction ID: 6ecbf55a97b0d435282c7e0186d75e92d5a1ff56ed152a3695f4fa4e39b9f110
            • Opcode Fuzzy Hash: 71f902fbc9141746ee0dab03b95b383ee8bd6d96c1cc4bade1ccfda00f101f5a
            • Instruction Fuzzy Hash: 24E1B2726046C28AE775BF29E4407BF7BE4F7447E8F144261DB9687BA5DA38D842CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$AllocHeap_callnewhfreemalloc
            • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
            • API String ID: 3198430600-868042568
            • Opcode ID: 799095425a2dc9d550ccedf1bd6281258ec8283532ce5ff5b40e01d74f7f7ecb
            • Instruction ID: de6d08f0b351256751b5bcb0ce223f13a09a26461f9db43ef935d21b8bb9b3e0
            • Opcode Fuzzy Hash: 799095425a2dc9d550ccedf1bd6281258ec8283532ce5ff5b40e01d74f7f7ecb
            • Instruction Fuzzy Hash: DFE194B2B046808BE776CB2AF440B9E7BA1F7897C4F544415EB9A43BA5DB3CD940CB50
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: bad allocation
            • API String ID: 0-2104205924
            • Opcode ID: e8f0598dbd45f399888059267843e7640e179de0418f77ab1c84c48c3c6fc7e4
            • Instruction ID: b90b44c55f19e5c25c7b8b03936d9b7dd26149c2f277ca514ea66a697e274995
            • Opcode Fuzzy Hash: e8f0598dbd45f399888059267843e7640e179de0418f77ab1c84c48c3c6fc7e4
            • Instruction Fuzzy Hash: 3681CA3A705FC281EA60EB05E9607BABBE4F784BE4F544171DF4A47BA8DB38C4568700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: bad allocation
            • API String ID: 0-2104205924
            • Opcode ID: 233caf27f60ef1f0f08c67a9209eb84b41dc324597248f97368eaa283a9ca684
            • Instruction ID: 89edbf9562fe589ac904cbea2c02809d41e58fdd170df48a652667ac1b2e06cb
            • Opcode Fuzzy Hash: 233caf27f60ef1f0f08c67a9209eb84b41dc324597248f97368eaa283a9ca684
            • Instruction Fuzzy Hash: D181AF72315A8481EA66DB06F940BEAB7A4F798BC8F544121FF4907BA9EF78C445C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Window$CountForegroundInfoInputLastTextTickmallocwsprintf
            • String ID: %d min
            • API String ID: 4179731349-1947832151
            • Opcode ID: 422eb00071ef3fa8c2918f9fc1214eccc8ab5220253c98e71f31a22b5cd05278
            • Instruction ID: 48b5a93e36099cd2632bd77974dcd7553db97bb421d2394606cb83f391024469
            • Opcode Fuzzy Hash: 422eb00071ef3fa8c2918f9fc1214eccc8ab5220253c98e71f31a22b5cd05278
            • Instruction Fuzzy Hash: B4418E76704AC186E764EB26E4147EABBE0F788BD0F644125EF4A87B64DF38C506CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentInfoInformationInitializeLineSleepStartupThreadValueVersion__setargv_cinit_errno
            • String ID:
            • API String ID: 2481119767-0
            • Opcode ID: fa810e96e6b49a81c5a3de3deb820a248b92c227eb375945ca1b424efe49a0c5
            • Instruction ID: d9117606c79373c043cbc2be301a0c937736e92856aeb6cfc51f392b099dc8a5
            • Opcode Fuzzy Hash: fa810e96e6b49a81c5a3de3deb820a248b92c227eb375945ca1b424efe49a0c5
            • Instruction Fuzzy Hash: 61316BB4610FC389FA647BB4A4723FD21DA9B653F1F2445F49B11C52F3EA2A88474622
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseCurrentHandleInit_thread_footerObjectSingleThreadWait
            • String ID: QThread::wait: Thread tried to wait on itself$QThread::wait: Thread wait failure$default
            • API String ID: 3558220368-2839480340
            • Opcode ID: 5606b09bc6a5dc592dbef470d28760f875ccfb88470aa8651be09fd3ff341b3a
            • Instruction ID: fd3b3c08221b46820003e25844e0b2b1b6f57df2037d923d5cd075985dac745a
            • Opcode Fuzzy Hash: 5606b09bc6a5dc592dbef470d28760f875ccfb88470aa8651be09fd3ff341b3a
            • Instruction Fuzzy Hash: D641A722A18A46D5EB148B25D52236863B0FB89F74F185336DA6D8B2D1DF3DFC948700
            APIs
            Strings
            • <C-CNNID: %Iu> OnReceive() event return 'HR_ERROR', connection will be closed !, xrefs: 000001FE8FAE1319
            • <C-CNNID: %Iu> recv 0 bytes (detect package), xrefs: 000001FE8FAE1389
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$recv
            • String ID: <C-CNNID: %Iu> OnReceive() event return 'HR_ERROR', connection will be closed !$<C-CNNID: %Iu> recv 0 bytes (detect package)
            • API String ID: 316788870-281152440
            • Opcode ID: e006504f11bb0893ad072e5ecebb35c70b253aa6bceec88274e66d0847f92e8c
            • Instruction ID: 78b296377526e2e9562bc5c1cdf7bb97f582d44dd9671c0692bf0d8f3befc177
            • Opcode Fuzzy Hash: e006504f11bb0893ad072e5ecebb35c70b253aa6bceec88274e66d0847f92e8c
            • Instruction Fuzzy Hash: 70317372604A9282EBD0AF25D4947AD27E0F758BE8F145171DF09C77A8EB38C4868740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateFreeInitializeInstanceStringUninitialize
            • String ID: FriendlyName$Network
            • API String ID: 841178590-1437807293
            • Opcode ID: c51619dea522e0c55fc0899b43e0b55aa5e9855a9860aea8fcd38e191733d5da
            • Instruction ID: e9c5ad6de2b20fe82266fb4a3045e71557f8e361b334f4ea074eddc15ed4f41a
            • Opcode Fuzzy Hash: c51619dea522e0c55fc0899b43e0b55aa5e9855a9860aea8fcd38e191733d5da
            • Instruction Fuzzy Hash: 7F31ED36214A8682EB50EF35E4807AA67A0F7C4FD4F558162DB8E87B34DF39C54ACB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AttributesCreateErrorFileLastProcesslstrlen
            • String ID: WinSta0\Default$h
            • API String ID: 591566999-1620045033
            • Opcode ID: c8e2f4124be8c9a6e4893f230f4c199dab45ef929636d0fe5c6bc72b415117a5
            • Instruction ID: 4a32be5cd62f904bb9e3f21131cb254a73f3375210ccd98b5a656f62a3cda4d8
            • Opcode Fuzzy Hash: c8e2f4124be8c9a6e4893f230f4c199dab45ef929636d0fe5c6bc72b415117a5
            • Instruction Fuzzy Hash: 28318431704AC282EA60FB25B5553FAA3D5E788BF0F544371AB5987BE9DF38C0568B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Current$Thread$HandleProcessValue$AllocCloseDuplicateInit_thread_footer
            • String ID:
            • API String ID: 1145076070-0
            • Opcode ID: 408a2b34e50e2ba976580d2fae296fcd2328d94a12b92b755e17d9db50ea5d54
            • Instruction ID: 682116bd07024d957a7ccd2c15c64731ad6cd6ffae3081789320ef00f377ae50
            • Opcode Fuzzy Hash: 408a2b34e50e2ba976580d2fae296fcd2328d94a12b92b755e17d9db50ea5d54
            • Instruction Fuzzy Hash: 57311232919B46C6EB509B15E45522973B1FB49FA0F140239DA9E8BBD9DF3CF845C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno
            • String ID:
            • API String ID: 921712934-0
            • Opcode ID: 821f5293a29abbd7863e97bfbf14561feb01f87c9b858ffea3149c09338b6ff9
            • Instruction ID: 405c08f5698187b2c79e277f0b15093f519dc287c2f9a0bd543c7c9284a57925
            • Opcode Fuzzy Hash: 821f5293a29abbd7863e97bfbf14561feb01f87c9b858ffea3149c09338b6ff9
            • Instruction Fuzzy Hash: 8B219F327209C245E6157F65D8613FD76D1A7807F1F094AA5EB14073F2DAB894478760
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
            • String ID:
            • API String ID: 443098685-0
            • Opcode ID: a6a614697040017534cd3b1d3e96cc5a4ea4528f5d59ece13cf00c21120499df
            • Instruction ID: 78911c635d907e08d3eaf636c9a584f0ad5eba584287fc721d42bc39be1d3df6
            • Opcode Fuzzy Hash: a6a614697040017534cd3b1d3e96cc5a4ea4528f5d59ece13cf00c21120499df
            • Instruction Fuzzy Hash: 7721B73132099387E7609B25F494FAA77D4F794BF4FA05261DB5943AA4DB38C446CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
            • String ID:
            • API String ID: 443098685-0
            • Opcode ID: f519665c691364a73c8828fb6620903fabd3b4a25194a309f82e53ada5401924
            • Instruction ID: 305f93d56b7a1220d1d78e3cac75812468a422e5bfdccfe149107610b3fc70fd
            • Opcode Fuzzy Hash: f519665c691364a73c8828fb6620903fabd3b4a25194a309f82e53ada5401924
            • Instruction Fuzzy Hash: 0C21C472720A5086E771CB22F844F9A7690F79CBE4F905210FFA943AA4DF39C541DB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno
            • String ID:
            • API String ID: 921712934-0
            • Opcode ID: 9e58cec45201999caa6b05e1c173c810d3651be65d0d5fa34ce860b1680aea3c
            • Instruction ID: 85330d2fbe747711bc0543bb121a805448bc9ce1ab9dc1387ae2301fd706829a
            • Opcode Fuzzy Hash: 9e58cec45201999caa6b05e1c173c810d3651be65d0d5fa34ce860b1680aea3c
            • Instruction Fuzzy Hash: 9921F672610A8085FA17AF27AC513ED6A516788BF6F494B14BF340B3F2DB7988418750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno
            • String ID:
            • API String ID: 921712934-0
            • Opcode ID: d5af6d6ea47b26156d266239ed3f575210affa9fd4014044047a89da60058037
            • Instruction ID: 074fd15d959efa4ad16c962e7676329d42022f576fce894e2d30af173cc363af
            • Opcode Fuzzy Hash: d5af6d6ea47b26156d266239ed3f575210affa9fd4014044047a89da60058037
            • Instruction Fuzzy Hash: 4621F37231094049F717AF27EC513ED2A91A7887E6F094A04BF140B3F2DB798C418760
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno
            • String ID:
            • API String ID: 921712934-0
            • Opcode ID: 173280ab0a16f06b6be0f486b7fc90be9e63d45bf980aa7259864e1372d933b7
            • Instruction ID: 237ac229bd6be4199126948801346c10cc2ba1ee2faf9325665777f97d444034
            • Opcode Fuzzy Hash: 173280ab0a16f06b6be0f486b7fc90be9e63d45bf980aa7259864e1372d933b7
            • Instruction Fuzzy Hash: 5B21FF32660EC245E6157F14D8A53FD36D1A780BF1F0A4BA4AF380B3F2CA7894438360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$BuffersErrorFileFlushLast__doserrno
            • String ID:
            • API String ID: 1845094721-0
            • Opcode ID: b93863f42654a4b52d6dd73c40ccdba5987062f1c3bd463329d4bbee9e2aa4a0
            • Instruction ID: 326da59b22fbf165f7f356265b4caf59501f44d794b773a68fc40691bdf2f72c
            • Opcode Fuzzy Hash: b93863f42654a4b52d6dd73c40ccdba5987062f1c3bd463329d4bbee9e2aa4a0
            • Instruction Fuzzy Hash: 7421A4316206C24AE6157F68E8A53FD26D1EB807F0F1807B8A7150F3F2DBA994438314
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$BuffersErrorFileFlushLast__doserrno
            • String ID:
            • API String ID: 1845094721-0
            • Opcode ID: 2ecf625846f26760fb3b770c7eafe84ed63da7017f414341403592f9161424be
            • Instruction ID: c0a63ad0c55b3da5e9af5dde1c358875cc7bc34a67578c423fdc925ba2ea7be4
            • Opcode Fuzzy Hash: 2ecf625846f26760fb3b770c7eafe84ed63da7017f414341403592f9161424be
            • Instruction Fuzzy Hash: 3F21D531704A4085F7176FABA8913EE2690AF887D1F590518B7190F3FADA79C845C391
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: File$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
            • String ID: [
            • API String ID: 3163932117-4056885943
            • Opcode ID: 73e49f8ca6e268b064f541a2adff590462e5e9fe521d7392cec81c559873f1d1
            • Instruction ID: 84cfe99c4af0d35cb3cfc2eb0fddbd1e7c88438dade533f80094b9df21b2df78
            • Opcode Fuzzy Hash: 73e49f8ca6e268b064f541a2adff590462e5e9fe521d7392cec81c559873f1d1
            • Instruction Fuzzy Hash: 32310E71218A8682E750FF52E8503B6B7E1F7C47D0F504126AA8986AB5DF3CC55ACB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _set_error_mode$CriticalSection_errno$CountFileInitializeLeaveModuleNameSleepSpinfreemalloc
            • String ID:
            • API String ID: 3619412461-0
            • Opcode ID: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
            • Instruction ID: db019868a839225fa6c322e36390a704d2403c6407659659a3a0dbdcf2f17a87
            • Opcode Fuzzy Hash: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
            • Instruction Fuzzy Hash: 2C218E34720AC282F660BB50E8A43FA62E4F7847F0F0545B4A746576E2CF78C8428321
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_close_nolock_errno
            • String ID:
            • API String ID: 186997739-0
            • Opcode ID: 39692bd83cbc8bad7885e4b5d4687ea0fb49e434dd73b264a51106f0543e9273
            • Instruction ID: 3bd5a95e766387fb336d127c0c95975dcd2f35e8955c35e82fa6c97816506b8e
            • Opcode Fuzzy Hash: 39692bd83cbc8bad7885e4b5d4687ea0fb49e434dd73b264a51106f0543e9273
            • Instruction Fuzzy Hash: DF117F32A146C64AE6257F25E8A53FD36D1E7807F1F154AB4A7260B3F3DAB984438720
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$write_char
            • String ID:
            • API String ID: 1772936973-0
            • Opcode ID: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
            • Instruction ID: a14c74bd7298baa82d0e20fea488abd5e144e3651b4f0937fa9c038dca41bd6a
            • Opcode Fuzzy Hash: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
            • Instruction Fuzzy Hash: E5117932940EC286E7207F22E4203B976E4F394BE4F2844A6DF45077A2DB39DA82C741
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$write_char
            • String ID:
            • API String ID: 1772936973-0
            • Opcode ID: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
            • Instruction ID: bc193182b14a32cfd5c6e75e5b7feca31f472f4c769d7f28a11b518eb23faafc
            • Opcode Fuzzy Hash: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
            • Instruction Fuzzy Hash: E4119032625FC286E2607F62D4213E937E4F384BE0FA944A1DB54073E6DB38D9828741
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$write_char
            • String ID:
            • API String ID: 1772936973-0
            • Opcode ID: 082a03db74af1cf9bbd80cb42017acae4577966a07e222237cdd526c5155514a
            • Instruction ID: 52d97dd7007143bc4c3090bb3bf655117025ccd3f1fcc51e3636d6a506fd4299
            • Opcode Fuzzy Hash: 082a03db74af1cf9bbd80cb42017acae4577966a07e222237cdd526c5155514a
            • Instruction Fuzzy Hash: CB118C73510BD09AF722AB63A8003D936A0F39CBD4F188410FB940B7E6DBBDC8818741
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: 6c706e776ac81385c870dcad09bcf9c717d9a6faa38eacb18e293ef4a9f07b38
            • Instruction ID: 6e09cfa8d950c9bbd6620f41120edc1906cf0ec4927ae5ecd3582abc08916276
            • Opcode Fuzzy Hash: 6c706e776ac81385c870dcad09bcf9c717d9a6faa38eacb18e293ef4a9f07b38
            • Instruction Fuzzy Hash: 83117F22B18E42C6E7509B16E85672966B0FB88FE9F040238DA5ECB798CF3CDD44C744
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
            • String ID:
            • API String ID: 3421218197-3916222277
            • Opcode ID: 2d2fce262e285fa9fa2810391d16c93d7bb5af68b546423bde804a28fab8f9c8
            • Instruction ID: c983f394c5f1e3d718021007a8ed6e0ab179daa0d06a8c34500e0bca455e32cb
            • Opcode Fuzzy Hash: 2d2fce262e285fa9fa2810391d16c93d7bb5af68b546423bde804a28fab8f9c8
            • Instruction Fuzzy Hash: BF012C32614BC686DB609B24F85479AB7E0F7847D0F600225E78A47B78DF3CC14ACB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
            • String ID:
            • API String ID: 4202892810-0
            • Opcode ID: e6c73dd4b36f160f1a62fbf4a0c0e9ac1c0c35662008cd925dc09f0461ab862e
            • Instruction ID: bf0ceee8b68c13c0be624537bfe390abd0dac3eddc6d5cca93c4fca63a634a49
            • Opcode Fuzzy Hash: e6c73dd4b36f160f1a62fbf4a0c0e9ac1c0c35662008cd925dc09f0461ab862e
            • Instruction Fuzzy Hash: A7111231214AC682E750AF51F814BAA77A0F788BE5F544220DB5A47B74CF7CC54ACB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$_amsg_exit
            • String ID: MOC$RCC$csm
            • API String ID: 2610988583-2671469338
            • Opcode ID: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
            • Instruction ID: 0009083a8ee5226ce785d57f40fd3257dfe9c6ab3fc7de46ff2f8f2fbd958937
            • Opcode Fuzzy Hash: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
            • Instruction Fuzzy Hash: EAF09B35510586C5EB153B50806A3FC31D4FB947F9F85D5F58360423E2C7FC54828A62
            APIs
              • Part of subcall function 00007FF665BB2530: GetProcAddress.KERNEL32 ref: 00007FF665BB25D0
              • Part of subcall function 00007FF665BB2530: GetProcAddress.KERNEL32 ref: 00007FF665BB25E7
              • Part of subcall function 00007FF665BB2530: GetProcAddress.KERNEL32 ref: 00007FF665BB25FE
              • Part of subcall function 00007FF665BB2530: GetProcAddress.KERNEL32 ref: 00007FF665BB2615
              • Part of subcall function 00007FF665BB2530: GetCurrentProcess.KERNEL32 ref: 00007FF665BB2630
              • Part of subcall function 00007FF665BB2530: OpenProcessToken.ADVAPI32 ref: 00007FF665BB265C
              • Part of subcall function 00007FF665BB2530: GetTokenInformation.ADVAPI32 ref: 00007FF665BB2688
              • Part of subcall function 00007FF665BB2530: GetTokenInformation.ADVAPI32 ref: 00007FF665BB26BC
              • Part of subcall function 00007FF665BB2530: GetLengthSid.ADVAPI32 ref: 00007FF665BB26CC
              • Part of subcall function 00007FF665BB2530: CopySid.ADVAPI32 ref: 00007FF665BB26EA
            • LocalFree.KERNEL32 ref: 00007FF665BB07E0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc$Token$InformationProcess$CopyCurrentFreeLengthLocalOpen
            • String ID: .bat$.cmd$.com$.exe$.pif
            • API String ID: 3463338316-2292669753
            • Opcode ID: a4ee9e539fb5e06da0ce4f5bc97e58f13e50c77d53f1c576658f6c62b7bba354
            • Instruction ID: 4b4270117d2e3ae54697b916b64a818f83ccd118d3723e1f95df864c00396e95
            • Opcode Fuzzy Hash: a4ee9e539fb5e06da0ce4f5bc97e58f13e50c77d53f1c576658f6c62b7bba354
            • Instruction Fuzzy Hash: 3BF18F72A09746CAF7109F24D9962BDB7B0EB49B58F048130DA49CB6E8DF7CE945CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$_amsg_exit_errno_getptd$FreeHeapSleep_lockmalloc
            • String ID:
            • API String ID: 2578750445-0
            • Opcode ID: e138ac5090ec4416d4897549da0a5f525d7f7cb45f4804d148dbd1b226c4d310
            • Instruction ID: 0e591f92b744082badca280c7c83663daab847f02ee4b8a2c4c949a31bcc18c2
            • Opcode Fuzzy Hash: e138ac5090ec4416d4897549da0a5f525d7f7cb45f4804d148dbd1b226c4d310
            • Instruction Fuzzy Hash: 0751A17620564086E762AB22E4803EDB7A1F788BD9F544116FB5A4F3F6CB39C842C751
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseCreateHandleThread$CurrentEvent
            • String ID:
            • API String ID: 1633135894-0
            • Opcode ID: 9c8cad1299e0c9272d8f2c6ec9908b311088d7a55ff6301e464786220b0a3468
            • Instruction ID: 213e82a22bd89a2e9f597797790ea7c4041c9e08151c8bc4ba3de22188e4da00
            • Opcode Fuzzy Hash: 9c8cad1299e0c9272d8f2c6ec9908b311088d7a55ff6301e464786220b0a3468
            • Instruction Fuzzy Hash: 3051B272E18A82C5EB249B01E8666787372FB99F51F455236C51E8B6E4CF3DEC81C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: DecodePointer$ExitProcess
            • String ID:
            • API String ID: 1284615037-0
            • Opcode ID: 95cc4c190d7943855aadbb998e58200c754987734139fa49f6c9bfbe4b09495d
            • Instruction ID: 8bf4ea44ab5c67754fc2841c874a7593994590936d550a6873d21e76407201d3
            • Opcode Fuzzy Hash: 95cc4c190d7943855aadbb998e58200c754987734139fa49f6c9bfbe4b09495d
            • Instruction Fuzzy Hash: 26414831212AC281EA50BF11EC903B966E8F798BE4F5405B59B9D47BB5EF38C493C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$Heapmalloc$AllocFree_callnewhfree
            • String ID: d$d$d
            • API String ID: 4257515785-1898527202
            • Opcode ID: 5ac4ee45e769e9299644d6e5f03c679bef95057c7f94c81e09fa81b34d444265
            • Instruction ID: dc539c7218604c8467400093890ddcbbf3e5332f42643b797682f6eae7018db0
            • Opcode Fuzzy Hash: 5ac4ee45e769e9299644d6e5f03c679bef95057c7f94c81e09fa81b34d444265
            • Instruction Fuzzy Hash: DF413932111B91C5E791AF21E4403AD3BE8F348F98F49823ADB88477A8EF74C455CB60
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$Heapmalloc$AllocFree_callnewhfree
            • String ID: d$d$d
            • API String ID: 4257515785-1898527202
            • Opcode ID: 139d26f97f34ddb1c5a07088b983959269428ee9dd4b95dd2124b1124372c8c0
            • Instruction ID: d29088961ef00acf912362f415a2a07d24d89ebe10ac030ae935663d51a80c72
            • Opcode Fuzzy Hash: 139d26f97f34ddb1c5a07088b983959269428ee9dd4b95dd2124b1124372c8c0
            • Instruction Fuzzy Hash: 35410872511B90C5E741CF26E44039D3BA9F748F88F59813AEB88577A8EF79C454CB50
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$FreeHeap_errnofreefreeaddrinfogetaddrinfohtons
            • String ID:
            • API String ID: 443883550-0
            • Opcode ID: fda43265b886c102daf43b2b617a422d89d82c2805bd548c61f079e8a940deb0
            • Instruction ID: 6667aff9388ba7ff7c131cfc79d8997402f468c34f0d43de4b8e6d3e627d1a7d
            • Opcode Fuzzy Hash: fda43265b886c102daf43b2b617a422d89d82c2805bd548c61f079e8a940deb0
            • Instruction Fuzzy Hash: 94319F72204B8682EA61AF11E4903FA73E5F788BD4F044671DB8E47764EF38C546CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$FreeHeap_errnofreefreeaddrinfogetaddrinfohtons
            • String ID:
            • API String ID: 443883550-0
            • Opcode ID: 00ece6ab9261076df4cc1799edf66469b6af6a1b3b7ff64bccd036ea6a0b3bd2
            • Instruction ID: e1613d0920d85c40ef77f3643be714907899ebaa00d759c67aefd3a584b55e4e
            • Opcode Fuzzy Hash: 00ece6ab9261076df4cc1799edf66469b6af6a1b3b7ff64bccd036ea6a0b3bd2
            • Instruction Fuzzy Hash: 01314DB2304A4586EA26DB67A4403AA73A2FB8DB84F048126FB8D577A4DE38C555CB41
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: EventReset$ObjectSingleTimeWait_errno_invalid_parameter_noinfotime
            • String ID:
            • API String ID: 2413556668-0
            • Opcode ID: 58d5c98b484be63242f2a745b5d15b4acce531cbd3b6e134beeab50c125b9f3c
            • Instruction ID: b131b14fc6332b8e9dc853b91f74492a8fbf94d1d957a30cf4b2f8ed933273ed
            • Opcode Fuzzy Hash: 58d5c98b484be63242f2a745b5d15b4acce531cbd3b6e134beeab50c125b9f3c
            • Instruction Fuzzy Hash: 3731E936204A8186DB50AF25E4543A977E4FB89FA9F588671EF8D8B364CF38C446D710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: EventReset$ObjectSingleTimeWait_errno_invalid_parameter_noinfotime
            • String ID:
            • API String ID: 2413556668-0
            • Opcode ID: 09b971a88ccd1b78b33bbcbee9b1c9d3543779880420764c2a79a4a22bbaeadb
            • Instruction ID: 1364dac6d496d361330617d9c03f8f88c0092d4945388265d16f681336e5f9e4
            • Opcode Fuzzy Hash: 09b971a88ccd1b78b33bbcbee9b1c9d3543779880420764c2a79a4a22bbaeadb
            • Instruction Fuzzy Hash: C431E236204A8096DB52DF2AE8443AD73A0FB89B98F584522EF8E8B365CF39C445D710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
            • String ID:
            • API String ID: 517548149-0
            • Opcode ID: 84a5488434b8dac386b9b2b17d419ada68844002088eb87c8cee20c73c3e860a
            • Instruction ID: beddb2d6ecef8b541714e523d9e7d01c79d459e3aaa1224670de334b3626ce05
            • Opcode Fuzzy Hash: 84a5488434b8dac386b9b2b17d419ada68844002088eb87c8cee20c73c3e860a
            • Instruction Fuzzy Hash: F5215132605BC586EB64AF21A4506AA77E5F788FE1F484174EF8A07764EF38C452C704
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalDeleteSection$CloseCurrentErrorHandleLastObjectSingleThreadWaitfree
            • String ID:
            • API String ID: 3850363221-0
            • Opcode ID: 62b29d53877b0602228696265d4c3e16b8dba605d7c938668be82d41532a3494
            • Instruction ID: 5980006ded8fd526fbb6dd57df24641f86f0b1c86cdfc44ef9cde6ae2f375159
            • Opcode Fuzzy Hash: 62b29d53877b0602228696265d4c3e16b8dba605d7c938668be82d41532a3494
            • Instruction Fuzzy Hash: 41312732201BC2A6EB09BB64E8946A973A4FB857B0F540775D769876B5DF38C866C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalDeleteSection$CloseCurrentErrorHandleLastObjectSingleThreadWaitfree
            • String ID:
            • API String ID: 3850363221-0
            • Opcode ID: 7ba8627e587de6b2ba61bc9eb102c82484e8b1aae736127abcd4623862191482
            • Instruction ID: 67a5c3439ddd4552bc3a77a1c279a0a7cdb83c7ad9308d4ebcabeb83fd366356
            • Opcode Fuzzy Hash: 7ba8627e587de6b2ba61bc9eb102c82484e8b1aae736127abcd4623862191482
            • Instruction Fuzzy Hash: 33317A36205B8092EB06EB66F8843A973A4FB897A1F540625E76D472F1DF78C864C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastValue$CurrentSleepThreadfree
            • String ID:
            • API String ID: 4106700288-0
            • Opcode ID: 57c3c7dc90d119b9a0a8397eb99df9ec0dc69960eb39fbd81eb1c175a554dc43
            • Instruction ID: 28c17e85f8d9f492ec0527619b4a22b62c7b696fee3c585e1ab80d48ff0bdc27
            • Opcode Fuzzy Hash: 57c3c7dc90d119b9a0a8397eb99df9ec0dc69960eb39fbd81eb1c175a554dc43
            • Instruction Fuzzy Hash: BE017134211BC386EB14BB65E4646F863D5AB88BF0F588674DB26063F1EE3CE4068210
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$CallTranslator_amsg_exit
            • String ID: MOC$RCC
            • API String ID: 1374396951-2084237596
            • Opcode ID: 471e037796de8d08be6d3bded12a618713ec4ce7d55a937e88732922ae4a25f6
            • Instruction ID: be80841abc372460f8c2b024911053a48a13620d96e3b791ca6425a699478734
            • Opcode Fuzzy Hash: 471e037796de8d08be6d3bded12a618713ec4ce7d55a937e88732922ae4a25f6
            • Instruction Fuzzy Hash: 2D617072614EC28ADE20EB15E0A43FDB3A0FB84BE8F444575DB9A477A9DB78C552C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free
            • String ID:
            • API String ID: 1294909896-0
            • Opcode ID: ccd28d9b9f54d451765389d19c9094d133687f5c0172ac4b6804d316aded8f02
            • Instruction ID: 56e572cb250ff0c837694ffad19a3d148e91fe88eb762acb76f6e6a7d1d770fa
            • Opcode Fuzzy Hash: ccd28d9b9f54d451765389d19c9094d133687f5c0172ac4b6804d316aded8f02
            • Instruction Fuzzy Hash: F7511636212F8685EAA5AF19E5903BCB3A4F748FD4F589561CB8D17364DF78D8A2C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free
            • String ID:
            • API String ID: 1294909896-0
            • Opcode ID: 0aac6f5110e6aeb601139c822595bec6a4ddb6e548ab8dd50ca83694b2f49f67
            • Instruction ID: 3e660e62738f3ee9a5dfa17730c970adb7624ae7e4a7d26a5058a80d1f6bedcf
            • Opcode Fuzzy Hash: 0aac6f5110e6aeb601139c822595bec6a4ddb6e548ab8dd50ca83694b2f49f67
            • Instruction Fuzzy Hash: 7451E5B6202B84C5DA56DF2AF5503A973A6FB1CBC0F589126EB4D13364DF38D8A1C310
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
            • String ID:
            • API String ID: 3655708593-3916222277
            • Opcode ID: 7b09e1906ab3bdf61c4e12b63eeb87704bb182e1eae830b71b365cf9be8a9ed8
            • Instruction ID: b6c8cfbbc216d04a52d7f137254639499b6bf9cb02d52035fa3b20d7afe03384
            • Opcode Fuzzy Hash: 7b09e1906ab3bdf61c4e12b63eeb87704bb182e1eae830b71b365cf9be8a9ed8
            • Instruction Fuzzy Hash: 7C418072600A8285EB28AF29E4513BD36D0E794BF4F244375DB654B3F5DA34C853C7A0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo
            • String ID: P
            • API String ID: 2819658684-3110715001
            • Opcode ID: fe5746ab5c6c9aa6f367b9778bf255be9a480a7c147ea7114c03037db45542f8
            • Instruction ID: baeefaf5d818ad1c244464c944f92a19604fcc87de566f771405c8828e4456c0
            • Opcode Fuzzy Hash: fe5746ab5c6c9aa6f367b9778bf255be9a480a7c147ea7114c03037db45542f8
            • Instruction Fuzzy Hash: 8F2124312057C281FA51BA51A6103F9B2E4EB56BF0F0847B09F740FBFAD678C8428760
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo
            • String ID: P
            • API String ID: 2819658684-3110715001
            • Opcode ID: 0230ee96ae0ff30fdb3c69ccc9da7842eeea73fbececacfcfb5d99c022919653
            • Instruction ID: 9616486910279e0854492c662b486f7afc1de014b20fbd43661b6f412423302b
            • Opcode Fuzzy Hash: 0230ee96ae0ff30fdb3c69ccc9da7842eeea73fbececacfcfb5d99c022919653
            • Instruction Fuzzy Hash: 522127B1209BC042FA778A5799503D9A290BB5C7F0F484621BF751FBE6E77AC941C301
            APIs
            • GetCurrentThreadId.KERNEL32 ref: 00007FF665B72961
            • SetWindowsHookExW.USER32 ref: 00007FF665B72978
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF665B71B41), ref: 00007FF665B7298E
              • Part of subcall function 00007FF665B49F50: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF665B49F89
              • Part of subcall function 00007FF665B49F50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF665B49FE7
              • Part of subcall function 00007FF665B49F50: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF665B4A03E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast$CurrentFormatFreeHookLocalMessageThreadWindows
            • String ID: Qt: INTERNAL ERROR: failed to install GetMessage hook: %d, %s$default
            • API String ID: 2698278626-1575284884
            • Opcode ID: 029406882346d2b61cdb6a24368e8540b4e24a0623796e7308a3d706647215fa
            • Instruction ID: 2ecfea56de4e64af60218afa83152e2f87af4c0b34225c89a2883d0299978229
            • Opcode Fuzzy Hash: 029406882346d2b61cdb6a24368e8540b4e24a0623796e7308a3d706647215fa
            • Instruction Fuzzy Hash: A2319532A05B42C6EB208B25E8926697370FB8AB64F544235D95DCB6A9EF3CEC45C700
            APIs
            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000), ref: 00007FF665BB28CE
            • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000), ref: 00007FF665BB28EA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressProc
            • String ID: NetApiBufferFree$NetShareEnum$Netapi32
            • API String ID: 190572456-1465082781
            • Opcode ID: 9bb911bc9721b275ddb24e47c19060044229378845a87b2b70f2b0579deb2b24
            • Instruction ID: 43d12fe6fa2850c9bac1b803aa29e5d59970c292522ae2969756b03a142bfcfb
            • Opcode Fuzzy Hash: 9bb911bc9721b275ddb24e47c19060044229378845a87b2b70f2b0579deb2b24
            • Instruction Fuzzy Hash: BA31DA21E1DB46C4FA669B14EC67379A2B1AF4AF64F581334D5ADCD2E1DF6CAC80C204
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$ExceptionRaise_amsg_exit
            • String ID: csm
            • API String ID: 4155239085-1018135373
            • Opcode ID: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
            • Instruction ID: bb12e1cb4438aa05cba277faaef85fca26df44d33916c70893a54c1c33ff10c4
            • Opcode Fuzzy Hash: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
            • Instruction Fuzzy Hash: 3F314D36204A8286EA30EF11E0547EE73A4F7857F5F444275DFAA07BA2CB39D846CB10
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF665C2DF32
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF665C2DEAF,?,?,?,00007FF665C35656), ref: 00007FF665C2DFF0
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF665C2DEAF,?,?,?,00007FF665C35656), ref: 00007FF665C2E07A
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2210144848-0
            • Opcode ID: 4ef2423508507acd93b22b965fa9d9501701fcc0e2be0087648db0337b251196
            • Instruction ID: 0db8cd25f705f546522f3ef445f571d4601ffd23a51d5c94551cf3021165909d
            • Opcode Fuzzy Hash: 4ef2423508507acd93b22b965fa9d9501701fcc0e2be0087648db0337b251196
            • Instruction Fuzzy Hash: 24819C33A18653C5FB509B65C8426B927B1BB54F84F446239DA0EAF796DF38AC42C310
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$_amsg_exit_errno_getptd$FreeHeapSleepmalloc
            • String ID:
            • API String ID: 3974019375-0
            • Opcode ID: 9d71ec3d00ad548f00efd10b57eac8e9f1b01416729eb742b15b8c3336629385
            • Instruction ID: 3e152dfcf77f2e7d48e6cfd6a38e6c1fe2af68ae92db77edaca1b645bbc96a93
            • Opcode Fuzzy Hash: 9d71ec3d00ad548f00efd10b57eac8e9f1b01416729eb742b15b8c3336629385
            • Instruction Fuzzy Hash: FA519B36600BC286E764BB65E4A03F977E5F788BE4F1441A6DB9A573B6CB78C4438300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
            • String ID:
            • API String ID: 2574049805-0
            • Opcode ID: 358c0b6ca0646f531c2cf5f9b0775408b047eeeca838f4ff74856cac89f43e4e
            • Instruction ID: bc7cf165727bea5250688e8ad9c41d632b8f27d5c6250d5af5f72457c52bc469
            • Opcode Fuzzy Hash: 358c0b6ca0646f531c2cf5f9b0775408b047eeeca838f4ff74856cac89f43e4e
            • Instruction Fuzzy Hash: 6241D0B2210B8486EB6ADF2AE8513EC37A4E78CBD4F144215FB69573E6DB34C851C780
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLast
            • String ID: Main
            • API String ID: 1452528299-521822810
            • Opcode ID: 1c761e1382f4f4e8e21a5771b2742fd4ded768315d8239df106d7014fd1f2ec6
            • Instruction ID: f0ca3e6d8baab12edfa6743e89bb87527ab9954bc2c0168b66283b85268458bc
            • Opcode Fuzzy Hash: 1c761e1382f4f4e8e21a5771b2742fd4ded768315d8239df106d7014fd1f2ec6
            • Instruction Fuzzy Hash: E1417B72A00A86CAEB54AF11E4447BD73E0F748BE8F444275DB89477A8DB38E852CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastRead$mallocrealloc
            • String ID:
            • API String ID: 3638135368-0
            • Opcode ID: 75ed8e998ff67cc508f611bcc8a92760ada60573c1da8e9bb44137df954cd51e
            • Instruction ID: 93d0f8f26e57c61e54960f00a7551130f7a8d0f018c631c07a6a10a1e470386a
            • Opcode Fuzzy Hash: 75ed8e998ff67cc508f611bcc8a92760ada60573c1da8e9bb44137df954cd51e
            • Instruction Fuzzy Hash: 77416B36201BC18BEB21AF56E4507AAB3E0FB48BE4F084565DF8A47765DF38E446C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide$StringTypefreemalloc
            • String ID:
            • API String ID: 307345228-0
            • Opcode ID: f3b033eb96f0b46acd52094bac7bcbe4840888fbf3d9e53257aca99f9f803477
            • Instruction ID: cc52c05c31ad58ad77660079f0a201a8b51175628b457c82467a44fa9858d218
            • Opcode Fuzzy Hash: f3b033eb96f0b46acd52094bac7bcbe4840888fbf3d9e53257aca99f9f803477
            • Instruction Fuzzy Hash: 75418032B10BC18AEB10AF2698006E967D5FB44BF8F584765EF294B7E4DB38C4028304
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Timer$Init_thread_footerKillMessagePostQueueStatus
            • String ID:
            • API String ID: 1136730382-0
            • Opcode ID: 2a1125463b9bebcfd2710457b2660daa4214678dcf78bf51705dfbb01ba5d737
            • Instruction ID: 7b8946c0e22ce2375eb7058c13e31aa3e6c2b040dc616bc41cdcf6eea21d7ca7
            • Opcode Fuzzy Hash: 2a1125463b9bebcfd2710457b2660daa4214678dcf78bf51705dfbb01ba5d737
            • Instruction Fuzzy Hash: B3416D36A08A82C6E7648F25E4567A973B0FB4AF94F544039CE0DCB698DE3CEC858714
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$_errno$AllocCreateHeapObjectSection_callnewhmalloc
            • String ID:
            • API String ID: 2034203143-0
            • Opcode ID: d3222581a7554e5581b8cf39a13de11888295550bf7cb58ccf28f3286197a644
            • Instruction ID: 4665e2bc2624fdf3c982e2f77d5d89714592757ddf396721087622a67f4ef633
            • Opcode Fuzzy Hash: d3222581a7554e5581b8cf39a13de11888295550bf7cb58ccf28f3286197a644
            • Instruction Fuzzy Hash: E2315332605AC146EB2ABF22D4003FAA6E8FB88BE4F4885759F4947775EF78D4128700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ErrorLastlstrlen
            • String ID:
            • API String ID: 3322701435-0
            • Opcode ID: db64cf0f651dc086ab79881f73d20ca8596acb5f99de422b62a97399abafdd11
            • Instruction ID: 6a6b501e280d4b907aad8cb9c090c62947c27da0d5b70be4ba65f2254a2468f1
            • Opcode Fuzzy Hash: db64cf0f651dc086ab79881f73d20ca8596acb5f99de422b62a97399abafdd11
            • Instruction Fuzzy Hash: EB318432704B8282E710AF56B48469BB7E5FB98BD4F184225ABC943B78CF3CC556C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ErrorLastlstrlen
            • String ID:
            • API String ID: 3322701435-0
            • Opcode ID: 5829725774077b7fe8e0868bd518cdc73ec5ce624404894a5e405c976afc8b2f
            • Instruction ID: 9e2f093d1824343bfdb86d089c484915bbbe08d1bcaa3bd202c419cb73c5e1be
            • Opcode Fuzzy Hash: 5829725774077b7fe8e0868bd518cdc73ec5ce624404894a5e405c976afc8b2f
            • Instruction Fuzzy Hash: BE315A72604B8182E711DF67B58078AB7A9FB9CBC4F184125ABC957B79CF3CC5558B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
            • String ID:
            • API String ID: 3456427917-0
            • Opcode ID: 79c14e7db4d2e84cf453b14f21dc6eac39ded45f04e70965ea2fc96844330a76
            • Instruction ID: 7a4bfa217931f394853c4bc686635b2e57907029a27e9be4760d9c40207c2430
            • Opcode Fuzzy Hash: 79c14e7db4d2e84cf453b14f21dc6eac39ded45f04e70965ea2fc96844330a76
            • Instruction Fuzzy Hash: 51318636624A8589E750EF25E4112EFB7B5F7853D8F005265FF491AB68EF38C442CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
            • String ID:
            • API String ID: 513674450-0
            • Opcode ID: 7dd9ea1c87e4549bff250d1b923e95236c2df90eb6d5819fd71ae98f73500695
            • Instruction ID: 0d8db089931ba36164e222e020e24f298e21274643f6d2026ef6a543aff101a0
            • Opcode Fuzzy Hash: 7dd9ea1c87e4549bff250d1b923e95236c2df90eb6d5819fd71ae98f73500695
            • Instruction Fuzzy Hash: 0E313036310AC29AEB24DF35E8507E933E8F748B98F4841669E4A8B754DF38D656C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
            • String ID:
            • API String ID: 1909145217-0
            • Opcode ID: 17991c27d76004656ba42ca55b295eb408c37ea0a9db000b327a412a6d1edf3e
            • Instruction ID: 682299678c155cdbc39eef8f1a1110277e67e985439c34ddcd0b29a910f97146
            • Opcode Fuzzy Hash: 17991c27d76004656ba42ca55b295eb408c37ea0a9db000b327a412a6d1edf3e
            • Instruction Fuzzy Hash: 4B216D39302AC681EE10BB52F9542B9A3D5B748BE0F544475DF4E1B774EE78C056C300
            APIs
            • DecodePointer.KERNEL32(00000000,?,?,000000014000DD75,?,?,?,?,000000014000C3DF), ref: 000000014000DC89
            • DecodePointer.KERNEL32(?,?,000000014000DD75,?,?,?,?,000000014000C3DF,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000DC99
              • Part of subcall function 0000000140013150: _errno.LIBCMT ref: 0000000140013159
              • Part of subcall function 0000000140013150: _invalid_parameter_noinfo.LIBCMT ref: 0000000140013164
            • EncodePointer.KERNEL32(?,?,000000014000DD75,?,?,?,?,000000014000C3DF,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000DD17
              • Part of subcall function 000000014000F250: realloc.LIBCMT ref: 000000014000F27B
              • Part of subcall function 000000014000F250: Sleep.KERNEL32(?,?,?,00000000,000000014000DD07,?,?,000000014000DD75,?,?,?,?,000000014000C3DF), ref: 000000014000F297
            • EncodePointer.KERNEL32(?,?,000000014000DD75,?,?,?,?,000000014000C3DF,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000DD27
            • EncodePointer.KERNEL32(?,?,000000014000DD75,?,?,?,?,000000014000C3DF,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000DD34
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
            • String ID:
            • API String ID: 1909145217-0
            • Opcode ID: 54459d427933311d3a5c3208d054d81af71c97b01693f1a9eb3f7a4da65edfea
            • Instruction ID: 8247cf1f62f7df82403f5901ba5e1a2614e6b16f482c9c990dfd3856083622c0
            • Opcode Fuzzy Hash: 54459d427933311d3a5c3208d054d81af71c97b01693f1a9eb3f7a4da65edfea
            • Instruction Fuzzy Hash: 1D21F875205A8481EE06DB53F9483E9A3A1B78DBD0F444826EF4E4B775EA78D445D300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastgetpeernamegetsocknamehtonslstrlen
            • String ID:
            • API String ID: 1560998626-0
            • Opcode ID: c734a573ce7dfaef318db430d04840a229c3ced714760d5c3b5a73f40af316d9
            • Instruction ID: dd21a321e5a31f983a51078ec38ecda4729626420779a1f594089119b0e3bb36
            • Opcode Fuzzy Hash: c734a573ce7dfaef318db430d04840a229c3ced714760d5c3b5a73f40af316d9
            • Instruction Fuzzy Hash: 36217C32204B82C6EB60AF15E4842BD77E0F788BE0F540275EB8987BA4DB38C456CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: 1aa11bdb4510720bd8ad46d36d805cf89cd9d24c8924a76da2260b9335f5542b
            • Instruction ID: 0d6e6a1405620ce8f1cb03b2162d020d26ebc6366eb20dbe7c595ff809633cde
            • Opcode Fuzzy Hash: 1aa11bdb4510720bd8ad46d36d805cf89cd9d24c8924a76da2260b9335f5542b
            • Instruction Fuzzy Hash: 95211636711B4186EB98EF66E840668B3E9FF88FE4F148265CE4947A68CF38C556C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2067211477-0
            • Opcode ID: 9f3bf3b611a25fd9af20a1efec53b308f414e593c4ce8467026b1375e3291df5
            • Instruction ID: efe71aaf1fec5184b232b02664430eaa7999ba9e58ebc8b8738e838cce6d56d3
            • Opcode Fuzzy Hash: 9f3bf3b611a25fd9af20a1efec53b308f414e593c4ce8467026b1375e3291df5
            • Instruction Fuzzy Hash: 7821382BA09B42C6EF14DF65E41297AA2B1AF94F84F085439DE4D8BB59DF3CE8048610
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: b438fef95e9de4e192e54f68da003bfb06ab1a0320ce8f8e52a96597e9ab0918
            • Instruction ID: 5e7131053352056950238d0109766d77b65e5a9c676b8112c150688de36943cf
            • Opcode Fuzzy Hash: b438fef95e9de4e192e54f68da003bfb06ab1a0320ce8f8e52a96597e9ab0918
            • Instruction Fuzzy Hash: 0011C473E1CA0B85F6581168D49337907B16F94B70E08067CE96E8E2EACE7EAC41C540
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ObjectSelect$ColorCompatibleCreateDeleteTable
            • String ID:
            • API String ID: 3899591553-0
            • Opcode ID: 8947a06e24e96cbb16fea5535f0303150291ac82d5cc01e71dd39e0745be825e
            • Instruction ID: 6b5db41d4366d355ee2674d0b4801053270097bb27fd9560e49f941e2428777d
            • Opcode Fuzzy Hash: 8947a06e24e96cbb16fea5535f0303150291ac82d5cc01e71dd39e0745be825e
            • Instruction Fuzzy Hash: 2A218135200A4189EB59AF25E8507B933A4FB94BE4F205264DB8A57768CF35C482C780
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 1f6a9fb51c2b84da157e2e3cd1e1033ba792cdd02042b8f3db644f72fc9350c0
            • Instruction ID: 407518be200521dbf29a51130307b64f3af97e95903b1c1821a5df37d15e3f4d
            • Opcode Fuzzy Hash: 1f6a9fb51c2b84da157e2e3cd1e1033ba792cdd02042b8f3db644f72fc9350c0
            • Instruction Fuzzy Hash: 6711033662498183EB91AB21F4947ED63A0F7487A5F941171DB9B86A70DF3CE4C7C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 27a275d43472adae5db1faaa78edeb7c575d29a0cdd8bd5440967adc4db77422
            • Instruction ID: 3c9fda6647c770e7f41cf7310115e834e4dccbf0fe0fd89ca614509f88be52cc
            • Opcode Fuzzy Hash: 27a275d43472adae5db1faaa78edeb7c575d29a0cdd8bd5440967adc4db77422
            • Instruction Fuzzy Hash: 2C11FB76624A8083EBA1DB22F4943E963A0F75C7D1F441021EB8B47A70DF7DD88AD700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
            • String ID:
            • API String ID: 1445889803-0
            • Opcode ID: 087ee9406ee3a35d804722b5ad4831615591c4c9cb0efb3c3ae35d0179c68e7c
            • Instruction ID: cb4e223bbf5267da2768d0d2651cae5e3df36390bd426eaf7ae569ec413372f9
            • Opcode Fuzzy Hash: 087ee9406ee3a35d804722b5ad4831615591c4c9cb0efb3c3ae35d0179c68e7c
            • Instruction Fuzzy Hash: FC016D31265A8586EB50AF21F8507A663A0F789BE1F546630EF5A4B7B0CA38C8968300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: __doserrno_errno
            • String ID:
            • API String ID: 921712934-0
            • Opcode ID: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
            • Instruction ID: 45bfa7136a2fced76c379152fabd5f4285f17e40eddb8c0a94d4e635b01bbe4f
            • Opcode Fuzzy Hash: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
            • Instruction Fuzzy Hash: 6D018176A14AC644EA253B24D4E13FC36D1DB90BF1F508BA5D7290B3F2DA6C54438220
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandleObjectSingleWait$Sleep
            • String ID:
            • API String ID: 91029115-0
            • Opcode ID: cc26c8d3f1758e817df8cd61288522319ca12ee63bbcc221306e2d6998ed2d79
            • Instruction ID: ce7a241355de95de9d233c9454c967dcad5972765cc3f42e4a70d4f715d60daf
            • Opcode Fuzzy Hash: cc26c8d3f1758e817df8cd61288522319ca12ee63bbcc221306e2d6998ed2d79
            • Instruction Fuzzy Hash: 7E01A836600A8481E742DB6AD8543682361FBCCF99F184121DF6E4B3B5CF35C486D321
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressCriticalEnterInit_thread_footerProcSection
            • String ID: SHGetKnownFolderPath$shell32
            • API String ID: 3050242151-1045111711
            • Opcode ID: 2781453f8c16aefac335e9e8166fe62accc3f6a5c6ed498f4cfd73c8d39d4c5b
            • Instruction ID: 3ddd45e442c86281072a6ffc5c902be3fbd9fef2d4de9806a6e48893780db674
            • Opcode Fuzzy Hash: 2781453f8c16aefac335e9e8166fe62accc3f6a5c6ed498f4cfd73c8d39d4c5b
            • Instruction Fuzzy Hash: 95516032609A82C6E760DB15E85236973B0FB89B94F444235D69ECB7D5DF3CE841CB04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_fltout2_invalid_parameter_noinfo
            • String ID: -
            • API String ID: 485257318-2547889144
            • Opcode ID: 3ee52a3a24785a7fc091806b0d958f2a81b7a6cfbcf0ce8e670c4bd10c065dff
            • Instruction ID: 72d58b188400b415ee33be4782b4784bf0c93d285c053e7f0e8bcaad983cedd4
            • Opcode Fuzzy Hash: 3ee52a3a24785a7fc091806b0d958f2a81b7a6cfbcf0ce8e670c4bd10c065dff
            • Instruction Fuzzy Hash: 3A31E832304BC585EA20AA25A4507FAB7E0A745BF4F144272EF9887BE6DF3DC446C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_fltout2_invalid_parameter_noinfo
            • String ID: -
            • API String ID: 485257318-2547889144
            • Opcode ID: 46aa22e80ba2c5872934a94fab64ff225dd37f18d0849ec0e39a5d0deea4399a
            • Instruction ID: def011c6f922c7a676358efa653782ba532edafc4f7f681bdd91da2884b7ca77
            • Opcode Fuzzy Hash: 46aa22e80ba2c5872934a94fab64ff225dd37f18d0849ec0e39a5d0deea4399a
            • Instruction Fuzzy Hash: CC31C83231468485EB229B27B4407DAB7A1A749BD4F544216FFD90BBE9DF3AC445CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo
            • String ID: 1
            • API String ID: 2819658684-2212294583
            • Opcode ID: e42cd22b66c2c710ae5e79c5bbbebf2e77b3ed4b785cd6836f41a57508a0d04c
            • Instruction ID: aea89f9280e980084d295df1ce8ca73ef5c68eec7e57a7eb71cf8e2341e66c71
            • Opcode Fuzzy Hash: e42cd22b66c2c710ae5e79c5bbbebf2e77b3ed4b785cd6836f41a57508a0d04c
            • Instruction Fuzzy Hash: 85219532215AC645F767BF24C4503FC6AE4DB05BD0F99C5B197460A3A3D62A8942C711
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo
            • String ID: 1
            • API String ID: 2819658684-2212294583
            • Opcode ID: 2f43f88bbe1bd91cc7cb3feb409fd4a14cd55f5ebcee323893c0bc387f0fb5b9
            • Instruction ID: 126ecb6a4ed584294f16de81e492ef384a4af089c2fc3c42b76c2b9d46fd1270
            • Opcode Fuzzy Hash: 2f43f88bbe1bd91cc7cb3feb409fd4a14cd55f5ebcee323893c0bc387f0fb5b9
            • Instruction Fuzzy Hash: 9621FF732186C495F77B8B2A88103ED6A98A70CBC0F99C411BF460F2A3E63B8A41C711
            APIs
            Strings
            • %s: CreateWindow() for QEventDispatcherWin32 internal window failed, xrefs: 00007FF665B73539
            • struct HWND__ *__cdecl qt_create_internal_window(const class QEventDispatcherWin32 *), xrefs: 00007FF665B73532
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Window$CreateInit_thread_footerLong
            • String ID: %s: CreateWindow() for QEventDispatcherWin32 internal window failed$struct HWND__ *__cdecl qt_create_internal_window(const class QEventDispatcherWin32 *)
            • API String ID: 2938593978-1541743766
            • Opcode ID: eda67fbf92e630d0c72160588c332b7d3a44e1f2591f00d15a80d56d91615364
            • Instruction ID: e686abd5b9e9058d295705fd092cce27f2c1db57f1f4a09fe0fb8906c00a92ef
            • Opcode Fuzzy Hash: eda67fbf92e630d0c72160588c332b7d3a44e1f2591f00d15a80d56d91615364
            • Instruction Fuzzy Hash: 03114832A18695C2E6518F29F45101EA7B0FB49FA4B540235EB9D87BE9DF3CD9818B40
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID:
            • String ID: QT_FATAL_CRITICALS$QT_FATAL_WARNINGS
            • API String ID: 0-1785144594
            • Opcode ID: 31495e7dcf0985454016301e3335c3f448df0f4c99aa0aa242f01e66ea667f80
            • Instruction ID: c78ad7177d650fbe7a625e1f33234397b35419ae30e2884f24f405acf3dda77b
            • Opcode Fuzzy Hash: 31495e7dcf0985454016301e3335c3f448df0f4c99aa0aa242f01e66ea667f80
            • Instruction Fuzzy Hash: A1214AB1E09D82C9FA609715DDA30B563B1AF5BF40F8002B9C11DCE2E5DE2CAD45CB04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
            • String ID: bad allocation
            • API String ID: 2837191506-2104205924
            • Opcode ID: 15ab1da4c976b5a443b990e10891d2bdf45618e1db579182d28fa9cee56dbbac
            • Instruction ID: 0e88991fe8e64cada946dbec7cd352d1d93f9e12962376a3c8aad70b385188c1
            • Opcode Fuzzy Hash: 15ab1da4c976b5a443b990e10891d2bdf45618e1db579182d28fa9cee56dbbac
            • Instruction Fuzzy Hash: 98011779610B8781FE20BF20E8613F867E8B7953E4F8855759B8A466B1EB78C257C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: 98667de634df17e3002f528c503baf9fd399360d270cee6032a1187459161a2c
            • Instruction ID: 252312715616c7115c57370e832abbe8f6d2c235e96383d5a1b244367ff9f896
            • Opcode Fuzzy Hash: 98667de634df17e3002f528c503baf9fd399360d270cee6032a1187459161a2c
            • Instruction Fuzzy Hash: 1FF01222E08946C1EA509725F8762B95370AF95F70F140336DA3ECA1E6DF2DFC958B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: 68c966794d45a26bc0ce352807e4506a2a3e803fc2058c9121001f91d073ba25
            • Instruction ID: 8fc72878c85ed52567a887aa0bcfa1cb547a96f72367cc5155cd7ef3d149e78a
            • Opcode Fuzzy Hash: 68c966794d45a26bc0ce352807e4506a2a3e803fc2058c9121001f91d073ba25
            • Instruction Fuzzy Hash: C2F01222E08946C1EA509725F8762B953706F95F70F140336DA3ECA5E6DF2DFC958B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: 37056db6683098725aff1277900d26c7f0a8d787be9077936edb7e7a0fbe72ea
            • Instruction ID: 0c122449486dfc63634da57d81faa97c3d9c2eaf26b5883a2c725ff372f7ae82
            • Opcode Fuzzy Hash: 37056db6683098725aff1277900d26c7f0a8d787be9077936edb7e7a0fbe72ea
            • Instruction Fuzzy Hash: F5F0FF22E08946C1EA509725F8662B953706F96F70F540336DA7ECA1E6DF29FC958A00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: 1c009da80423eb9776ad27b4896bc7a3d78086aba397a6fdea3ffa2447fc16ef
            • Instruction ID: 5c834c824b9c01b224cbaa872f76676b961d9dcbb84744adacec3582e7446b37
            • Opcode Fuzzy Hash: 1c009da80423eb9776ad27b4896bc7a3d78086aba397a6fdea3ffa2447fc16ef
            • Instruction Fuzzy Hash: 56F04F22A08946C1EA509725F8222B813706F86F70F140332DA3ECA1E6DF28FC858A00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: ba23d353b47921fc19f649bdb096968185609f198af8a22fc68cd0ba66401e9a
            • Instruction ID: 790368def3c1e4bdce298e6a3fed71e65180512ae0e69665c1643fdecacd7ed9
            • Opcode Fuzzy Hash: ba23d353b47921fc19f649bdb096968185609f198af8a22fc68cd0ba66401e9a
            • Instruction Fuzzy Hash: DEF0FF22E08946C1EA509725F8662B953706F95F70F140336DA3ECA1E6DF2DFC958A00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$Init_thread_footerPriorityResume
            • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
            • API String ID: 3594913340-1828396829
            • Opcode ID: 738b75d211e5ce6c5a6eb55f8bdd90dc21dfe2866fd69c22f6834b402a36fb24
            • Instruction ID: 04735b39b6787c363049f58febc9d05b6d43c0f1eae2b09eb83bc58e9531aeed
            • Opcode Fuzzy Hash: 738b75d211e5ce6c5a6eb55f8bdd90dc21dfe2866fd69c22f6834b402a36fb24
            • Instruction Fuzzy Hash: 38F0FF22A08946C1EA509725F8662B953706F96F70F140336DA7ECA1E6DF29FC958A00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 1646373207-1276376045
            • Opcode ID: 616ddb4d295f18e0d5ebf620ba6ad7aac28a66247e066f97f832725591873133
            • Instruction ID: 9b31a62f75b73b54dacfcb21dafb6c24df06f09fd04dbbd21c694206c7ed38d8
            • Opcode Fuzzy Hash: 616ddb4d295f18e0d5ebf620ba6ad7aac28a66247e066f97f832725591873133
            • Instruction Fuzzy Hash: 40E01230711A8642FE19BB51E8A47B513D5AF4C7A0F8C15B8871E0B3B0DF28C54BC710
            APIs
            • GetModuleHandleW.KERNEL32(?,?,000000FF,000000014000EDD5,?,?,00000028,000000014000CC95,?,?,00000000,000000014000F17C,?,?,?,00000001400163E9), ref: 000000014000ED9B
            • GetProcAddress.KERNEL32(?,?,000000FF,000000014000EDD5,?,?,00000028,000000014000CC95,?,?,00000000,000000014000F17C,?,?,?,00000001400163E9), ref: 000000014000EDB0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 1646373207-1276376045
            • Opcode ID: 4bbfd39f8bf343ea1ca5c34338239d701a48d2a774a5be26f10ebce2c9f64242
            • Instruction ID: 71ffbbccc92808b43813d08085ef59349100938ca0567fadc8db71697ad937b1
            • Opcode Fuzzy Hash: 4bbfd39f8bf343ea1ca5c34338239d701a48d2a774a5be26f10ebce2c9f64242
            • Instruction Fuzzy Hash: 16E0127071170082FE1BDB92BC843E41250AB4C7C0F48542D9A1E073F2EF3C99488750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ErrorLastlstrlen
            • String ID:
            • API String ID: 3322701435-0
            • Opcode ID: 0f019e937948a6d47832e34f67adf2063f94cc7fb04caa044bbf51efa6f953eb
            • Instruction ID: cb41fc656dc49bbcd6b81cdc985572a690cfac52a7bd8b8c87c7267beb23a72a
            • Opcode Fuzzy Hash: 0f019e937948a6d47832e34f67adf2063f94cc7fb04caa044bbf51efa6f953eb
            • Instruction Fuzzy Hash: 4C218236704BC282E714AFA2B45479BA7A5FB887E8F1485359B8847B74DF7CC54AC700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ErrorLastlstrlen
            • String ID:
            • API String ID: 3322701435-0
            • Opcode ID: 7b6a82a3cecccb768db571671d4363707eed458c3a164f31cf85666ce331445c
            • Instruction ID: 1367ca4fc0ad25944009171f3ece5e31aaa5564db9c75415ed5b608e2aa7c643
            • Opcode Fuzzy Hash: 7b6a82a3cecccb768db571671d4363707eed458c3a164f31cf85666ce331445c
            • Instruction Fuzzy Hash: D3217A76604B8286E725DBA3B44479BA7A5B78CBD8F088125AF8947B74CF7CC54A8700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: free$Heap$FreeProcess
            • String ID:
            • API String ID: 3493288988-0
            • Opcode ID: e74aae544f5a46ba22eee78589248f0f87bde554db02cbcf63cd116665f5f2e6
            • Instruction ID: 5cbf474f9e563e6267febcf9a42408d8f57e3ab84a64377a8e06bcc2df1fbc49
            • Opcode Fuzzy Hash: e74aae544f5a46ba22eee78589248f0f87bde554db02cbcf63cd116665f5f2e6
            • Instruction Fuzzy Hash: AD312B36711A9193EB59EB56E5507AD63B0FB88FE0F084265DF4A17F64CF38D4A28700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: e5f5a7a0dc5c8876328b0cc5bc067911a8c5247e3853157b53872c7db5139999
            • Instruction ID: 9499d1f32b2d2fcd542a16a7bf841c481104a5730838478e5473d3b2d96ba178
            • Opcode Fuzzy Hash: e5f5a7a0dc5c8876328b0cc5bc067911a8c5247e3853157b53872c7db5139999
            • Instruction Fuzzy Hash: 9801FF31B14A8583EB546B65F8557A823D1F784BB0F581370DB768B7E49F38C4968700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: 522e542781311d7e6f090ded623bc72729966cf96487a5008a3685ae68b96bf6
            • Instruction ID: be956a872a1c6a2900d84f2f534e5b7a64f0e72c58f44559afabd09d7ae00775
            • Opcode Fuzzy Hash: 522e542781311d7e6f090ded623bc72729966cf96487a5008a3685ae68b96bf6
            • Instruction Fuzzy Hash: 6601FB35710944C3EB959B66F8553A823A1F78CBE5F881220EB7A4B6F0DF79C4958700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: std::bad_exception::bad_exception$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 208461638-0
            • Opcode ID: 73a7ac148250d6fe23e634dcb3216ee3d6b184c37dc2c70ddf0f85e991ab9da2
            • Instruction ID: 0bbe2fe47534aa28ed7dc9d8ee01d24b8ab279f045cc6b1281cccc6de29b64cd
            • Opcode Fuzzy Hash: 73a7ac148250d6fe23e634dcb3216ee3d6b184c37dc2c70ddf0f85e991ab9da2
            • Instruction Fuzzy Hash: 2DA10C21A0AB4286EE95AB51E4323A962F4BF4BB44F54013CD68D9F7C6EF3DEC048311
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfoiswctype
            • String ID:
            • API String ID: 248606491-0
            • Opcode ID: 8990e4657c5db3c90a51578a81b61c88cef929f9a05e6dfaeb4bfedc03f5f406
            • Instruction ID: 7972d8b7e741db0d7740ce2e3a4c3e42c375b3f3863835df0af8685b5b677303
            • Opcode Fuzzy Hash: 8990e4657c5db3c90a51578a81b61c88cef929f9a05e6dfaeb4bfedc03f5f406
            • Instruction Fuzzy Hash: 5851B2B2900DD34DFBB43A2AB8313FA21D1AF407F4F2545B1EF51C21E9E66A88839251
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_invalid_parameter_noinfoiswctype
            • String ID:
            • API String ID: 248606491-0
            • Opcode ID: 606257ffbb467dae4197fa97c9caa10e9ea433f99056969b45ae169b58c78470
            • Instruction ID: ad4b2e940984449f39046f900497b05137e73722569b21e27d707f41fcf6c88f
            • Opcode Fuzzy Hash: 606257ffbb467dae4197fa97c9caa10e9ea433f99056969b45ae169b58c78470
            • Instruction Fuzzy Hash: E151053290016150FBBF5A2B98013EEA1E1BBCC7E8F554211FF518F1F3E67AC8958202
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
            • String ID:
            • API String ID: 27599310-0
            • Opcode ID: 92f3ae0ad62b5c177dba82905c82cd58413f65951c15738f7d565db9f6b1117e
            • Instruction ID: 306741b34e3bfef789a284ba9ddeea403501a44d48d6e2f29ff15227e5e03a67
            • Opcode Fuzzy Hash: 92f3ae0ad62b5c177dba82905c82cd58413f65951c15738f7d565db9f6b1117e
            • Instruction Fuzzy Hash: 8951937260474092FA679B37AC403FA66A2F38D7D4F284519FB5A4B6B6CB3ADC41C600
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ByteCharMultiWide
            • String ID: Network$X64
            • API String ID: 626452242-3809260122
            • Opcode ID: 23ae036aa3b1d2709e1c4a854c1d6364a8d361c4d22c79d840b97e812a5fc968
            • Instruction ID: 8bedb2256c72763b8a345755e8d6baf6d31a5b14c633238809a1879be163b5e1
            • Opcode Fuzzy Hash: 23ae036aa3b1d2709e1c4a854c1d6364a8d361c4d22c79d840b97e812a5fc968
            • Instruction Fuzzy Hash: 76517C32214AC495E750EB65E8452DEA7A1FB847F4F904326FB7A57AE9CF38C146CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateInstance$InitializeUninitialize
            • String ID:
            • API String ID: 1701838895-0
            • Opcode ID: cd67ddf5dae77c640e0d9ee24c34f1a23b683f0c5909ce805016218ca2d8fa47
            • Instruction ID: c202600e088da42b23e086ce21d5dfe9a575869488e7a3a7993dca445c2efd8e
            • Opcode Fuzzy Hash: cd67ddf5dae77c640e0d9ee24c34f1a23b683f0c5909ce805016218ca2d8fa47
            • Instruction Fuzzy Hash: CC518D72608B42C6EB209F25E49126A7370FB89F94F544136DA5ECB798DF7DD844CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
            • String ID:
            • API String ID: 3655708593-0
            • Opcode ID: ae0d8a242cb8cd5958c0b3c400ec99c91f7a88f021bfb64fbd7b9bdb8558b75e
            • Instruction ID: f55a5bd9ddef3aed64daf8715711badaf345646b3aeb94cd797bebd1ff3d7d98
            • Opcode Fuzzy Hash: ae0d8a242cb8cd5958c0b3c400ec99c91f7a88f021bfb64fbd7b9bdb8558b75e
            • Instruction Fuzzy Hash: 9641E372620F8286EB58AF28C4613BC36E4E794BF4F144675DB65473E5EA34E852C780
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo$_getptd
            • String ID:
            • API String ID: 1297830140-0
            • Opcode ID: 5c3f2eb0de4ecc964b19cd037dcff679cc0c5f13b20e04879b55f5937233c062
            • Instruction ID: b7e2f13a67408a4fb7847bcb2a42d3dc8f1a6997d88506d2226459189537deb0
            • Opcode Fuzzy Hash: 5c3f2eb0de4ecc964b19cd037dcff679cc0c5f13b20e04879b55f5937233c062
            • Instruction Fuzzy Hash: 04419F72214BC186E761AF25D1A43FD7BE0E784BE0F0441B1DB5A83BA6DB28C456C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo$_getptd
            • String ID:
            • API String ID: 1297830140-0
            • Opcode ID: 5a870b931761ab599753f8bfd16992f766053f307be36c29dad451088aec4ffc
            • Instruction ID: fa439592d95ae1f100fac341de21a33952704bf9bde9568e0b02c20916df6298
            • Opcode Fuzzy Hash: 5a870b931761ab599753f8bfd16992f766053f307be36c29dad451088aec4ffc
            • Instruction Fuzzy Hash: 1341C272218B8486EB62DF26D5D43ED77A0F788BD0F544121FB894BBA6DB39C445C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd$BaseImage_amsg_exit
            • String ID:
            • API String ID: 2306399499-0
            • Opcode ID: 35e29d8fd6bc9845a79005a57f687935efa70cb60b342af0ce20e08c547ff475
            • Instruction ID: 2097a90748cc370bc428928cf3f35293e30dccd9e5a7c1c3e9070058aacf5cc1
            • Opcode Fuzzy Hash: 35e29d8fd6bc9845a79005a57f687935efa70cb60b342af0ce20e08c547ff475
            • Instruction Fuzzy Hash: 82417F72600E8785EA20B755E4A53FD76D0AF91BF8F5582B19B69837F2DB34C4478300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterEvent
            • String ID:
            • API String ID: 3394196147-0
            • Opcode ID: feb78f70b4df6414eb21c9ecdb35b5c2724385254891411f69aab51776cc5172
            • Instruction ID: fb730899d58e458f5f0d5bb14b29070a1bd9d7c1975ab3b355ecbc3167042375
            • Opcode Fuzzy Hash: feb78f70b4df6414eb21c9ecdb35b5c2724385254891411f69aab51776cc5172
            • Instruction Fuzzy Hash: 7A21B632304BC182D758DB29E9946ADB3A4F789BE4F244275DBAA87774DF34D4A28700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterEvent
            • String ID:
            • API String ID: 3394196147-0
            • Opcode ID: fa82e5b209470ce26a85e264d624b6564f0e8887b78138c3eaa11438d14ff89d
            • Instruction ID: ef994ee9f9bed98942f48a86039c6ac5302df09849ecf8edac7f4e264bc9dd67
            • Opcode Fuzzy Hash: fa82e5b209470ce26a85e264d624b6564f0e8887b78138c3eaa11438d14ff89d
            • Instruction Fuzzy Hash: C621E772304B8082D759CB2AF5803AEB3A4F78DBE4F144225EBA987774DF78D4618740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalDeleteSection$Freefree
            • String ID:
            • API String ID: 1250194111-0
            • Opcode ID: 895ab2ec1fe574897f2a59e2529e51965fc67142c4c41bc2158851cfbd195e4a
            • Instruction ID: e46e48b1c35410e89fb737a6577e536b099b8fcc10226006fd0392790963f549
            • Opcode Fuzzy Hash: 895ab2ec1fe574897f2a59e2529e51965fc67142c4c41bc2158851cfbd195e4a
            • Instruction Fuzzy Hash: 75113D35A11AC2C6FA65AF15E8A43B863E0E784BF4F990260DB65062B5CB38D8528710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
            • String ID:
            • API String ID: 594724896-0
            • Opcode ID: c9f77b097b1ff9bda74785914cee94378daf67591831374db37bb86d897c1467
            • Instruction ID: 87264e52a2fda171319df8fe2e39f3b91f2b5136f1d58ff83c7a7e57e2184c2b
            • Opcode Fuzzy Hash: c9f77b097b1ff9bda74785914cee94378daf67591831374db37bb86d897c1467
            • Instruction Fuzzy Hash: 5E113A3655464082EA129B1AE8847ECB771F798BC4F25421AEB9E4B2F5CF76CC52C604
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _amsg_exit$_getptd_lockfree
            • String ID:
            • API String ID: 2148533958-0
            • Opcode ID: aaf890dc514d5b1d758f0962d46d07e81864927ddcd3fcb5db6298c144a2bb2a
            • Instruction ID: d3e7cd872bcac190c33a9ccc74263bc35aee3c0c3613b0a7fbc1b13082b0cc7e
            • Opcode Fuzzy Hash: aaf890dc514d5b1d758f0962d46d07e81864927ddcd3fcb5db6298c144a2bb2a
            • Instruction Fuzzy Hash: 60114C35216A40C2EA96AB12E5807E933A1F74CBC1F480426FB5D0B7B6DF39C850C750
            APIs
            • FlsFree.KERNEL32(?,?,?,?,000000014000E9B1,?,?,00000000,000000014000CAB4), ref: 000000014000E64B
            • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000E9B1), ref: 000000014001631B
            • free.LIBCMT ref: 0000000140016324
            • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014000E9B1), ref: 000000014001634B
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CriticalDeleteSection$Freefree
            • String ID:
            • API String ID: 1250194111-0
            • Opcode ID: c25eac38dcb995f992205fe458d8dab7938c3d4adf6374a094264ee5461f7dec
            • Instruction ID: cd47141b7d78026fdc00fdad829ff1479e6926bb3c39f440062878921503200c
            • Opcode Fuzzy Hash: c25eac38dcb995f992205fe458d8dab7938c3d4adf6374a094264ee5461f7dec
            • Instruction Fuzzy Hash: E0115E36A01A40C6FB66DF27F8543A863A0F758BE4F980215FB6A0B2B5CB39C955C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Heap$Destroyfree$Create
            • String ID:
            • API String ID: 2478812866-0
            • Opcode ID: 0a4b86de96d23adba954d842b9e5b68399cc0f510354a5343c41260661051d6d
            • Instruction ID: 5a00c20c43c5f53510d8a5e8125813b0ece0219b642d085caf205d7da4caa26a
            • Opcode Fuzzy Hash: 0a4b86de96d23adba954d842b9e5b68399cc0f510354a5343c41260661051d6d
            • Instruction Fuzzy Hash: E4015E36211B8185EB45AF70E45026973A4FB44FF8F644724DF5A472B8CF38C891C650
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$CurrentErrorExitLast_freefls
            • String ID:
            • API String ID: 217443660-0
            • Opcode ID: 5f66bd7f545b5964a83d9e571df25c32621f8b99ae5f15c0ae7904e1522f0d0e
            • Instruction ID: 0d311d97ae7fbe4b66278e0fe1b7426e010659d12bb5ee0c065eee16f994fff8
            • Opcode Fuzzy Hash: 5f66bd7f545b5964a83d9e571df25c32621f8b99ae5f15c0ae7904e1522f0d0e
            • Instruction Fuzzy Hash: EB011935210F8745EB047B71D4697FD23E9AB08BE4F2848B49B4D4B3A6FE2584068320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Thread$CurrentErrorExitLast_freefls
            • String ID:
            • API String ID: 217443660-0
            • Opcode ID: f2f81f6585889129bd2191fcc95c645116c6f610b9ebac548b2344c704875f41
            • Instruction ID: 5d255d52c81a4e596e4553f0409be69b44d9720ffbe38365c9e265ec0aa6c932
            • Opcode Fuzzy Hash: f2f81f6585889129bd2191fcc95c645116c6f610b9ebac548b2344c704875f41
            • Instruction Fuzzy Hash: 7A0119B4612B8045EA56EB73B4597EC22A4BB1CBC4F140434BB1D5B3A3EE3684044311
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateThread$ObjectSingleSleepWait
            • String ID:
            • API String ID: 1183137808-0
            • Opcode ID: 2b652301547513394443e9f97cfd61dfc27d7781a9a24f35fd08fa08d1a6b0cc
            • Instruction ID: e6b3651a5e78e668710784757de109a0d9b7a09c8a5f5057f928e79280fe48df
            • Opcode Fuzzy Hash: 2b652301547513394443e9f97cfd61dfc27d7781a9a24f35fd08fa08d1a6b0cc
            • Instruction Fuzzy Hash: 74F06271604A8282EB24AF31B8455AA77E1F7C87E8F544369DB5946674CF3CC1568604
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _amsg_exit_getptd$_lock
            • String ID:
            • API String ID: 3670291111-0
            • Opcode ID: 7c67cffeddd678964c17013522561c9584b14d1f54746d947ace77451792012d
            • Instruction ID: bdc125533324197ca72332f2517a0ca58343d11622ac4bcaa2ab41edbff0b5df
            • Opcode Fuzzy Hash: 7c67cffeddd678964c17013522561c9584b14d1f54746d947ace77451792012d
            • Instruction Fuzzy Hash: 81F01775602140C2FA5ABB63D841BE822A1AB9CB81F4C0538FB1C4F3F2DB35C954D311
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Path$LongNameTemp
            • String ID: C:/tmp
            • API String ID: 730912879-4167066228
            • Opcode ID: 83439be4317a1c61e43b9cbe7d8e863dedc4cfdc833063ea0791e58a1257d570
            • Instruction ID: 5acc4af8bd60c0fdbd8faedb876fb2d424d95bb373b6cb8d717767ed85dce685
            • Opcode Fuzzy Hash: 83439be4317a1c61e43b9cbe7d8e863dedc4cfdc833063ea0791e58a1257d570
            • Instruction Fuzzy Hash: 3F919372608A41C6E7609F15D8A2269B3B0FB8AF94F544231DA5DCB7A8DF7DDC42CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ClassRegister
            • String ID: %s: RegisterClass() failed$__cdecl QWindowsMessageWindowClassContext::QWindowsMessageWindowClassContext(void)
            • API String ID: 2764894006-1290848616
            • Opcode ID: 70229b2911cac80b679d5468395164f5b932432c6456549db484ff30615120df
            • Instruction ID: 68651fcdfd6bbd4255f3aa9a3278ee366cf19c5f6423b17372bb6d27ffe29961
            • Opcode Fuzzy Hash: 70229b2911cac80b679d5468395164f5b932432c6456549db484ff30615120df
            • Instruction Fuzzy Hash: 02718332B05A41CAEB10DF79D4A11AD73B0EB49F58F548636EA1DCBAD5DE38E812C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _amsg_exit_getptd
            • String ID: csm$csm
            • API String ID: 4217099735-3733052814
            • Opcode ID: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
            • Instruction ID: f1ecafa01394643f58d3a5a2f44337a0f1307f2d9bdf664342a1d8a28137fefc
            • Opcode Fuzzy Hash: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
            • Instruction Fuzzy Hash: 6E51AE32204AC28AEB64BE6594603FD77E0FB45BE4F448175DB59D7BA5CB38C892CB01
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: e+000$gfff
            • API String ID: 3215553584-3030954782
            • Opcode ID: 0f2dbf502fb50cc3c9119360ffe868a7f7c1b9d889f18b21b2ea719df869edc6
            • Instruction ID: fe2a3680c0106959b455f411540164bcb36c96ff2d203ba69285791408f4abd1
            • Opcode Fuzzy Hash: 0f2dbf502fb50cc3c9119360ffe868a7f7c1b9d889f18b21b2ea719df869edc6
            • Instruction Fuzzy Hash: DE510563B187C6C6EB258B25EC523696AB1E744F90F089239D79C8BAD5CE2CEC44C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Init_thread_footer
            • String ID: QCoreApplication::applicationFilePath: Please instantiate the QApplication object first$default
            • API String ID: 1385522511-1195541078
            • Opcode ID: 06e3373bd0cf0de3971f7f336e6d5dd1eaadc2dca8628431f20a1437d26f4a2b
            • Instruction ID: e6ce401ceec409f22c9026b718d52c522a7a6775b444587adddf14e2ae68a033
            • Opcode Fuzzy Hash: 06e3373bd0cf0de3971f7f336e6d5dd1eaadc2dca8628431f20a1437d26f4a2b
            • Instruction Fuzzy Hash: 9E511C31A09A42C6EA10DF25E4926797370FB8AF90F504235DA5ECB7A9DF3CE841C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CloseHandlemallocwsprintf
            • String ID: %s_bin
            • API String ID: 2399101171-2665034546
            • Opcode ID: 0a69d819fd656596b93c855f7e1b851c5acc7014e10a6c2c838e2f35afa1a01a
            • Instruction ID: 06668cf6e5361198fc7edba844a7c377ed070ece087ed6071a33ea630d4d70ba
            • Opcode Fuzzy Hash: 0a69d819fd656596b93c855f7e1b851c5acc7014e10a6c2c838e2f35afa1a01a
            • Instruction Fuzzy Hash: 65419EBA711BC681EB65FB26E4147F927E4E785BE4F5082A5CF1E037A2DA39C542C300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: fd5550cb344639488e59e975bf7c83b31fce18860d2481271e35627b1b3623d5
            • Instruction ID: de3e9ccba7a9f326234d7c126ec7682651540645f22fac09c6cd106db78f0f22
            • Opcode Fuzzy Hash: fd5550cb344639488e59e975bf7c83b31fce18860d2481271e35627b1b3623d5
            • Instruction Fuzzy Hash: 1341B263A18A45C2DB208F25E8467A967B0FB98B84F405135EE4DCB798DF3CD842C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID: B
            • API String ID: 2959964966-1255198513
            • Opcode ID: f7a1271b1668ab66b4a84c5d00cf56c613d18e1254de771e68acfd2d0fc1a2bf
            • Instruction ID: fb9341cf0e7f3ee6dc2b95d1ae3c27e687eb38a3f2a8d88a82ca8e5383b26449
            • Opcode Fuzzy Hash: f7a1271b1668ab66b4a84c5d00cf56c613d18e1254de771e68acfd2d0fc1a2bf
            • Instruction Fuzzy Hash: 1D21A072B21B5089E726DB66A840BDD37A4B70CBE8F181126FF5953BE8DB31C441C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: swscanf
            • String ID: %d.%d.%d.%d%c
            • API String ID: 3616590096-2398565245
            • Opcode ID: c43af12d048c2140f8e3e2782bbf25f93f865edb1df4d58d990b40a747d97f95
            • Instruction ID: b55de3e9e4a68abbad513887a45ad9f27c17e84ca20836e00ccb648423a55c58
            • Opcode Fuzzy Hash: c43af12d048c2140f8e3e2782bbf25f93f865edb1df4d58d990b40a747d97f95
            • Instruction Fuzzy Hash: C911AE72715A8285FE11EB14E4513FAB3E0EB857A4F940172E78E476A5DA7DC483CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: swscanf
            • String ID: %d.%d.%d.%d%c
            • API String ID: 3616590096-2398565245
            • Opcode ID: db1601ccb1c388ebda55326c052e70a063839f8cce7590c3c59e541af1868db2
            • Instruction ID: a3aa882280f83d70abec01af91cc7078a705e13651bf993b0cd020c5afcc04f4
            • Opcode Fuzzy Hash: db1601ccb1c388ebda55326c052e70a063839f8cce7590c3c59e541af1868db2
            • Instruction Fuzzy Hash: BA11AFB2705A4581FA56CB62F4513EAB3A1EB99794F440022FB8D47AA9DF7CC582CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd
            • String ID: csm$csm
            • API String ID: 3186804695-3733052814
            • Opcode ID: 48bc1373a0cf7fa20b60edcf05be31b4cb9f1640bae482645bfd625d32f457a4
            • Instruction ID: 463c08f0ec7643fdc81d8cde80602c75461da7687eb104dd68ac5986bc0899df
            • Opcode Fuzzy Hash: 48bc1373a0cf7fa20b60edcf05be31b4cb9f1640bae482645bfd625d32f457a4
            • Instruction Fuzzy Hash: FD319773500A45CAEB609F65C0843A83BB5F358BADF861365EB4D4BB68C775C891C784
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ObjectSingleWait
            • String ID: QWaitCondition::wait: Cannot wait on recursive mutexes$default
            • API String ID: 24740636-2009005735
            • Opcode ID: 146604afdf875c87d0d0e0ef66d7f3da82025842baf9707a1a8bbcafb69421db
            • Instruction ID: 7a176d4bebed29e4ddb753a1f5b02f8805420cd3686cff4f55d4b1ec34687386
            • Opcode Fuzzy Hash: 146604afdf875c87d0d0e0ef66d7f3da82025842baf9707a1a8bbcafb69421db
            • Instruction Fuzzy Hash: 89118422A08B91C5DB10DB12F4A627AA371FB89FD4F444131EA8D8BB5ADF7CD855CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _errno_invalid_parameter_noinfo
            • String ID: B
            • API String ID: 2959964966-1255198513
            • Opcode ID: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
            • Instruction ID: b1c4ed8af205c8e07323f3fc22a86904fd821c1695a964eb461ec04eced09087
            • Opcode Fuzzy Hash: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
            • Instruction Fuzzy Hash: 8011B132224BC186E720AF15E5503EEB6E5F798BF4F584671AB9807BA5DF38D542CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastsend
            • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
            • API String ID: 1802528911-4236689219
            • Opcode ID: 26024b8f4a6b1fc62b5e85987d6cbbeeaefd2807c977c47cb76afe576a9464f7
            • Instruction ID: 39b685ed7fe4742c07028f9fed5ad9f4cce3c246f884bf3f0770fa9746a07ba6
            • Opcode Fuzzy Hash: 26024b8f4a6b1fc62b5e85987d6cbbeeaefd2807c977c47cb76afe576a9464f7
            • Instruction Fuzzy Hash: D811C27270094086EB94CF2AE4847AE73F0F788BACF654124DB188B2A5DB75C8D38B40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1939508015.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1939492195.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939526748.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939540751.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000000.00000002.1939554398.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastsend
            • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
            • API String ID: 1802528911-4236689219
            • Opcode ID: 0e45df35e4add629027d2dbd4533ad86ad3e6d2f14b6c7cbbb9db694f1680240
            • Instruction ID: 7da57c49a633c925aba81d23fd4dacce9c0a132b2f84759fbf73eb3e93c5cd4f
            • Opcode Fuzzy Hash: 0e45df35e4add629027d2dbd4533ad86ad3e6d2f14b6c7cbbb9db694f1680240
            • Instruction Fuzzy Hash: 40118EB261060086EB51CF2AF48479E73B1F79CB9CF654121EB188B6A5CB76C8D38F40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: _getptd
            • String ID: csm
            • API String ID: 3186804695-1018135373
            • Opcode ID: 110644245a712163c931d5ba1d41ab16cc3e499cf3e1aabacc1b7c0560f8ec51
            • Instruction ID: 6c673d9a612122c5ac6e0559fe0a6cff5da2373df45d4238f4704cb8d0e1611c
            • Opcode Fuzzy Hash: 110644245a712163c931d5ba1d41ab16cc3e499cf3e1aabacc1b7c0560f8ec51
            • Instruction Fuzzy Hash: 37014832141A82CAEB70BF21D8507FC23E5E758BA9F5803B5DF094E6A6DB30C882C300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: CreateEvent
            • String ID: QMutexData::QMutexData: Cannot create event$default
            • API String ID: 2692171526-3883557714
            • Opcode ID: 7e7d644c09d99a5a6c3be016508522d6b6355ef5b7fdc0e416c337ea6e263274
            • Instruction ID: 82c86bee046618b2333aabd70950d7876ead807d57afff4e2ad9344ab7db2acf
            • Opcode Fuzzy Hash: 7e7d644c09d99a5a6c3be016508522d6b6355ef5b7fdc0e416c337ea6e263274
            • Instruction Fuzzy Hash: 05F04433A09B81C1EB108F25F44276AB7B0FB98B48F648135E68D46755DF7CD591CB40
            APIs
            • try_get_function.LIBVCRUNTIME ref: 00007FF665C3159D
            • TlsSetValue.KERNEL32(?,?,?,00007FF665C327EA,?,?,?,00007FF665C28CFD,?,?,?,?,00007FF665B784A7), ref: 00007FF665C315B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Valuetry_get_function
            • String ID: FlsSetValue
            • API String ID: 738293619-3750699315
            • Opcode ID: 0ba6b372cb4a2b199900795e9c6c51c8a2dfea35c9e952b3c7edfe421b932056
            • Instruction ID: 5ad7ff7278c7f1f400e57f5a1e60bbda555c0eee0e5fc02e13bcd60af7d27f5c
            • Opcode Fuzzy Hash: 0ba6b372cb4a2b199900795e9c6c51c8a2dfea35c9e952b3c7edfe421b932056
            • Instruction Fuzzy Hash: 61E09B62A08606D5EB044B55F4428F43332AF48F80F485239D54E8E395CE3CED84C705
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocFreesend
            • String ID:
            • API String ID: 2354595252-0
            • Opcode ID: 42f920e62df292d262b0744aa4ce6eb943c302377280a50c8d6856371cde3bb9
            • Instruction ID: aee9273d34a2db8e4f37fbd0d990230d9b76e1069c0adb789dbb13b2e0e37a9c
            • Opcode Fuzzy Hash: 42f920e62df292d262b0744aa4ce6eb943c302377280a50c8d6856371cde3bb9
            • Instruction Fuzzy Hash: 3E516076300B8187E715EB2AF4506AEB7E5F784BD8F104225DB8A97B64DF78E446C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940106537.000001FE8FAD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001FE8FAD0000, based on PE: true
            • Associated: 00000000.00000002.1940106537.000001FE8FB0E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_1fe8fad0000_quHmbPnLFV.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: c644452f85baab6451ec69b31673ecdda31e611098b1083b8dabd6bbc09c8c61
            • Instruction ID: 0d6c599ea72ba095e331174377eb10fa3a908310e6eee88f719de0bc653c3fcd
            • Opcode Fuzzy Hash: c644452f85baab6451ec69b31673ecdda31e611098b1083b8dabd6bbc09c8c61
            • Instruction Fuzzy Hash: D9515076200B8187E715EB2AF4406AEB7E5F784BD4F108265DB8A97B64DB7CE486C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1940266769.00007FF665B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF665B40000, based on PE: true
            • Associated: 00000000.00000002.1940253641.00007FF665B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665C46000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940332962.00007FF665D7B000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DB8000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940441501.00007FF665DEB000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DED000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1940478430.00007FF665DFA000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff665b40000_quHmbPnLFV.jbxd
            Similarity
            • API ID: ErrorLastRead
            • String ID:
            • API String ID: 4100373531-0
            • Opcode ID: 6a69c7bdf01cc1d2336885ad907c5f05680f579d0beabb65993b657d56b6f43c
            • Instruction ID: 2f655e583e4e2663031b59628d846dd37474ba32f96031b0f05d1db47ad79c6f
            • Opcode Fuzzy Hash: 6a69c7bdf01cc1d2336885ad907c5f05680f579d0beabb65993b657d56b6f43c
            • Instruction Fuzzy Hash: F7416A36A09A81C6EF248F15E01563923B5FB49F98F054439DE9E8B798EF78E864C700