Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
quHmbPnLFV.exe

Overview

General Information

Sample name:quHmbPnLFV.exe
renamed because original name is a hash value
Original sample name:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa.exe
Analysis ID:1582216
MD5:e4a3903deccb9128673c052ca0a31080
SHA1:326c8a7f863a9a7c3f6135a6a916168bea68b1be
SHA256:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa
Tags:backdoorexesilverfoxwinosuser-zhuzhu0009
Infos:

Detection

GhostRat
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GhostRat
AI detected suspicious sample
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • quHmbPnLFV.exe (PID: 6816 cmdline: "C:\Users\user\Desktop\quHmbPnLFV.exe" MD5: E4A3903DECCB9128673C052CA0A31080)
    • WerFault.exe (PID: 5000 cmdline: C:\Windows\system32\WerFault.exe -u -p 6816 -s 1376 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: quHmbPnLFV.exe PID: 6816JoeSecurity_GhostRatYara detected GhostRatJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: quHmbPnLFV.exeVirustotal: Detection: 11%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7313FB0 CryptAcquireContextW,CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDeriveKey,CryptDecrypt,CryptDestroyKey,CryptDestroyHash,CryptReleaseContext,CloseHandle,CloseHandle,0_2_00007FF7F7313FB0
    Source: quHmbPnLFV.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: z:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: x:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: v:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: t:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: r:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: p:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: n:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: l:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: j:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: h:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: f:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: b:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: y:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: w:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: u:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: s:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: q:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: o:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: m:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: k:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: i:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: g:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\WerFault.exeFile opened: c:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile opened: [:Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7380B00 FindFirstFileW,FindClose,0_2_00007FF7F7380B00
    Source: global trafficTCP traffic: 192.168.2.4:49730 -> 206.238.220.204:6666
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: unknownTCP traffic detected without corresponding DNS query: 206.238.220.204
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB81750 select,recv,0_2_0000026C9CB81750
    Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8C1B0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,lstrlenW,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,0_2_0000026C9CB8C1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8C1B0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,lstrlenW,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,0_2_0000026C9CB8C1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88FC0 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,0_2_0000026C9CB88FC0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8BDD0 SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,0_2_0000026C9CB8BDD0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7381B50: CreateFileW,DeviceIoControl,CloseHandle,0_2_00007FF7F7381B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88997 GetModuleFileNameW,GetCommandLineW,GetStartupInfoW,CreateProcessW,ExitProcess,ExitProcess,ExitWindowsEx,0_2_0000026C9CB88997
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88A4E ExitWindowsEx,0_2_0000026C9CB88A4E
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88A2D ExitWindowsEx,0_2_0000026C9CB88A2D
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB82B000_2_0000026C9CB82B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8B4800_2_0000026C9CB8B480
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB814F00_2_0000026C9CB814F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8C1B00_2_0000026C9CB8C1B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB9D1600_2_0000026C9CB9D160
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA42880_2_0000026C9CBA4288
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB852800_2_0000026C9CB85280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA3A240_2_0000026C9CBA3A24
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB85A100_2_0000026C9CB85A10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB921F00_2_0000026C9CB921F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB83A600_2_0000026C9CB83A60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB97B8C0_2_0000026C9CB97B8C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA53780_2_0000026C9CBA5378
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB98B000_2_0000026C9CB98B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB862F00_2_0000026C9CB862F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB89B400_2_0000026C9CB89B40
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB9EC800_2_0000026C9CB9EC80
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8CBF00_2_0000026C9CB8CBF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8BDD00_2_0000026C9CB8BDD0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB9FD100_2_0000026C9CB9FD10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8F6500_2_0000026C9CB8F650
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA67700_2_0000026C9CBA6770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB9C7E00_2_0000026C9CB9C7E0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88FC00_2_0000026C9CB88FC0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB97F580_2_0000026C9CB97F58
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB898D00_2_0000026C9CB898D0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB858200_2_0000026C9CB85820
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73146100_2_00007FF7F7314610
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F74087700_2_00007FF7F7408770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73FD5880_2_00007FF7F73FD588
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73685000_2_00007FF7F7368500
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F74033400_2_00007FF7F7403340
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73FA3D80_2_00007FF7F73FA3D8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73333A00_2_00007FF7F73333A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F733B2400_2_00007FF7F733B240
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73FA1440_2_00007FF7F73FA144
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73461B00_2_00007FF7F73461B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73500500_2_00007FF7F7350050
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F732FE700_2_00007FF7F732FE70
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7330B500_2_00007FF7F7330B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7381B500_2_00007FF7F7381B50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73F5BE40_2_00007FF7F73F5BE4
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7396BF00_2_00007FF7F7396BF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7342C000_2_00007FF7F7342C00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7408B9C0_2_00007FF7F7408B9C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7400ACC0_2_00007FF7F7400ACC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73509700_2_00007FF7F7350970
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F74029340_2_00007FF7F7402934
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F740A9D80_2_00007FF7F740A9D8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F732B9B00_2_00007FF7F732B9B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400041B00_2_00000001400041B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400014F00_2_00000001400014F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001BFE80_2_000000014001BFE8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001D06C0_2_000000014001D06C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400051000_2_0000000140005100
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400101E00_2_00000001400101E0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400033100_2_0000000140003310
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140007B600_2_0000000140007B60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000F38C0_2_000000014000F38C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140002D200_2_0000000140002D20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001364C0_2_000000014001364C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001A6980_2_000000014001A698
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400166B00_2_00000001400166B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000F6D40_2_000000014000F6D4
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014001AEFC0_2_000000014001AEFC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000A7000_2_000000014000A700
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140013FCC0_2_0000000140013FCC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB4F1210_2_0000026C9CB4F121
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB48A910_2_0000026C9CB48A91
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB493A10_2_0000026C9CB493A1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB454E10_2_0000026C9CB454E1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB425D10_2_0000026C9CB425D1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB44D510_2_0000026C9CB44D51
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB435310_2_0000026C9CB43531
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB4C6C10_2_0000026C9CB4C6C1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB5765D0_2_0000026C9CB5765D
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB40FC10_2_0000026C9CB40FC1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB4AF510_2_0000026C9CB4AF51
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB5E7510_2_0000026C9CB5E751
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB4B8A10_2_0000026C9CB4B8A1
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: String function: 00007FF7F731D680 appears 62 times
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6816 -s 1376
    Source: quHmbPnLFV.exeBinary or memory string: nna.nosciencehu.comtadaoka.osaka.jphayakawa.yamanashi.jpdnsalias.orgedu.saedu.sbedu.rsedu.sclib.id.usogori.fukuoka.jpnotogawa.shiga.jpedu.sdrepbody.aeroid.auedu.ruk12.nj.usloyalist.museumedu.rwedu.sgxyzmoka.tochigi.jpdynathome.netkimino.wakayama.jpedu.slnissanveterinaire.kmkokubunji.tokyo.jpedu.snos.hordaland.notm.kmartsandcrafts.museumis-a-musician.com*.kitakyushu.jpiitate.fukushima.jpedu.stav.iturayasu.chiba.jpedu.svflorida.museumninjaedu.synemuro.hokkaido.jpedu.tjs
    Source: classification engineClassification label: mal80.troj.evad.winEXE@2/6@0/2
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7319F50 GetLastError,FormatMessageW,LocalFree,0_2_00007FF7F7319F50
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB851C0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_0000026C9CB851C0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB856A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_0000026C9CB856A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB85040 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,0_2_0000026C9CB85040
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84770 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,swprintf,swprintf,0_2_0000026C9CB84770
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB83970 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0000026C9CB83970
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84B60 lstrlenW,CoInitialize,CoInitializeEx,CoCreateInstance,swprintf,0_2_0000026C9CB84B60
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeMutant created: \Sessions\1\BaseNamedObjects\2024. 9. 2
    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6816
    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1f72d731-1349-4372-ab54-c6fe9b5eff46Jump to behavior
    Source: quHmbPnLFV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: quHmbPnLFV.exeVirustotal: Detection: 11%
    Source: quHmbPnLFV.exeString found in binary or memory: Africa/Addis_Ababa
    Source: quHmbPnLFV.exeString found in binary or memory: in-addr.arpa
    Source: quHmbPnLFV.exeString found in binary or memory: gaviika.notattoofg.itkonan.shiga.jpoff.aicountrydevrn.itsamukawa.kanagawa.jpbaiduport.frcarbonia-iglesias.itmiyoshi.tokushima.jptabuse.yamaguchi.jpsosnowiec.pladultin-addr.arpagran.nogob.paserveftp.orghidaka.hokkaido.jpnesseby.nosatosho.okayama.jpgob.peflightsandriabarlettatrani.itnagato.yamaguchi.jphostnes.akershus.nogob.pkdvrdns.orgmiyota.nagano.jpembroidery.museumkarasjohka.nofrom-ky.comtrieste.itashoro.hokkaido.jpdealersaigawa.fukuoka.jpspiegelatlanta.museumromskog.nol
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile read: C:\Users\user\Desktop\quHmbPnLFV.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\quHmbPnLFV.exe "C:\Users\user\Desktop\quHmbPnLFV.exe"
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6816 -s 1376
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: ddraw.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dciman32.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D7B70EE0-4340-11CF-B063-0020AFC2CD35}\InprocServer32Jump to behavior
    Source: quHmbPnLFV.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: quHmbPnLFV.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: quHmbPnLFV.exeStatic file information: File size 2835456 > 1048576
    Source: quHmbPnLFV.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x104c00
    Source: quHmbPnLFV.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x171600
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: quHmbPnLFV.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: quHmbPnLFV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: quHmbPnLFV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84D10 LoadLibraryW,GetProcAddress,swprintf,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_0000026C9CB84D10
    Source: quHmbPnLFV.exeStatic PE information: section name: .gehcont
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA88F2 push rbp; retf 0_2_0000026C9CBA8A04
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA8868 push rbp; retf 0_2_0000026C9CBA8A04
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA8848 push rbp; retf 0_2_0000026C9CBA8A04
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB88933 OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_0000026C9CB88933
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: C:\Program Files\VMware\VMware Tools\ VMware 0_2_0000026C9CB84F20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-76491
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeStalling execution: Execution stalls by calling Sleepgraph_0-74979
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-75418
    Source: C:\Users\user\Desktop\quHmbPnLFV.exe TID: 6860Thread sleep time: -50000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exe TID: 2564Thread sleep time: -50000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F7380B00 FindFirstFileW,FindClose,0_2_00007FF7F7380B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84900 RegOpenKeyExW,RegQueryValueExW,lstrcmpW,RegQueryValueExW,lstrcpyW,RegQueryValueExW,GetSystemInfo,wsprintfW,lstrcpyW,lstrcpyW,RegCloseKey,RegCloseKey,0_2_0000026C9CB84900
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeThread delayed: delay time: 50000Jump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeThread delayed: delay time: 50000Jump to behavior
    Source: Amcache.hve.3.drBinary or memory string: VMware
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: quHmbPnLFV.exe, 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: C:\Program Files\VMware\VMware Tools\
    Source: quHmbPnLFV.exe, 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ~/%s%d/None/%sHDD:%dWW %d Gb Free %d Gb Mem: %d Gb %sFree%d Gb %s-%d8herrorDriverDescSYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000%s >fX[:%d MGetNativeSystemInfontdll.dllRtlGetNtVersionNumbers%d.%d.%dSOFTWARE\Microsoft\Windows NT\CurrentVersionProductNameC:\Program Files\VMware\VMware Tools\VMwareSeDebugPrivilegeNtSetInformationProcessNtDll.dllWindows\System32\svchost.exe%s%sOpenProcessKernel32.dllExitProcessWinExecWaitForSingleObjectwininet.dllInternetOpenWMSIE 6.0InternetOpenUrlWInternetReadFileInternetCloseHandleinvalid string positionstring too long
    Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: quHmbPnLFV.exe, 00000000.00000002.2236303982.0000026C9AB8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: Amcache.hve.3.drBinary or memory string: vmci.sys
    Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.3.drBinary or memory string: VMware20,1
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeAPI call chain: ExitProcess graph end nodegraph_0-75147
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeAPI call chain: ExitProcess graph end nodegraph_0-74872
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB96968 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000026C9CB96968
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84D10 LoadLibraryW,GetProcAddress,swprintf,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_0000026C9CB84D10
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB841F0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_0000026C9CB841F0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB96968 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000026C9CB96968
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8B480 Sleep,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,Sleep,SleepEx,EnumWindows,Sleep,EnumWindows,CreateEventA,Sleep,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,CloseHandle,WaitForSingleObject,CloseHandle,CloseHandle,0_2_0000026C9CB8B480
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CBA8270 SetUnhandledExceptionFilter,0_2_0000026C9CBA8270
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB93A20 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000026C9CB93A20
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73F7648 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F73F7648
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73F160C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7F73F160C
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400041B0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00000001400041B0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000E2F8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014000E2F8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00000001400112FC SetUnhandledExceptionFilter,0_2_00000001400112FC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_000000014000BF30 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014000BF30

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB85280 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_0000026C9CB85280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB85280 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_0000026C9CB85280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_0000026C9CB85280
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB84140 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0000026C9CB84140
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetSystemInfo,wsprintfW,GetLocalTime,wsprintfW,GetLocaleInfoW,EnumDisplayMonitors,swprintf,swprintf,lstrcatW,GetSystemDirectoryW,GetCurrentHwProfileW,0_2_0000026C9CB82B00
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB8B9A0 Sleep,GetLocalTime,wsprintfW,Sleep,SleepEx,EnumWindows,Sleep,EnumWindows,Sleep,SleepEx,CreateEventA,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,CloseHandle,WaitForSingleObject,CloseHandle,CloseHandle,0_2_0000026C9CB8B9A0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_00007FF7F73FA3D8 _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF7F73FA3D8
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB995AC HeapCreate,GetVersion,HeapSetInformation,0_2_0000026C9CB995AC
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: quHmbPnLFV.exeBinary or memory string: acs.exe
    Source: quHmbPnLFV.exeBinary or memory string: vsserv.exe
    Source: quHmbPnLFV.exeBinary or memory string: avcenter.exe
    Source: quHmbPnLFV.exeBinary or memory string: kxetray.exe
    Source: quHmbPnLFV.exeBinary or memory string: avp.exe
    Source: quHmbPnLFV.exeBinary or memory string: cfp.exe
    Source: quHmbPnLFV.exeBinary or memory string: KSafeTray.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360Safe.exe
    Source: quHmbPnLFV.exeBinary or memory string: rtvscan.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360tray.exe
    Source: quHmbPnLFV.exeBinary or memory string: ashDisp.exe
    Source: quHmbPnLFV.exeBinary or memory string: TMBMSRV.exe
    Source: quHmbPnLFV.exeBinary or memory string: 360Tray.exe
    Source: quHmbPnLFV.exeBinary or memory string: avgwdsvc.exe
    Source: quHmbPnLFV.exeBinary or memory string: AYAgent.aye
    Source: quHmbPnLFV.exeBinary or memory string: RavMonD.exe
    Source: quHmbPnLFV.exeBinary or memory string: QUHLPSVC.EXE
    Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
    Source: quHmbPnLFV.exeBinary or memory string: Mcshield.exe
    Source: quHmbPnLFV.exeBinary or memory string: K7TSecurity.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: quHmbPnLFV.exe PID: 6816, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: quHmbPnLFV.exe PID: 6816, type: MEMORYSTR
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000026C9CB90EF0 htons,bind,0_2_0000026C9CB90EF0
    Source: C:\Users\user\Desktop\quHmbPnLFV.exeCode function: 0_2_0000000140009400 htons,bind,0_2_0000000140009400
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    11
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    2
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    Command and Scripting Interpreter
    Boot or Logon Initialization Scripts1
    Access Token Manipulation
    2
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Screen Capture
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
    Process Injection
    1
    DLL Side-Loading
    Security Account Manager1
    File and Directory Discovery
    SMB/Windows Admin Shares2
    Input Capture
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Masquerading
    NTDS17
    System Information Discovery
    Distributed Component Object Model2
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
    Virtualization/Sandbox Evasion
    LSA Secrets151
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Access Token Manipulation
    Cached Domain Credentials131
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
    Process Injection
    DCSync1
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Indicator Removal
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    quHmbPnLFV.exe8%ReversingLabsWin32.Backdoor.GhostRAT
    quHmbPnLFV.exe11%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.3.drfalse
      high
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      206.238.220.204
      unknownUnited States
      174COGENT-174USfalse
      IP
      192.168.1.2
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1582216
      Start date and time:2024-12-30 03:57:36 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 53s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:quHmbPnLFV.exe
      renamed because original name is a hash value
      Original Sample Name:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa.exe
      Detection:MAL
      Classification:mal80.troj.evad.winEXE@2/6@0/2
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 97%
      • Number of executed functions: 60
      • Number of non-executed functions: 259
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.73.29, 20.190.159.68, 4.175.87.197, 4.245.163.56, 13.107.246.45
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing disassembly code.
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      COGENT-174USloligang.ppc.elfGet hashmaliciousMiraiBrowse
      • 154.44.130.212
      loligang.sh4.elfGet hashmaliciousMiraiBrowse
      • 154.22.1.136
      loligang.mpsl.elfGet hashmaliciousMiraiBrowse
      • 38.237.101.164
      loligang.arm.elfGet hashmaliciousMiraiBrowse
      • 38.142.152.46
      loligang.x86.elfGet hashmaliciousMiraiBrowse
      • 38.53.96.152
      spc.elfGet hashmaliciousMirai, MoobotBrowse
      • 38.34.88.62
      arm7.elfGet hashmaliciousMirai, MoobotBrowse
      • 206.42.118.144
      mips.elfGet hashmaliciousMirai, MoobotBrowse
      • 38.168.204.186
      x86.elfGet hashmaliciousMirai, MoobotBrowse
      • 38.236.228.40
      No context
      No context
      Process:C:\Windows\System32\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):1.0637444992487894
      Encrypted:false
      SSDEEP:192:6FC5/4MZ90hT88SjjZtXpZFQ2wzuiFTZ24lO8Q:cy/4MAho8SjZwzuiFTY4lO8Q
      MD5:1420947A2B80C59C904B3159A42ED778
      SHA1:A6793D8C75474CF71668D1979DCA910C29615A0C
      SHA-256:9FACD4B3CA639AF0A670C5928203CAE6F27A5E56CB85FF22A42857783502C300
      SHA-512:BB3D95660226521D76983942AAD0DC7E645C2723A75672B933ADE4233D945F811400176AC4AF46EBA66516A49B93CE7D1F802A61927AC883FF9D96FF2AFEE2D4
      Malicious:true
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.0.0.1.1.1.4.8.5.4.0.2.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.0.0.1.1.1.5.4.8.8.0.3.1.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.5.e.d.d.5.0.6.-.a.8.1.f.-.4.8.b.8.-.a.8.4.2.-.c.1.6.4.e.9.d.5.7.8.3.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.b.4.6.5.e.8.c.-.4.5.7.1.-.4.3.c.f.-.9.e.0.8.-.b.8.b.9.2.3.4.c.a.e.2.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.q.u.H.m.b.P.n.L.F.V...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.a.0.-.0.0.0.1.-.0.0.1.4.-.b.3.c.a.-.7.7.b.2.6.6.5.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.2.5.5.3.d.3.c.5.e.c.0.1.a.7.5.9.a.9.0.a.0.b.8.3.3.3.d.0.e.d.5.0.0.0.0.f.f.f.f.!.0.0.0.0.3.2.6.c.8.a.7.f.8.6.3.a.9.a.7.c.3.f.6.1.3.5.a.6.a.9.1.6.1.6.8.b.e.a.6.8.b.1.b.e.!.q.u.H.m.b.P.n.L.F.V...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.9././.0.2.:.2.2.
      Process:C:\Windows\System32\WerFault.exe
      File Type:Mini DuMP crash report, 16 streams, Mon Dec 30 02:58:35 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):209400
      Entropy (8bit):1.8254116955934527
      Encrypted:false
      SSDEEP:768:sqNLroZLsiI76Wgkpsa/sfe6koIBmU9R5LgN14SGbLEq:7rqwi/Lk6acfIBP9/LGGb4q
      MD5:8154150080A3759B8B88FF68E1797901
      SHA1:0F8D0BA02FA68AA6B04AD9CD35210842F262A054
      SHA-256:692507F76A323B1BEE05FB6CBAF647F312FF80A32F5CDD13E0E6702EBFE03CA7
      SHA-512:14660121196FE1F27EAF9A69CF6B0CA5CDAA1130A932C52161A2AD74F11CD89C59859FAB1FA66878BCB47C2E13BDDF18F86ED391E51D9A4FC8D7BAC85A813670
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......[.rg............D...............d.......$...h$...........$......................l.......8...........T...........(3..............4B.......... D..............................................................................eJ.......D......Lw......................T...........R.rg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8854
      Entropy (8bit):3.7033850047430286
      Encrypted:false
      SSDEEP:192:R6l7wVeJp8q6Y9eCPgmfyUJxgprO89bHkKfYNm:R6lXJyq6YECPgmfy40HJf/
      MD5:B01ED31E0AFE53A18756A75ACDA8FE18
      SHA1:CB59856BC471C900AEF76D3292D712CE2A2A04B6
      SHA-256:CB884BB7DFF1779B84002F95F8AD5E5D9099C2673077C22B41AEB5D7B5FDD2D4
      SHA-512:615CEA24693993C09AA1471164F94DC4B87AD0A61633DB1F015011EDDF6C9FF95E3D54EFDD6954F25E14BE3BAE7914400A7CCB17B5581AFCA135379643AD3CC4
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.1.6.<./.P.i.
      Process:C:\Windows\System32\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4796
      Entropy (8bit):4.483793217998207
      Encrypted:false
      SSDEEP:48:cvIwWl8zsosJg771I9UvWpW8VY9Ym8M4JTwFFiyq8v0x1w2b/fd:uIjfJI7j+7VhJTXWI1w2jfd
      MD5:541CA126C9BCCD2C6E7A4A4BD5837D1C
      SHA1:C0FC0C93A776167F9E84BB59A40FA1E95C8436F0
      SHA-256:4B2FB3E857D890DADD1B591D129B4C2BE5B99A6BC7EDC9C7BE41D48753D5836E
      SHA-512:77ACE87C73E26229F4EC79AA698CF6AC83FD54BBF8DC25654F49312665AF1AEDC01907593BE63FF6118B134C79817B8D92463E4F6B055A20C98FBDD838E2D22C
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="653401" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Users\user\Desktop\quHmbPnLFV.exe
      File Type:data
      Category:dropped
      Size (bytes):46
      Entropy (8bit):1.0424600748477153
      Encrypted:false
      SSDEEP:3:/lbq:4
      MD5:8CB7B7F28464C3FCBAE8A10C46204572
      SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
      SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
      SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
      Malicious:false
      Reputation:high, very likely benign file
      Preview:........................................user.
      Process:C:\Windows\System32\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.4656131221068485
      Encrypted:false
      SSDEEP:6144:rIXfpi67eLPU9skLmb0b4aWSPKaJG8nAgejZMMhA2gX4WABl0uN+dwBCswSbt:sXD94aWlLZMM6YFHw+t
      MD5:C6C4F2AEF99D63713DD9CBF1DD52E688
      SHA1:44DC3459A03EF3E9E1CC420E412937754C2B66F6
      SHA-256:A4E513091613F12FD9F9500EEDA94683E8E09923F85DB56C4B1CE5A51E932C58
      SHA-512:12F21DE5DEB264FD5E17D6DBAD7331B805BBD7B42EF31314BE2BF1563FFF0064EFFB655A731EDB207393F7312444ECD9ECC8263604D68A7696933BA9F3C0E620
      Malicious:false
      Reputation:low
      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm*...fZ...............................................................................................................................................................................................................................................................................................................................................b..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32+ executable (GUI) x86-64, for MS Windows
      Entropy (8bit):6.639658770449267
      TrID:
      • Win64 Executable GUI (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:quHmbPnLFV.exe
      File size:2'835'456 bytes
      MD5:e4a3903deccb9128673c052ca0a31080
      SHA1:326c8a7f863a9a7c3f6135a6a916168bea68b1be
      SHA256:ee5c76835a63d4656886ab1f9755ee84b7311394bd2ec83e8c8c4170dc48e3aa
      SHA512:ab8b0f92a863c348c6819ba0f7cbc0b7d3669118c9646b239e542cc82768c7685e4326cb113561de23bf5aba5d539be3fdab6c212794ba4894011c40022bcbb2
      SSDEEP:49152:nKAtKQ+IgK2jItFcJsv6tWKFdu9C4FwPg0u7vTPQnWCLZgZ3YPmWjZ5RPpA4Jtuv:n9BFcJsv6tWKFdu9C9yvSWkUh
      TLSH:07D57B06B7A54164E9F7C13D49A3D296E6727C868B229ADF126CBB1D3D332F0193B311
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............r...r...r.......r......<r.......r.......r.......r...,...r...,...r.......r.......r.......r...r..^r..;....r..;....r..;....r.
      Icon Hash:90cececece8e8eb0
      Entrypoint:0x1400e0cd4
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x66D63D8D [Mon Sep 2 22:34:53 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:ec2055fdb052a446adb6979fb0ed0eab
      Instruction
      dec eax
      sub esp, 28h
      call 00007F2354C9BE10h
      dec eax
      add esp, 28h
      jmp 00007F2354C9B0B7h
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      dec eax
      mov ebx, ecx
      jmp 00007F2354C9B251h
      dec eax
      mov ecx, ebx
      call 00007F2354CAAF3Ah
      test eax, eax
      je 00007F2354C9B255h
      dec eax
      mov ecx, ebx
      call 00007F2354CA1B7Eh
      dec eax
      test eax, eax
      je 00007F2354C9B229h
      dec eax
      add esp, 20h
      pop ebx
      ret
      dec eax
      cmp ebx, FFFFFFFFh
      je 00007F2354C9B248h
      call 00007F2354C9C1F0h
      int3
      call 00007F2354C9C20Ah
      int3
      jmp 00007F2354BD8ECCh
      int3
      int3
      int3
      jmp 00007F2354C9B1FCh
      int3
      int3
      int3
      dec eax
      sub esp, 28h
      call 00007F2354C9C38Ch
      test eax, eax
      je 00007F2354C9B263h
      dec eax
      mov eax, dword ptr [00000030h]
      dec eax
      mov ecx, dword ptr [eax+08h]
      jmp 00007F2354C9B247h
      dec eax
      cmp ecx, eax
      je 00007F2354C9B256h
      xor eax, eax
      dec eax
      cmpxchg dword ptr [001CAC78h], ecx
      jne 00007F2354C9B230h
      xor al, al
      dec eax
      add esp, 28h
      ret
      mov al, 01h
      jmp 00007F2354C9B239h
      int3
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      movzx eax, byte ptr [001CAC63h]
      test ecx, ecx
      mov ebx, 00000001h
      cmove eax, ebx
      mov byte ptr [001CAC53h], al
      call 00007F2354C9C1BBh
      call 00007F2354C9D75Ah
      test al, al
      jne 00007F2354C9B246h
      Programming Language:
      • [ C ] VS2015 UPD3.1 build 24215
      • [C++] VS2015 UPD3.1 build 24215
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x275bc00x428.rdata
      IMAGE_DIRECTORY_ENTRY_IMPORT0x275fe80x8c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x2ba0000x2f0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2ad0000xb874.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x2bb0000x1738.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x2558d00x38.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x255a100x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2559100x100.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x1060000x5f8.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x104afb0x104c00c84d40d1f469072f57a689e738938f87False0.4515520134228188data6.42377635279018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x1060000x1714260x171600b3565b4a69ad63ff5f0bccae2be1aeb9False0.4485690302453469data6.12092587750584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x2780000x34cf80x30600eaf56cb727f7c173a8525299caf11fabFalse0.9167877906976745data7.769789455373511IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x2ad0000xb8740xba00cf779a23130b6ed874a178e9a6439f89False0.49380460349462363data6.05031206526366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .gehcont0x2b90000x140x2000b1a7acc4da92921e25ea6fbe01d58f0False0.048828125data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x2ba0000x2f00x4000bb6439b754faf94f529f9817d706a2fFalse0.4033203125data4.3014032271203595IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x2bb0000x17380x1800b78a8906569a1ced329731d1563785d5False0.3839518229166667data5.389524742252251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x2ba0600x289XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5500770416024653
      DLLImport
      KERNEL32.dllIsBadReadPtr, FreeLibrary, GetModuleHandleW, GetCommandLineW, GetCurrentProcessId, LocalFree, VerSetConditionMask, GetLastError, GetVersionExW, FormatMessageW, VerifyVersionInfoW, OutputDebugStringW, GetConsoleWindow, CompareStringW, GetUserDefaultLCID, GetStartupInfoW, GetModuleFileNameW, SetEvent, WaitForSingleObject, CreateEventW, DuplicateHandle, WaitForMultipleObjects, GetCurrentProcess, CreateThread, GetCurrentThread, GetCurrentThreadId, SetThreadPriority, GetThreadPriority, TerminateThread, ResumeThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemInfo, QueryPerformanceCounter, QueryPerformanceFrequency, GetTickCount, WaitForSingleObjectEx, GetSystemDirectoryW, LoadLibraryW, GetSystemTime, GetLocalTime, CreateFileW, GetFileAttributesExW, GetCurrentDirectoryW, CreateDirectoryW, DeleteFileW, FindClose, FindFirstFileW, GetFileAttributesW, GetFileInformationByHandle, GetFullPathNameW, GetLogicalDrives, GetLongPathNameW, RemoveDirectoryW, GetTempPathW, SetErrorMode, DeviceIoControl, CopyFileW, MoveFileW, GetProcessHeap, FileTimeToSystemTime, FlushFileBuffers, GetFileType, ReadFile, SetEndOfFile, SetFilePointerEx, WriteFile, CreateFileMappingW, MapViewOfFile, UnmapViewOfFile, MoveFileExW, ResetEvent, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, GetCurrencyFormatW, GetUserDefaultUILanguage, MultiByteToWideChar, WideCharToMultiByte, FindFirstFileExW, FindNextFileW, GetTimeZoneInformation, GetGeoInfoW, GetUserGeoID, ReleaseMutex, CreateMutexW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, RtlPcToFileHeader, RaiseException, EncodePointer, LoadLibraryExW, GetCommandLineA, ExitProcess, GetModuleHandleExW, ExitThread, FreeLibraryAndExitThread, GetConsoleMode, ReadConsoleW, GetConsoleOutputCP, SetFileAttributesW, SetStdHandle, GetStdHandle, LCMapStringW, HeapReAlloc, SetEnvironmentVariableW, GetCPInfo, GetFileSizeEx, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, WriteConsoleW, HeapSize, GetProcAddress, HeapAlloc, GetNativeSystemInfo, LoadLibraryA, VirtualAlloc, VirtualFree, SetLastError, HeapFree, VirtualProtect, SystemTimeToTzSpecificLocalTime, CloseHandle
      ADVAPI32.dllOpenProcessToken, FreeSid, GetLengthSid, GetTokenInformation, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, CopySid, RegQueryInfoKeyW, RegQueryValueExW, CryptDestroyKey, CryptReleaseContext, CryptDestroyHash, CryptHashData, CryptDeriveKey, CryptCreateHash, CryptDecrypt, CryptAcquireContextW
      WS2_32.dllWSAAsyncSelect
      USER32.dllCharNextExA, CallNextHookEx, KillTimer, SetTimer, MsgWaitForMultipleObjectsEx, GetQueueStatus, UnhookWindowsHookEx, CreateWindowExW, UnregisterClassW, RegisterClassW, DefWindowProcW, PostMessageW, PeekMessageW, DispatchMessageW, TranslateMessage, SetWindowLongPtrW, SetWindowsHookExW, DestroyWindow, GetWindowLongPtrW
      SHELL32.dllSHGetSpecialFolderPathW
      ole32.dllCoCreateInstance, CoTaskMemFree, CoInitialize, CoUninitialize
      NameOrdinalAddress
      z_adler3210x1400aab20
      z_adler32_combine20x1400aae00
      z_adler32_combine6430x1400aae00
      z_compress40x140049aa0
      z_compress250x140049ac0
      z_compressBound60x140049b70
      z_crc3270x1400ab2f0
      z_crc32_combine80x1400ab300
      z_crc32_combine6490x1400ab300
      z_deflate100x140090200
      z_deflateBound110x140090b00
      z_deflateCopy120x140090c10
      z_deflateEnd130x140090e80
      z_deflateInit2_140x140090f60
      z_deflateInit_150x1400911f0
      z_deflateParams160x140091230
      z_deflatePrime170x140091350
      z_deflateReset180x140091390
      z_deflateSetDictionary190x1400914f0
      z_deflateSetHeader200x140091640
      z_deflateTune210x140091670
      z_get_crc_table220x1400ab310
      z_inflate230x140091830
      z_inflateCopy240x140093010
      z_inflateEnd250x140093250
      z_inflateGetHeader260x1400932b0
      z_inflateInit2_270x1400932e0
      z_inflateInit_280x1400933d0
      z_inflateMark290x1400933e0
      z_inflatePrime300x140093440
      z_inflateReset310x1400934a0
      z_inflateReset2320x140093520
      z_inflateSetDictionary330x1400935d0
      z_inflateSync340x1400936c0
      z_inflateSyncPoint350x140093820
      z_inflateUndermine360x140093850
      z_uncompress370x140049b90
      z_zError380x1400ab320
      z_zlibCompileFlags390x1400ab360
      z_zlibVersion400x1400ab370
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Dec 30, 2024 03:58:29.333142042 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:29.338181973 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:29.338422060 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:29.338668108 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:29.343432903 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.187688112 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.188232899 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.193103075 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.193120003 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.193129063 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501389027 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501410007 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501415968 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501421928 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501430035 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.501597881 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.716062069 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716099977 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716105938 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716116905 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716123104 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716130018 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716140985 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716345072 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.716761112 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716804028 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.716837883 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716849089 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716861010 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.716886997 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.761027098 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.930557013 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930594921 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930604935 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930613995 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930618048 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930721998 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.930728912 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930741072 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930752993 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930763006 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.930768013 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.930809975 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.931545019 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931555986 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931592941 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.931873083 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931884050 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931894064 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931904078 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931911945 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.931914091 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:30.931920052 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:30.931951046 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.145873070 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.145922899 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.145945072 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.145967007 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.145992041 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146009922 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146037102 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146172047 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146199942 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146217108 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146220922 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146238089 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146253109 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146612883 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146632910 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146651983 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146658897 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146671057 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146686077 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.146692991 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.146744013 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.147254944 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147301912 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147339106 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147360086 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147371054 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.147384882 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147402048 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.147407055 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.147439957 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.360718966 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360735893 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360743046 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360749006 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360805988 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360814095 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360821009 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360826015 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.360831976 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361006975 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.361305952 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361318111 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361327887 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361337900 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361349106 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361358881 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.361360073 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361381054 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.361393929 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.361978054 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.361989021 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362000942 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362010956 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362023115 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362025976 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.362034082 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362035036 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.362051010 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362066031 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.362088919 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.362674952 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362687111 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362699032 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.362725019 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.416896105 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576189041 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576208115 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576225996 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576236963 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576248884 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576261044 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576273918 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576283932 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576289892 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576303959 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576316118 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576353073 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576786041 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576797962 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576808929 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576839924 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576878071 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.576914072 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.576996088 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577007055 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577018023 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577028990 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577040911 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577069044 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577431917 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577442884 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577455044 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577465057 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577491999 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577505112 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577526093 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577538967 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577549934 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577562094 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577574968 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577575922 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.577579975 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.577629089 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.578366995 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.578377962 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.578389883 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.578402042 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.578413010 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.578459024 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.791376114 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791418076 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791429996 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791435003 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791443110 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791513920 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.791547060 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791558981 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791569948 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791580915 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791590929 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.791591883 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791604996 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791615963 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.791616917 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.791644096 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.791661024 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.792187929 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792197943 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792208910 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792218924 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792228937 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792238951 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792238951 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.792253017 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792263031 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792265892 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.792274952 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792284012 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.792304993 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.792963982 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792974949 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.792992115 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793003082 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793013096 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793023109 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793034077 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793041945 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.793045044 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793052912 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793062925 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793073893 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793112993 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.793134928 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.793759108 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793771029 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793781996 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793792963 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793803930 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793807030 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.793816090 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:31.793821096 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:31.793850899 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.006362915 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006383896 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006397009 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006407022 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006424904 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006436110 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006448984 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006454945 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.006460905 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.006494999 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.007563114 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007579088 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007590055 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007630110 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.007632017 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007643938 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007656097 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007668972 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007671118 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.007699013 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.007807016 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007817984 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007829905 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007839918 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.007857084 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.007889032 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008076906 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008088112 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008109093 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008111954 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008120060 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008131981 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008142948 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008169889 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008574009 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008590937 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008596897 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008606911 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008613110 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008618116 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008625031 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008630037 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008636951 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008644104 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008647919 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008647919 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008651972 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.008708000 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.008728981 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.009361029 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009371996 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009382963 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009392977 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009403944 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009413004 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009423971 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009428024 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.009437084 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009448051 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009448051 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.009459972 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009470940 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009480953 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009491920 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009495020 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.009504080 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.009521008 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.009557009 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.010103941 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.010114908 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.010124922 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.010153055 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.055890083 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.220526934 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220664024 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220674038 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220684052 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220695972 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220705986 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220721960 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220730066 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.220752954 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.220833063 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220850945 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220863104 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220871925 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220876932 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.220876932 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.220937014 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.221098900 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.221107960 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.221124887 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.221134901 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.221146107 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.221153021 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.221179008 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222233057 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222253084 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222265005 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222312927 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222321987 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222332954 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222343922 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222371101 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222466946 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222477913 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222487926 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222534895 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222681999 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222692966 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222704887 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222712994 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222718954 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222743988 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.222879887 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222891092 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222903013 CET666649730206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:32.222948074 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:32.256083965 CET497306666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:34.367402077 CET497316666192.168.2.4206.238.220.204
      Dec 30, 2024 03:58:34.372483969 CET666649731206.238.220.204192.168.2.4
      Dec 30, 2024 03:58:34.372601032 CET497316666192.168.2.4206.238.220.204
      Dec 30, 2024 03:59:24.453845024 CET497316666192.168.2.4206.238.220.204
      TimestampSource PortDest PortSource IPDest IP
      Dec 30, 2024 03:59:19.225480080 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.225481033 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.254039049 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.304018021 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.364006042 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.444020987 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.564059973 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.684052944 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.834041119 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:19.994041920 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:20.184071064 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:20.394047976 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:20.615082979 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:20.854406118 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:21.124042034 CET494316341192.168.2.4192.168.1.2
      Dec 30, 2024 03:59:21.414081097 CET494316341192.168.2.4192.168.1.2

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:21:58:26
      Start date:29/12/2024
      Path:C:\Users\user\Desktop\quHmbPnLFV.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\quHmbPnLFV.exe"
      Imagebase:0x7ff7f7310000
      File size:2'835'456 bytes
      MD5 hash:E4A3903DECCB9128673C052CA0A31080
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:3
      Start time:21:58:34
      Start date:29/12/2024
      Path:C:\Windows\System32\WerFault.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\WerFault.exe -u -p 6816 -s 1376
      Imagebase:0x7ff7da250000
      File size:570'736 bytes
      MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:2.5%
        Dynamic/Decrypted Code Coverage:62.8%
        Signature Coverage:21.9%
        Total number of Nodes:1453
        Total number of Limit Nodes:68
        execution_graph 74791 26c9cb96424 74792 26c9cb9642d 74791->74792 74793 26c9cb9643c 74792->74793 74808 26c9cb9e5f8 25 API calls 5 library calls 74792->74808 74796 26c9cb96459 __SehTransFilter 74793->74796 74797 26c9cb96968 74793->74797 74798 26c9cb969a2 _cftof_l _recalloc 74797->74798 74799 26c9cb969be RtlCaptureContext RtlLookupFunctionEntry 74798->74799 74800 26c9cb969f7 RtlVirtualUnwind 74799->74800 74801 26c9cb96a2e 74799->74801 74802 26c9cb96a4a IsDebuggerPresent 74800->74802 74801->74802 74809 26c9cba8270 74802->74809 74804 26c9cb96a6d UnhandledExceptionFilter 74806 26c9cb96a7c _cftof_l 74804->74806 74805 26c9cb93a20 _cftof_l 7 API calls 74807 26c9cb96a9b 74805->74807 74806->74805 74807->74796 74808->74793 74810 26c9cba8272 74809->74810 74811 14000ca2c 74812 14000ca44 74811->74812 74854 140011aa0 HeapCreate 74812->74854 74815 14000caaf 74859 14000e938 69 API calls 2 library calls 74815->74859 74817 14000ca96 74867 14000f5ec 61 API calls 2 library calls 74817->74867 74818 14000ca9b 74868 14000f38c 61 API calls 5 library calls 74818->74868 74819 14000cab4 74822 14000cada _RTC_Initialize 74819->74822 74825 14000cac1 74819->74825 74826 14000cac6 74819->74826 74860 14001175c 68 API calls __onexitinit 74822->74860 74823 14000caa5 74869 14000edc8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 74823->74869 74870 14000f5ec 61 API calls 2 library calls 74825->74870 74871 14000f38c 61 API calls 5 library calls 74826->74871 74829 14000cad0 74872 14000edc8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 74829->74872 74832 14000cae5 74833 14000caf3 GetCommandLineW 74832->74833 74873 14000f124 61 API calls 2 library calls 74832->74873 74861 1400116d4 63 API calls 2 library calls 74833->74861 74836 14000cb05 74874 1400115e4 62 API calls __wsetargv 74836->74874 74838 14000cb11 74839 14000cb15 74838->74839 74840 14000cb1f 74838->74840 74875 14000f124 61 API calls 2 library calls 74839->74875 74862 140011314 61 API calls 5 library calls 74840->74862 74843 14000cb24 74844 14000cb32 74843->74844 74845 14000cb28 74843->74845 74863 14000eeac 72 API calls 2 library calls 74844->74863 74876 14000f124 61 API calls 2 library calls 74845->74876 74848 14000cb3c 74849 14000cb47 74848->74849 74850 14000cb40 74848->74850 74864 1400041b0 6 API calls 74849->74864 74877 14000f124 61 API calls 2 library calls 74850->74877 74853 14000cb67 74855 14000ca89 74854->74855 74856 140011ac8 GetVersion 74854->74856 74855->74815 74855->74817 74855->74818 74857 140011ad2 HeapSetInformation 74856->74857 74858 140011aec 74856->74858 74857->74858 74858->74855 74859->74819 74860->74832 74861->74836 74862->74843 74863->74848 74878 140003310 74864->74878 74867->74818 74868->74823 74870->74826 74871->74829 74874->74838 74879 140003326 memcpy_s 74878->74879 74979 140003aa7 CreateThread CreateThread WaitForSingleObject CloseHandle Sleep 74878->74979 74980 1400045a0 73 API calls memcpy_s 74879->74980 74881 14000339d 74981 140003030 73 API calls 3 library calls 74881->74981 74883 1400033b7 74982 1400045a0 73 API calls memcpy_s 74883->74982 74885 1400033e7 74983 140003030 73 API calls 3 library calls 74885->74983 74887 140003401 74984 1400045a0 73 API calls memcpy_s 74887->74984 74889 140003431 74985 140003030 73 API calls 3 library calls 74889->74985 74891 14000344b 74986 1400045a0 73 API calls memcpy_s 74891->74986 74893 14000347b 74987 140003030 73 API calls 3 library calls 74893->74987 74895 140003495 74988 1400045a0 73 API calls memcpy_s 74895->74988 74897 1400034c5 74989 140003030 73 API calls 3 library calls 74897->74989 74899 1400034df 74990 1400045a0 73 API calls memcpy_s 74899->74990 74901 14000350f 74991 140003030 73 API calls 3 library calls 74901->74991 74903 140003529 74992 1400045a0 73 API calls memcpy_s 74903->74992 74905 140003559 74993 140003030 73 API calls 3 library calls 74905->74993 74907 140003573 74994 1400045a0 73 API calls memcpy_s 74907->74994 74909 1400035a3 74995 140003030 73 API calls 3 library calls 74909->74995 74911 1400035bd 74996 1400045a0 73 API calls memcpy_s 74911->74996 74913 1400035ed 74997 140003030 73 API calls 3 library calls 74913->74997 74915 140003607 74998 1400045a0 73 API calls memcpy_s 74915->74998 74917 140003637 74999 140003030 73 API calls 3 library calls 74917->74999 74919 140003651 75000 1400045a0 73 API calls memcpy_s 74919->75000 74921 140003681 75001 140003030 73 API calls 3 library calls 74921->75001 74923 14000369b 75002 1400045a0 73 API calls memcpy_s 74923->75002 74925 1400036cb 75003 140003030 73 API calls 3 library calls 74925->75003 74927 1400036e5 75004 1400045a0 73 API calls memcpy_s 74927->75004 74929 140003715 75005 140003030 73 API calls 3 library calls 74929->75005 74931 14000372f 75006 1400045a0 73 API calls memcpy_s 74931->75006 74933 14000375f 75007 140003030 73 API calls 3 library calls 74933->75007 74935 140003779 75008 1400045a0 73 API calls memcpy_s 74935->75008 74937 1400037a9 75009 140003030 73 API calls 3 library calls 74937->75009 74939 1400037c3 75010 1400045a0 73 API calls memcpy_s 74939->75010 74941 1400037f3 75011 140003030 73 API calls 3 library calls 74941->75011 74943 14000380d 75012 1400045a0 73 API calls memcpy_s 74943->75012 74945 14000383d 75013 140003030 73 API calls 3 library calls 74945->75013 74947 140003857 75014 1400045a0 73 API calls memcpy_s 74947->75014 74949 140003887 75015 140003030 73 API calls 3 library calls 74949->75015 74951 1400038a1 75016 1400045a0 73 API calls memcpy_s 74951->75016 74953 1400038d1 75017 140003030 73 API calls 3 library calls 74953->75017 74955 1400038eb 75018 1400045a0 73 API calls memcpy_s 74955->75018 74957 14000391b 75019 140003030 73 API calls 3 library calls 74957->75019 74959 140003935 75020 1400045a0 73 API calls memcpy_s 74959->75020 74961 140003965 75021 140003030 73 API calls 3 library calls 74961->75021 74963 14000397f 75022 1400045a0 73 API calls memcpy_s 74963->75022 74965 1400039af 75023 140003030 73 API calls 3 library calls 74965->75023 74967 1400039c9 75024 1400045a0 73 API calls memcpy_s 74967->75024 74969 1400039f9 75025 140003030 73 API calls 3 library calls 74969->75025 74971 140003a13 75026 1400045a0 73 API calls memcpy_s 74971->75026 74973 140003a43 75027 140003030 73 API calls 3 library calls 74973->75027 74975 140003a5d 75028 1400045a0 73 API calls memcpy_s 74975->75028 74977 140003a8d 75029 140003030 73 API calls 3 library calls 74977->75029 74979->74853 74980->74881 74981->74883 74982->74885 74983->74887 74984->74889 74985->74891 74986->74893 74987->74895 74988->74897 74989->74899 74990->74901 74991->74903 74992->74905 74993->74907 74994->74909 74995->74911 74996->74913 74997->74915 74998->74917 74999->74919 75000->74921 75001->74923 75002->74925 75003->74927 75004->74929 75005->74931 75006->74933 75007->74935 75008->74937 75009->74939 75010->74941 75011->74943 75012->74945 75013->74947 75014->74949 75015->74951 75016->74953 75017->74955 75018->74957 75019->74959 75020->74961 75021->74963 75022->74965 75023->74967 75024->74969 75025->74971 75026->74973 75027->74975 75028->74977 75029->74979 75030 26c9cb8b9a0 75052 26c9cb953d0 75030->75052 75032 26c9cb8b9ec Sleep GetLocalTime wsprintfW 75037 26c9cb8ba60 75032->75037 75033 26c9cb93e78 31 API calls 75033->75037 75034 26c9cb93d84 _Ref_count 25 API calls 75034->75037 75035 26c9cb81de0 34 API calls 75035->75037 75036 26c9cb813b0 9 API calls 75036->75037 75037->75033 75037->75034 75037->75035 75037->75036 75038 26c9cb8bacf Sleep EnumWindows 75037->75038 75042 26c9cb8bb5b 75037->75042 75039 26c9cb8bb29 Sleep 75038->75039 75040 26c9cb8bafb 75038->75040 75039->75037 75041 26c9cb8bb00 Sleep EnumWindows 75040->75041 75041->75039 75041->75041 75043 26c9cb8bb88 CreateEventA 75042->75043 75044 26c9cb93e0c malloc 24 API calls 75043->75044 75049 26c9cb8bbcd 75044->75049 75045 26c9cb82b00 162 API calls 75045->75049 75046 26c9cb93fec 32 API calls 75046->75049 75047 26c9cb8bc16 CloseHandle 75047->75037 75048 26c9cb8bc5a Sleep 75048->75049 75049->75045 75049->75046 75049->75047 75049->75048 75050 26c9cb8bcb1 WaitForSingleObject CloseHandle CloseHandle 75049->75050 75051 26c9cb8bc7d WaitForSingleObject CloseHandle CloseHandle 75049->75051 75050->75037 75051->75037 75053 14001dff0 WSAStartup 75058 14000dd6c 75053->75058 75057 14001e044 75072 14000dc60 71 API calls 2 library calls 75058->75072 75060 14000dd75 75061 14000bf30 75060->75061 75064 14000bf39 75061->75064 75062 14000dee8 RtlCaptureContext RtlLookupFunctionEntry 75065 14000df2c RtlVirtualUnwind 75062->75065 75066 14000df6d 75062->75066 75063 14000bf44 75063->75057 75064->75062 75064->75063 75067 14000df8f IsDebuggerPresent 75065->75067 75066->75067 75073 14001625c 75067->75073 75069 14000dfee SetUnhandledExceptionFilter UnhandledExceptionFilter 75070 14000e016 GetCurrentProcess TerminateProcess 75069->75070 75071 14000e00c _fltout2 75069->75071 75070->75057 75071->75070 75072->75060 75073->75069 75074 1400014f0 75075 140001522 ResetEvent timeGetTime socket 75074->75075 75076 140001587 lstrlenW WideCharToMultiByte 75075->75076 75085 140001580 75075->75085 75089 14000c364 75076->75089 75078 14000bf30 _fltout2 8 API calls 75080 140001733 75078->75080 75083 140001626 htons connect 75084 14000166c setsockopt 75083->75084 75083->75085 75086 1400016e8 75084->75086 75087 140001699 WSAIoctl 75084->75087 75085->75078 75107 14000c4d8 75086->75107 75087->75086 75093 14000c36f 75089->75093 75091 1400015d2 lstrlenW WideCharToMultiByte gethostbyname 75101 14000c294 75091->75101 75093->75091 75096 14000c38e 75093->75096 75125 14000cc4c 75093->75125 75142 14000e5e0 DecodePointer 75093->75142 75094 14000c3df 75143 14000c9b4 61 API calls std::exception::operator= 75094->75143 75096->75094 75098 14000dd6c _cinit 71 API calls 75096->75098 75097 14000c3f0 75144 14000cbb8 RaiseException memcpy_s 75097->75144 75098->75094 75100 14000c406 75102 14000cdd8 75101->75102 75103 140001619 75102->75103 75104 14000cddd HeapFree 75102->75104 75103->75083 75103->75085 75104->75103 75105 14000cdf8 75104->75105 75153 14000e550 61 API calls __doserrno 75105->75153 75108 14000c503 75107->75108 75109 14000c518 75107->75109 75173 14000e550 61 API calls __doserrno 75108->75173 75154 14000f1cc 75109->75154 75111 14000c508 75174 14000e4e8 17 API calls _invalid_parameter_noinfo 75111->75174 75114 14000c513 75114->75085 75116 14000c59c 75175 14000cdd8 61 API calls _errno 75116->75175 75120 14000c5a4 75120->75114 75176 14000e590 61 API calls 2 library calls 75120->75176 75124 14000c594 GetLastError 75124->75116 75126 14000cce0 75125->75126 75139 14000cc64 75125->75139 75151 14000e5e0 DecodePointer 75126->75151 75128 14000cce5 75152 14000e550 61 API calls __doserrno 75128->75152 75129 14000cc9c HeapAlloc 75133 14000ccd5 75129->75133 75129->75139 75132 14000ccc5 75149 14000e550 61 API calls __doserrno 75132->75149 75133->75093 75137 14000ccca 75150 14000e550 61 API calls __doserrno 75137->75150 75139->75129 75139->75132 75139->75137 75140 14000cc7c 75139->75140 75148 14000e5e0 DecodePointer 75139->75148 75140->75129 75145 14000f5ec 61 API calls 2 library calls 75140->75145 75146 14000f38c 61 API calls 5 library calls 75140->75146 75147 14000edc8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 75140->75147 75142->75093 75143->75097 75144->75100 75145->75140 75146->75140 75148->75139 75149->75137 75150->75133 75151->75128 75152->75133 75153->75103 75155 14000f1f1 75154->75155 75157 14000c52c 75155->75157 75158 14000f20f Sleep 75155->75158 75177 140011bac 75155->75177 75157->75116 75159 14000e7a0 75157->75159 75158->75155 75158->75157 75187 14000e71c GetLastError FlsGetValue 75159->75187 75161 14000e7ab 75162 14000c539 75161->75162 75199 14000f124 61 API calls 2 library calls 75161->75199 75164 14000e664 75162->75164 75201 140016470 75164->75201 75166 14000e6bd 75167 140016370 _freefls LeaveCriticalSection 75166->75167 75168 14000e6d2 75167->75168 75169 140016470 _lock 61 API calls 75168->75169 75170 14000e6dc __doserrno 75169->75170 75171 140016370 _freefls LeaveCriticalSection 75170->75171 75172 14000c548 CreateThread 75171->75172 75172->75114 75172->75124 75173->75111 75174->75114 75175->75120 75176->75114 75178 140011bc1 75177->75178 75179 140011bde 75177->75179 75178->75179 75180 140011bcf 75178->75180 75182 140011bf6 HeapAlloc 75179->75182 75183 140011bd4 75179->75183 75186 14000e5e0 DecodePointer 75179->75186 75185 14000e550 61 API calls __doserrno 75180->75185 75182->75179 75182->75183 75183->75155 75185->75183 75186->75179 75188 14000e742 75187->75188 75189 14000e78a SetLastError 75187->75189 75190 14000f1cc __onexitinit 56 API calls 75188->75190 75189->75161 75191 14000e74f 75190->75191 75191->75189 75192 14000e757 FlsSetValue 75191->75192 75193 14000e783 75192->75193 75194 14000e76d 75192->75194 75200 14000cdd8 61 API calls _errno 75193->75200 75195 14000e664 __doserrno 56 API calls 75194->75195 75197 14000e774 GetCurrentThreadId 75195->75197 75197->75189 75198 14000e788 75198->75189 75200->75198 75202 14001648e 75201->75202 75203 14001649f EnterCriticalSection 75201->75203 75207 140016388 61 API calls 6 library calls 75202->75207 75205 140016493 75205->75203 75208 14000f124 61 API calls 2 library calls 75205->75208 75207->75205 75209 140006270 setsockopt 75210 140001470 setsockopt CancelIo closesocket SetEvent 75211 140001870 75212 1400018a0 75211->75212 75213 14000192e 75212->75213 75231 14001cd4c 75212->75231 75216 1400019e5 75213->75216 75217 140001967 75213->75217 75235 140001070 75216->75235 75219 14001cd4c 62 API calls 75217->75219 75221 14000197d VirtualAlloc 75219->75221 75220 140001a1d 75242 140001a80 75220->75242 75223 1400019a7 memcpy_s 75221->75223 75222 140001900 memcpy_s 75222->75213 75224 140001920 VirtualFree 75222->75224 75228 1400019d5 75223->75228 75229 1400019c7 VirtualFree 75223->75229 75224->75213 75228->75216 75229->75228 75230 140001a67 75232 14001cd88 75231->75232 75234 1400018d6 VirtualAlloc 75231->75234 75232->75234 75257 14001cf1c 62 API calls 4 library calls 75232->75257 75234->75222 75236 140001099 75235->75236 75237 14001cd4c 62 API calls 75236->75237 75239 140001129 memcpy_s 75236->75239 75238 1400010d2 VirtualAlloc 75237->75238 75240 1400010fa memcpy_s 75238->75240 75239->75220 75240->75239 75241 14000111b VirtualFree 75240->75241 75241->75239 75246 140001b11 75242->75246 75247 140001ab8 75242->75247 75243 140001ad0 send 75243->75247 75244 140001b20 send 75245 140001a51 75244->75245 75244->75246 75248 1400011e0 75245->75248 75246->75244 75246->75245 75247->75243 75247->75245 75247->75246 75249 1400011f0 75248->75249 75250 1400011fa 75249->75250 75251 14001cd4c 62 API calls 75249->75251 75250->75230 75252 14000121f 75251->75252 75253 140001239 VirtualAlloc 75252->75253 75254 14000122c 75252->75254 75255 140001263 memcpy_s 75253->75255 75254->75230 75256 140001279 VirtualFree 75255->75256 75256->75230 75257->75234 75258 14000b3b0 75259 14000b3f1 75258->75259 75263 14000b3f6 75258->75263 75271 14000cdd8 61 API calls _errno 75259->75271 75260 14000b4d6 SetWaitableTimer 75262 14000bf30 _fltout2 8 API calls 75260->75262 75264 14000b51e 75262->75264 75263->75260 75265 14000b4c0 75263->75265 75266 14000cc4c malloc 61 API calls 75263->75266 75265->75260 75268 14000b457 75266->75268 75267 14000b472 75273 14000cbb8 RaiseException memcpy_s 75267->75273 75268->75265 75268->75267 75272 14000cdd8 61 API calls _errno 75268->75272 75271->75263 75272->75267 75273->75265 75274 26c9cb81750 75286 26c9cb93e78 75274->75286 75276 26c9cb8184b 75303 26c9cb93a20 75276->75303 75277 26c9cb81824 75277->75276 75297 26c9cb93d84 75277->75297 75278 26c9cb817d0 select 75278->75277 75281 26c9cb81780 memcpy_s 75278->75281 75281->75277 75281->75278 75283 26c9cb817f4 recv 75281->75283 75282 26c9cb8185e 75283->75277 75284 26c9cb81814 75283->75284 75296 26c9cb81bc0 27 API calls 2 library calls 75284->75296 75290 26c9cb93e83 75286->75290 75288 26c9cb93e9c 75288->75281 75290->75288 75293 26c9cb93ea2 75290->75293 75314 26c9cb946d8 75290->75314 75329 26c9cb96de8 DecodePointer 75290->75329 75291 26c9cb93ef3 75331 26c9cb9435c 24 API calls std::exception::operator= 75291->75331 75293->75291 75330 26c9cb94a08 31 API calls _cinit 75293->75330 75294 26c9cb93f04 _RunAllParam 75296->75281 75298 26c9cb94698 75297->75298 75299 26c9cb946cf 75298->75299 75300 26c9cb9469d HeapFree 75298->75300 75299->75276 75300->75299 75301 26c9cb946b8 75300->75301 75339 26c9cb96bc0 24 API calls __doserrno 75301->75339 75304 26c9cb93a29 75303->75304 75305 26c9cb96558 RtlCaptureContext RtlLookupFunctionEntry 75304->75305 75306 26c9cb93a34 75304->75306 75307 26c9cb965dd 75305->75307 75308 26c9cb9659c RtlVirtualUnwind 75305->75308 75306->75282 75309 26c9cb965ff IsDebuggerPresent 75307->75309 75308->75309 75310 26c9cb9665e _cftof_l 75309->75310 75311 26c9cb96666 UnhandledExceptionFilter 75310->75311 75312 26c9cb96686 GetCurrentProcess TerminateProcess 75311->75312 75313 26c9cb9667c _cftof_l 75311->75313 75312->75282 75313->75312 75315 26c9cb9476c 75314->75315 75320 26c9cb946f0 malloc 75314->75320 75337 26c9cb96de8 DecodePointer 75315->75337 75317 26c9cb94708 75317->75320 75332 26c9cb97dec 24 API calls 2 library calls 75317->75332 75333 26c9cb97b8c 24 API calls 4 library calls 75317->75333 75318 26c9cb94771 75338 26c9cb96bc0 24 API calls __doserrno 75318->75338 75320->75317 75322 26c9cb94761 75320->75322 75324 26c9cb94751 75320->75324 75327 26c9cb94756 75320->75327 75334 26c9cb96de8 DecodePointer 75320->75334 75322->75290 75335 26c9cb96bc0 24 API calls __doserrno 75324->75335 75336 26c9cb96bc0 24 API calls __doserrno 75327->75336 75329->75290 75330->75291 75331->75294 75332->75317 75333->75317 75334->75320 75335->75327 75336->75322 75337->75318 75338->75322 75339->75299 75340 14000a700 GetCurrentThreadId 75385 140008b90 75340->75385 75342 14000a74f GetCurrentThreadId 75343 14000a763 _flush 75342->75343 75344 14000a8a0 75343->75344 75345 14000c364 72 API calls 75343->75345 75352 14000a8bf 75344->75352 75404 14000cdd8 61 API calls _errno 75344->75404 75346 14000a814 75345->75346 75348 14000a846 75346->75348 75349 14000a820 CreateWaitableTimerW 75346->75349 75350 14000a849 SetWaitableTimer 75348->75350 75349->75350 75351 14000a83c 75349->75351 75350->75344 75403 140004a70 RaiseException __SehTransFilter 75351->75403 75356 14000cc4c malloc 61 API calls 75352->75356 75358 14000a986 75352->75358 75354 14000aab2 GetCurrentThreadId 75367 14000aac6 GetCurrentThreadId 75354->75367 75355 14000a9c0 WSAWaitForMultipleEvents 75355->75358 75363 14000a91e 75356->75363 75358->75354 75358->75355 75361 14000aaaf 75358->75361 75371 14000aa88 75358->75371 75373 14000aa13 75358->75373 75384 14000aa64 GetLastError 75358->75384 75386 14000a550 WSAEnumNetworkEvents 75358->75386 75407 140009f70 75358->75407 75361->75354 75362 14000aaf5 75364 14000ab20 75362->75364 75369 14000ab03 CloseHandle 75362->75369 75370 14000ab18 75362->75370 75363->75358 75366 14000a939 75363->75366 75405 14000cdd8 61 API calls _errno 75363->75405 75372 14000bf30 _fltout2 8 API calls 75364->75372 75406 14000cbb8 RaiseException memcpy_s 75366->75406 75367->75362 75369->75370 75375 14000ab0d 75369->75375 75377 14000c294 _RunAllParam 62 API calls 75370->75377 75374 14000aa98 WSAGetLastError 75371->75374 75425 140004a70 RaiseException __SehTransFilter 75371->75425 75379 14000ab2e 75372->75379 75373->75354 75373->75358 75423 140009790 recv SetLastError GetLastError WSAGetLastError 75373->75423 75424 140009640 send WSAGetLastError 75373->75424 75374->75354 75426 140004a70 RaiseException __SehTransFilter 75375->75426 75377->75364 75382 14000aa97 75382->75374 75383 14000ab17 75383->75370 75384->75354 75385->75342 75387 14000a596 WSAGetLastError 75386->75387 75393 14000a5e7 75386->75393 75389 14000a5a7 WSAResetEvent 75387->75389 75391 14000a5dd 75389->75391 75389->75393 75390 14000a62a 75392 14000a684 75390->75392 75397 14000a643 75390->75397 75400 14000a64f 75390->75400 75439 140004a70 RaiseException __SehTransFilter 75391->75439 75395 14000bf30 _fltout2 8 API calls 75392->75395 75393->75390 75393->75392 75427 140009290 75393->75427 75398 14000a6e4 75395->75398 75440 140009790 recv SetLastError GetLastError WSAGetLastError 75397->75440 75398->75358 75400->75392 75402 140009f70 10 API calls 75400->75402 75401 14000a64b 75401->75400 75402->75392 75403->75348 75404->75352 75405->75366 75406->75358 75442 140009900 75407->75442 75409 14000a111 75409->75358 75410 140009fc0 send 75411 140009fdf EnterCriticalSection LeaveCriticalSection SetLastError 75410->75411 75418 140009f9b 75410->75418 75411->75418 75412 14000a07e WSAGetLastError 75413 14000a08b EnterCriticalSection 75412->75413 75419 14000a0e1 75412->75419 75416 14000a0a4 LeaveCriticalSection 75413->75416 75414 14000a079 75414->75409 75449 140008b70 HeapFree 75414->75449 75416->75409 75418->75410 75418->75412 75418->75414 75421 140009900 2 API calls 75418->75421 75447 140008b70 HeapFree 75418->75447 75419->75409 75448 140008b70 HeapFree 75419->75448 75421->75418 75423->75373 75424->75373 75425->75382 75426->75383 75428 1400092c0 WSAEventSelect 75427->75428 75429 1400092a0 75427->75429 75430 1400092d9 WSAGetLastError 75428->75430 75431 1400092ff SetLastError 75428->75431 75429->75390 75430->75390 75432 140009322 75431->75432 75433 140009365 GetLastError 75432->75433 75434 140009327 send 75432->75434 75433->75390 75435 140009359 75434->75435 75436 14000933e WSAGetLastError 75434->75436 75435->75390 75436->75435 75437 14000934b 75436->75437 75437->75435 75441 140004a70 RaiseException __SehTransFilter 75437->75441 75439->75393 75440->75401 75441->75435 75443 14000991d EnterCriticalSection 75442->75443 75444 1400099a0 75442->75444 75445 140009944 LeaveCriticalSection 75443->75445 75444->75418 75445->75418 75450 140001b80 WaitForSingleObject SleepEx WaitForSingleObject 75451 140003ac0 75466 14000c9e0 75451->75466 75453 140003b08 Sleep 75458 140003b30 75453->75458 75454 140003b40 SleepEx 75454->75454 75454->75458 75455 1400012c0 6 API calls 75455->75458 75456 14000c364 72 API calls 75456->75458 75457 14000c294 _RunAllParam 62 API calls 75457->75458 75458->75454 75458->75455 75458->75456 75458->75457 75459 14000c2f8 61 API calls _FF_MSGBANNER 75458->75459 75460 140001e00 75 API calls 75458->75460 75461 1400013b0 10 API calls 75458->75461 75462 140003cac SleepEx 75458->75462 75463 140003cff CreateEventA 75458->75463 75464 140003d4a SleepEx 75458->75464 75465 140003d77 CloseHandle 75458->75465 75459->75458 75460->75458 75461->75458 75462->75458 75463->75458 75464->75458 75465->75458 75467 1400112b0 75466->75467 75468 1400066c0 75469 1400066fb WSAStringToAddressW 75468->75469 75470 1400066dd 75468->75470 75473 14000672b 75469->75473 75474 1400066ee 75469->75474 75470->75469 75471 1400066e3 WSASetLastError 75470->75471 75471->75474 75475 14000673d 75473->75475 75476 140006730 htons 75473->75476 75476->75475 75477 26c9cb40000 75479 26c9cb40448 75477->75479 75478 26c9cb405b1 75479->75478 75481 26c9cb400dc 75479->75481 75482 26c9cb40116 75481->75482 75486 26c9cb4032a 75481->75486 75483 26c9cb40147 VirtualAlloc 75482->75483 75482->75486 75485 26c9cb40168 75483->75485 75483->75486 75484 26c9cb402b7 LoadLibraryA 75484->75485 75484->75486 75485->75484 75485->75486 75486->75478 75487 7ff7f7401c00 75488 7ff7f7401c4b 75487->75488 75492 7ff7f7401c0f _invalid_parameter_noinfo 75487->75492 75495 7ff7f73f8cf4 14 API calls _invalid_parameter_noinfo 75488->75495 75489 7ff7f7401c32 HeapAlloc 75491 7ff7f7401c49 75489->75491 75489->75492 75492->75488 75492->75489 75494 7ff7f74009f0 EnterCriticalSection LeaveCriticalSection std::bad_exception::bad_exception 75492->75494 75494->75492 75495->75491 75496 7ff7f7314100 75507 7ff7f7314fc0 75496->75507 75503 7ff7f7314176 75560 7ff7f73f0a50 75503->75560 75569 7ff7f73f0ce8 75507->75569 75510 7ff7f7315013 75578 7ff7f732f730 75510->75578 75516 7ff7f7313fb0 CryptAcquireContextW 75517 7ff7f7314027 CryptCreateHash 75516->75517 75518 7ff7f7313ff3 CryptAcquireContextW 75516->75518 75520 7ff7f73140c7 CryptReleaseContext 75517->75520 75521 7ff7f7314049 CryptHashData 75517->75521 75518->75517 75519 7ff7f7314016 75518->75519 76148 7ff7f7313f50 69 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75519->76148 75524 7ff7f73140d3 CloseHandle CloseHandle 75520->75524 75522 7ff7f73140bd CryptDestroyHash 75521->75522 75523 7ff7f7314065 CryptDeriveKey 75521->75523 75522->75520 75523->75522 75526 7ff7f731408b CryptDecrypt CryptDestroyKey 75523->75526 75527 7ff7f73f0a50 _handle_error 8 API calls 75524->75527 75526->75522 75529 7ff7f73140f9 75527->75529 75528 7ff7f7314022 75528->75524 75530 7ff7f7314610 75529->75530 75531 7ff7f7314641 GetModuleHandleW GetProcAddress 75530->75531 75532 7ff7f7314665 75530->75532 75531->75532 75533 7ff7f7314b72 SetLastError 75532->75533 75534 7ff7f73146a2 SetLastError 75532->75534 75539 7ff7f73146b4 75532->75539 75556 7ff7f7314874 75534->75556 75535 7ff7f73f0a50 _handle_error 8 API calls 75536 7ff7f731414f 75535->75536 75559 7ff7f7315440 127 API calls 3 library calls 75536->75559 75537 7ff7f7314728 GetNativeSystemInfo 75537->75533 75538 7ff7f731475e VirtualAlloc 75537->75538 75540 7ff7f7314787 VirtualAlloc 75538->75540 75541 7ff7f73147b4 GetProcessHeap HeapAlloc 75538->75541 75539->75533 75539->75537 75540->75541 75542 7ff7f73147a4 SetLastError 75540->75542 75543 7ff7f73147ff 75541->75543 75544 7ff7f73147e1 VirtualFree SetLastError 75541->75544 75542->75556 75545 7ff7f73148b8 VirtualAlloc 75543->75545 75546 7ff7f7314861 SetLastError 75543->75546 75544->75556 75552 7ff7f73148e2 memcpy_s 75545->75552 75547 7ff7f731486c 75546->75547 76164 7ff7f7314b90 GetProcessHeap HeapFree __std_exception_destroy 75547->76164 75549 7ff7f7314973 VirtualAlloc 75549->75547 75549->75552 75552->75546 75552->75547 75552->75549 75555 7ff7f73149ca 75552->75555 75555->75547 76149 7ff7f7314410 75555->76149 75556->75535 75557 7ff7f7314af6 RtlAddFunctionTable 75557->75556 75558 7ff7f7314aa8 75558->75556 75558->75557 75559->75503 75561 7ff7f73f0a5a 75560->75561 75562 7ff7f73f1640 IsProcessorFeaturePresent 75561->75562 75563 7ff7f7314185 75561->75563 75564 7ff7f73f1657 75562->75564 76176 7ff7f73f1834 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 75564->76176 75566 7ff7f73f166a 76177 7ff7f73f160c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 75566->76177 75572 7ff7f73f0cf3 75569->75572 75570 7ff7f7314ff8 75570->75510 75611 7ff7f7315060 105 API calls 3 library calls 75570->75611 75572->75570 75573 7ff7f73f0d12 75572->75573 75612 7ff7f74009f0 EnterCriticalSection LeaveCriticalSection std::bad_exception::bad_exception 75572->75612 75574 7ff7f73f0d1d 75573->75574 75613 7ff7f73f1cc8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 75573->75613 75614 7ff7f73f1ce8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 75574->75614 75577 7ff7f73f0d23 75579 7ff7f732f76a 75578->75579 75581 7ff7f732f780 std::bad_exception::bad_exception 75579->75581 75615 7ff7f733f9e0 105 API calls std::bad_exception::bad_exception 75579->75615 75582 7ff7f7315022 75581->75582 75616 7ff7f73316d0 88 API calls 2 library calls 75581->75616 75589 7ff7f7316dc0 75582->75589 75584 7ff7f732f7a5 75585 7ff7f732f7d5 75584->75585 75586 7ff7f732f7b3 75584->75586 75618 7ff7f73351f0 105 API calls 3 library calls 75585->75618 75586->75582 75617 7ff7f7331490 24 API calls std::bad_exception::bad_exception 75586->75617 75590 7ff7f7316e0d 75589->75590 75591 7ff7f7316e11 75589->75591 75594 7ff7f7316e3b Concurrency::details::ExternalContextBase::~ExternalContextBase 75590->75594 75714 7ff7f7336460 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75590->75714 75713 7ff7f7316f90 43 API calls 2 library calls 75591->75713 75619 7ff7f733b900 75594->75619 75595 7ff7f7316e2f 75595->75594 75715 7ff7f7316f90 43 API calls 2 library calls 75595->75715 75598 7ff7f7316e99 75599 7ff7f7316ec2 75598->75599 75692 7ff7f7316660 75598->75692 75601 7ff7f7316ee0 75599->75601 75716 7ff7f7333e10 105 API calls 2 library calls 75599->75716 75602 7ff7f7316f24 75601->75602 75717 7ff7f7316f90 43 API calls 2 library calls 75601->75717 75603 7ff7f7316f3b 75602->75603 75718 7ff7f7315c80 139 API calls 2 library calls 75602->75718 75697 7ff7f73178d0 75603->75697 75611->75510 75612->75572 75614->75577 75615->75581 75616->75584 75617->75582 75618->75582 75719 7ff7f7319df0 75619->75719 75621 7ff7f733b938 75622 7ff7f733bc94 75621->75622 75734 7ff7f7316730 54 API calls 75621->75734 75623 7ff7f7319df0 std::bad_exception::bad_exception 24 API calls 75622->75623 75625 7ff7f733bca5 75623->75625 75627 7ff7f733be4a 75625->75627 75750 7ff7f73496d0 113 API calls std::bad_exception::bad_exception 75625->75750 75626 7ff7f733b976 75735 7ff7f7336a60 105 API calls 2 library calls 75626->75735 75725 7ff7f738c830 75627->75725 75630 7ff7f733b983 Concurrency::details::ExternalContextBase::~ExternalContextBase 75736 7ff7f7336cd0 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75630->75736 75633 7ff7f733b9c9 75688 7ff7f733bc8a 75633->75688 75737 7ff7f733c7b0 9 API calls 2 library calls 75633->75737 75635 7ff7f733be76 Concurrency::details::ExternalContextBase::~ExternalContextBase 75636 7ff7f733c174 75635->75636 75755 7ff7f7336a60 105 API calls 2 library calls 75635->75755 75666 7ff7f733c1b5 Concurrency::details::ExternalContextBase::~ExternalContextBase 75636->75666 75766 7ff7f733a460 48 API calls std::bad_exception::bad_exception 75636->75766 75638 7ff7f733bcd3 Concurrency::details::ExternalContextBase::~ExternalContextBase 75751 7ff7f733ccc0 113 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75638->75751 75641 7ff7f733bec0 75756 7ff7f7336cd0 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75641->75756 75643 7ff7f733bd3d 75752 7ff7f733cc90 24 API calls 75643->75752 75645 7ff7f733c190 75767 7ff7f733d1e0 24 API calls 2 library calls 75645->75767 75648 7ff7f733bed6 75691 7ff7f733c16a 75648->75691 75757 7ff7f733c7b0 9 API calls 2 library calls 75648->75757 75650 7ff7f733bace 75745 7ff7f733ccc0 113 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75650->75745 75651 7ff7f733b9d6 75682 7ff7f733ba3a Concurrency::details::ExternalContextBase::~ExternalContextBase 75651->75682 75738 7ff7f7339d00 75651->75738 75652 7ff7f733bd4b 75753 7ff7f733ae20 24 API calls 75652->75753 75653 7ff7f733c1a3 75653->75666 75768 7ff7f733a920 44 API calls std::bad_exception::bad_exception 75653->75768 75659 7ff7f733bae7 75746 7ff7f733cc90 24 API calls 75659->75746 75660 7ff7f733b9f8 75742 7ff7f733d140 24 API calls 75660->75742 75662 7ff7f733bee3 75669 7ff7f7339d00 24 API calls 75662->75669 75686 7ff7f733bf49 Concurrency::details::ExternalContextBase::~ExternalContextBase 75662->75686 75665 7ff7f733ba05 75743 7ff7f731ace0 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75665->75743 75666->75598 75667 7ff7f733baf5 75747 7ff7f733ad40 24 API calls 75667->75747 75672 7ff7f733bef9 75669->75672 75758 7ff7f733d140 24 API calls 75672->75758 75673 7ff7f733bfb0 75761 7ff7f733ccc0 113 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75673->75761 75676 7ff7f733bf06 75759 7ff7f731ace0 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75676->75759 75677 7ff7f733bfc9 75762 7ff7f733cc90 24 API calls 75677->75762 75679 7ff7f733bd58 Concurrency::details::ExternalContextBase::~ExternalContextBase 75754 7ff7f73499b0 113 API calls 75679->75754 75744 7ff7f7349790 113 API calls std::bad_exception::bad_exception 75682->75744 75683 7ff7f733bfd7 75763 7ff7f733ad40 24 API calls 75683->75763 75685 7ff7f733bb07 Concurrency::details::ExternalContextBase::~ExternalContextBase 75748 7ff7f73499b0 113 API calls 75685->75748 75760 7ff7f7349790 113 API calls std::bad_exception::bad_exception 75686->75760 75749 7ff7f7336b00 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75688->75749 75689 7ff7f733bfe9 Concurrency::details::ExternalContextBase::~ExternalContextBase 75764 7ff7f73499b0 113 API calls 75689->75764 75765 7ff7f7336b00 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75691->75765 75693 7ff7f73f0ce8 std::bad_exception::bad_exception 4 API calls 75692->75693 75694 7ff7f731667d 75693->75694 75695 7ff7f7316692 75694->75695 76019 7ff7f7340dd0 75694->76019 75695->75599 75698 7ff7f7316f43 75697->75698 75704 7ff7f7317904 Concurrency::details::ExternalContextBase::~ExternalContextBase 75697->75704 75705 7ff7f7317c80 75698->75705 75704->75698 76140 7ff7f731dc60 24 API calls 2 library calls 75704->76140 76141 7ff7f731f140 24 API calls 2 library calls 75704->76141 76142 7ff7f731f770 24 API calls std::bad_exception::bad_exception 75704->76142 76143 7ff7f7316c40 54 API calls 75704->76143 76144 7ff7f7316ca0 54 API calls 75704->76144 75706 7ff7f7317ca7 75705->75706 75707 7ff7f7314144 75705->75707 76145 7ff7f73170c0 43 API calls 2 library calls 75706->76145 75707->75516 75709 7ff7f7317cac 75709->75707 76146 7ff7f733a460 48 API calls std::bad_exception::bad_exception 75709->76146 75712 7ff7f7317cc3 75712->75707 76147 7ff7f733a920 44 API calls std::bad_exception::bad_exception 75712->76147 75713->75590 75714->75595 75715->75594 75716->75601 75717->75602 75718->75603 75720 7ff7f7319e3b 75719->75720 75721 7ff7f7319e45 Concurrency::details::ExternalContextBase::~ExternalContextBase std::bad_exception::bad_exception 75720->75721 75769 7ff7f731f610 24 API calls 2 library calls 75720->75769 75721->75621 75723 7ff7f7319e94 75723->75721 75770 7ff7f731eff0 24 API calls 3 library calls 75723->75770 75771 7ff7f73b57f0 75725->75771 75732 7ff7f738c86b Concurrency::details::ExternalContextBase::~ExternalContextBase 75733 7ff7f738c957 Concurrency::details::ExternalContextBase::~ExternalContextBase 75732->75733 75807 7ff7f7338c70 75732->75807 75810 7ff7f7336f30 75732->75810 75815 7ff7f73381c0 75732->75815 75820 7ff7f7338720 139 API calls 2 library calls 75732->75820 75821 7ff7f73391b0 139 API calls 75732->75821 75733->75635 75734->75626 75735->75630 75736->75633 75737->75651 75739 7ff7f7339d43 75738->75739 75741 7ff7f7339d86 Concurrency::details::ExternalContextBase::~ExternalContextBase 75739->75741 76018 7ff7f7326cc0 24 API calls 3 library calls 75739->76018 75741->75660 75742->75665 75743->75682 75744->75650 75745->75659 75746->75667 75747->75685 75748->75688 75750->75638 75751->75643 75752->75652 75753->75679 75754->75627 75755->75641 75756->75648 75757->75662 75758->75676 75759->75686 75760->75673 75761->75677 75762->75683 75763->75689 75764->75691 75766->75645 75767->75653 75768->75666 75769->75723 75770->75721 75772 7ff7f73b5856 75771->75772 75773 7ff7f73b5867 SHGetSpecialFolderPathW 75772->75773 75774 7ff7f73b5a8f Concurrency::details::ExternalContextBase::~ExternalContextBase 75772->75774 75773->75774 75776 7ff7f73b5890 75773->75776 75822 7ff7f73b5b90 75774->75822 75844 7ff7f73b5770 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75776->75844 75779 7ff7f73b589e 75806 7ff7f73b59c0 Concurrency::details::ExternalContextBase::~ExternalContextBase 75779->75806 75845 7ff7f7317650 43 API calls 75779->75845 75781 7ff7f73b5b36 Concurrency::details::ExternalContextBase::~ExternalContextBase 75785 7ff7f73f0a50 _handle_error 8 API calls 75781->75785 75786 7ff7f73b5b75 75785->75786 75786->75732 75788 7ff7f73b5a0f 75790 7ff7f7315b30 24 API calls 75788->75790 75789 7ff7f73b58bb Concurrency::details::ExternalContextBase::~ExternalContextBase 75800 7ff7f73b5922 Concurrency::details::ExternalContextBase::~ExternalContextBase 75789->75800 75846 7ff7f7317650 43 API calls 75789->75846 75791 7ff7f73b5a1b Concurrency::details::ExternalContextBase::~ExternalContextBase 75790->75791 75858 7ff7f7315e00 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75791->75858 75794 7ff7f73b595b Concurrency::details::ExternalContextBase::~ExternalContextBase 75794->75806 75849 7ff7f7316130 43 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75794->75849 75795 7ff7f73b58ff 75847 7ff7f73aecf0 24 API calls 2 library calls 75795->75847 75798 7ff7f73b5a54 75859 7ff7f738d520 24 API calls 75798->75859 75848 7ff7f7316130 43 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75800->75848 75802 7ff7f73b599f 75850 7ff7f73aecf0 24 API calls 2 library calls 75802->75850 75803 7ff7f73b5a81 75805 7ff7f7315b30 24 API calls 75803->75805 75805->75774 75851 7ff7f7315b30 75806->75851 75865 7ff7f73385b0 75807->75865 75809 7ff7f7338c86 75809->75732 75811 7ff7f73f0ce8 std::bad_exception::bad_exception 4 API calls 75810->75811 75812 7ff7f7336f58 75811->75812 75814 7ff7f7336f6d 75812->75814 75873 7ff7f7337240 139 API calls 2 library calls 75812->75873 75814->75732 75816 7ff7f73381dc 75815->75816 75817 7ff7f73381d4 75815->75817 75818 7ff7f7338204 75816->75818 75874 7ff7f737fef0 75816->75874 75817->75732 75818->75732 75820->75732 75821->75732 75823 7ff7f73b5c11 75822->75823 75826 7ff7f73b5d0c Concurrency::details::ExternalContextBase::~ExternalContextBase 75822->75826 75860 7ff7f73f1200 5 API calls std::bad_exception::bad_exception 75823->75860 75828 7ff7f73f0a50 _handle_error 8 API calls 75826->75828 75830 7ff7f73b5b28 75828->75830 75838 7ff7f7317850 75830->75838 75839 7ff7f7317871 75838->75839 75840 7ff7f7317896 75838->75840 75861 7ff7f7316910 24 API calls std::bad_exception::bad_exception 75839->75861 75862 7ff7f732eb70 24 API calls 2 library calls 75840->75862 75843 7ff7f731787c 75843->75781 75844->75779 75845->75789 75846->75795 75847->75800 75848->75794 75849->75802 75850->75806 75852 7ff7f7315b51 75851->75852 75854 7ff7f7315b7b 75851->75854 75863 7ff7f7316910 24 API calls std::bad_exception::bad_exception 75852->75863 75864 7ff7f732e770 24 API calls 2 library calls 75854->75864 75856 7ff7f7315b61 75856->75774 75857 7ff7f7315e00 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75856->75857 75857->75788 75858->75798 75859->75803 75861->75843 75862->75843 75863->75856 75864->75856 75868 7ff7f7321b80 75865->75868 75867 7ff7f7338607 memcpy_s 75867->75809 75869 7ff7f7321bab std::bad_exception::bad_exception 75868->75869 75870 7ff7f7321bb8 75869->75870 75872 7ff7f7319cb0 24 API calls 3 library calls 75869->75872 75870->75867 75872->75870 75873->75814 75875 7ff7f737ff51 75874->75875 75914 7ff7f737d4d0 75875->75914 75877 7ff7f737ff65 75878 7ff7f737ffa3 75877->75878 75883 7ff7f73800aa Concurrency::details::ExternalContextBase::~ExternalContextBase 75877->75883 75946 7ff7f7381260 30 API calls 2 library calls 75878->75946 75880 7ff7f737ffaf 75880->75883 75947 7ff7f7381950 32 API calls 2 library calls 75880->75947 75882 7ff7f737ffcb 75948 7ff7f737d2d0 24 API calls 75882->75948 75885 7ff7f7380138 SetErrorMode 75883->75885 75886 7ff7f7380295 75883->75886 75897 7ff7f73800f6 Concurrency::details::ExternalContextBase::~ExternalContextBase 75883->75897 75917 7ff7f737dba0 75885->75917 75887 7ff7f73802af 75886->75887 75952 7ff7f73805b0 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75886->75952 75892 7ff7f73802e8 75887->75892 75887->75897 75895 7ff7f737dba0 28 API calls 75892->75895 75894 7ff7f737ffd9 Concurrency::details::ExternalContextBase::~ExternalContextBase 75894->75883 75898 7ff7f73802f7 75895->75898 75896 7ff7f73801a5 Concurrency::details::ExternalContextBase::~ExternalContextBase 75899 7ff7f7380259 75896->75899 75900 7ff7f73801d6 75896->75900 75904 7ff7f73f0a50 _handle_error 8 API calls 75897->75904 75953 7ff7f7380b00 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75898->75953 75924 7ff7f7383030 GetLastError 75899->75924 75949 7ff7f737d8e0 75900->75949 75907 7ff7f738043a 75904->75907 75905 7ff7f73801db 75908 7ff7f7380286 SetErrorMode 75905->75908 75907->75818 75908->75886 75909 7ff7f7380303 75909->75897 75912 7ff7f7380272 75912->75908 75913 7ff7f7380276 SetErrorMode 75912->75913 75913->75897 75954 7ff7f737dcd0 75914->75954 75965 7ff7f737ddf0 75917->75965 75919 7ff7f737dbbd 75920 7ff7f7329470 75919->75920 75921 7ff7f7329490 GetFileAttributesExW 75920->75921 75922 7ff7f7329483 75920->75922 75921->75896 76015 7ff7f7326cc0 24 API calls 3 library calls 75922->76015 75925 7ff7f7383069 75924->75925 75926 7ff7f7383060 75924->75926 75928 7ff7f737dba0 28 API calls 75925->75928 75926->75925 75927 7ff7f738313e 75926->75927 75930 7ff7f73f0a50 _handle_error 8 API calls 75927->75930 75929 7ff7f7383076 75928->75929 76016 7ff7f7380b00 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75929->76016 75933 7ff7f7380261 75930->75933 75932 7ff7f7383083 75932->75927 75934 7ff7f737d8e0 24 API calls 75932->75934 75933->75908 75936 7ff7f7382e70 75933->75936 75935 7ff7f738309e 75934->75935 75935->75927 75937 7ff7f737d8e0 24 API calls 75936->75937 75938 7ff7f7382e96 75937->75938 75939 7ff7f7382f0b 75938->75939 75940 7ff7f7382e9a GetLogicalDrives 75938->75940 75941 7ff7f737dba0 28 API calls 75939->75941 75942 7ff7f737d4d0 24 API calls 75940->75942 75944 7ff7f7382f18 75941->75944 75943 7ff7f7382eaf Concurrency::details::ExternalContextBase::~ExternalContextBase 75942->75943 75943->75912 75944->75943 76017 7ff7f73832c0 139 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75944->76017 75946->75880 75947->75882 75948->75894 75950 7ff7f737dcd0 24 API calls 75949->75950 75951 7ff7f737d8ee 75950->75951 75951->75905 75952->75887 75953->75909 75955 7ff7f737dce6 75954->75955 75961 7ff7f737d4ed 75954->75961 75955->75961 75962 7ff7f73392d0 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75955->75962 75957 7ff7f737dd02 Concurrency::details::ExternalContextBase::~ExternalContextBase 75959 7ff7f737dd89 Concurrency::details::ExternalContextBase::~ExternalContextBase 75957->75959 75963 7ff7f7326e00 24 API calls 2 library calls 75957->75963 75959->75961 75964 7ff7f7326e00 24 API calls 2 library calls 75959->75964 75961->75877 75962->75957 75963->75959 75964->75961 75966 7ff7f737de10 75965->75966 75974 7ff7f737dec6 Concurrency::details::ExternalContextBase::~ExternalContextBase 75965->75974 75967 7ff7f737dcd0 24 API calls 75966->75967 75966->75974 75968 7ff7f737de34 75967->75968 75973 7ff7f737de66 Concurrency::details::ExternalContextBase::~ExternalContextBase 75968->75973 75987 7ff7f737d670 26 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 75968->75987 75970 7ff7f7339d00 24 API calls 75971 7ff7f737deb8 75970->75971 75975 7ff7f7385fd0 75971->75975 75973->75970 75974->75919 75976 7ff7f7386025 75975->75976 75986 7ff7f7386029 Concurrency::details::ExternalContextBase::~ExternalContextBase 75976->75986 75988 7ff7f7381450 75976->75988 75978 7ff7f7386050 76004 7ff7f7324ad0 75978->76004 75980 7ff7f7386062 75981 7ff7f73860e5 75980->75981 76009 7ff7f7322640 75980->76009 76014 7ff7f7338cb0 24 API calls 75981->76014 75984 7ff7f73860d6 76013 7ff7f7326e00 24 API calls 2 library calls 75984->76013 75986->75974 75987->75973 75990 7ff7f73814ce 75988->75990 75996 7ff7f73814eb 75988->75996 75989 7ff7f7329470 24 API calls 75991 7ff7f738151f GetFullPathNameW 75989->75991 75992 7ff7f7319cb0 std::bad_exception::bad_exception 24 API calls 75990->75992 75990->75996 75993 7ff7f738153a 75991->75993 75994 7ff7f7381589 75991->75994 75992->75996 75997 7ff7f73495d0 24 API calls 75993->75997 75995 7ff7f73815a1 Concurrency::details::ExternalContextBase::~ExternalContextBase 75994->75995 75998 7ff7f7316d40 24 API calls 75994->75998 75999 7ff7f7381610 __std_exception_destroy 75995->75999 76003 7ff7f7322390 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 75995->76003 75996->75989 76000 7ff7f7381563 75997->76000 75998->75995 75999->75978 76001 7ff7f7329470 24 API calls 76000->76001 76002 7ff7f7381574 GetFullPathNameW 76001->76002 76002->75994 76003->75999 76005 7ff7f7324ae4 76004->76005 76006 7ff7f7324af6 std::bad_exception::bad_exception 76004->76006 76005->75980 76007 7ff7f7324b63 Concurrency::details::ExternalContextBase::~ExternalContextBase 76006->76007 76008 7ff7f7319cb0 std::bad_exception::bad_exception 24 API calls 76006->76008 76007->75980 76008->76007 76010 7ff7f732268d Concurrency::details::ExternalContextBase::~ExternalContextBase 76009->76010 76011 7ff7f7322656 76009->76011 76010->75984 76011->76010 76012 7ff7f7326cc0 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76011->76012 76012->76010 76013->75981 76014->75986 76015->75921 76016->75932 76017->75943 76018->75741 76020 7ff7f73f0ce8 std::bad_exception::bad_exception 4 API calls 76019->76020 76021 7ff7f7340df8 76020->76021 76022 7ff7f7340e0a 76021->76022 76026 7ff7f7340e40 76021->76026 76031 7ff7f7336740 105 API calls std::bad_exception::bad_exception 76022->76031 76025 7ff7f7340e19 76025->75695 76032 7ff7f732f920 76026->76032 76031->76025 76033 7ff7f732f99c GetCurrentThreadId 76032->76033 76034 7ff7f732f964 76032->76034 76036 7ff7f7344400 76033->76036 76060 7ff7f731ad50 88 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 76034->76060 76037 7ff7f7340eeb 76036->76037 76038 7ff7f7344423 76036->76038 76037->76022 76061 7ff7f7390830 76038->76061 76040 7ff7f734442f 76041 7ff7f7344443 76040->76041 76103 7ff7f733a460 48 API calls std::bad_exception::bad_exception 76040->76103 76043 7ff7f7324ad0 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76041->76043 76059 7ff7f734458f Concurrency::details::ExternalContextBase::~ExternalContextBase 76041->76059 76045 7ff7f7344470 Concurrency::details::ExternalContextBase::~ExternalContextBase 76043->76045 76046 7ff7f7329470 24 API calls 76045->76046 76047 7ff7f734449f 76046->76047 76071 7ff7f7349080 76047->76071 76049 7ff7f73444a9 76050 7ff7f73444ba GetProcAddress 76049->76050 76051 7ff7f73444b6 Concurrency::details::ExternalContextBase::~ExternalContextBase 76049->76051 76050->76051 76052 7ff7f7324ad0 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76051->76052 76053 7ff7f734453f Concurrency::details::ExternalContextBase::~ExternalContextBase 76052->76053 76054 7ff7f7329470 24 API calls 76053->76054 76055 7ff7f7344565 76054->76055 76056 7ff7f7349080 139 API calls 76055->76056 76057 7ff7f734456f 76056->76057 76058 7ff7f734457c GetProcAddress 76057->76058 76057->76059 76058->76059 76059->76037 76104 7ff7f733a920 44 API calls std::bad_exception::bad_exception 76059->76104 76062 7ff7f7390842 76061->76062 76070 7ff7f73907fe 76061->76070 76107 7ff7f7390870 43 API calls 2 library calls 76062->76107 76064 7ff7f7390780 76065 7ff7f73f0ce8 std::bad_exception::bad_exception 4 API calls 76064->76065 76064->76070 76066 7ff7f73907c4 76065->76066 76068 7ff7f73907dc 76066->76068 76105 7ff7f7339ea0 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection std::bad_exception::bad_exception 76066->76105 76068->76070 76106 7ff7f733a010 88 API calls 3 library calls 76068->76106 76070->76040 76072 7ff7f73490bd 76071->76072 76073 7ff7f7349153 76071->76073 76122 7ff7f73364f0 26 API calls 3 library calls 76072->76122 76108 7ff7f7349500 GetSystemDirectoryW 76073->76108 76076 7ff7f734915c 76078 7ff7f7315b30 24 API calls 76076->76078 76077 7ff7f73490c6 76079 7ff7f7336f30 138 API calls 76077->76079 76083 7ff7f7349169 Concurrency::details::ExternalContextBase::~ExternalContextBase 76078->76083 76080 7ff7f73490d3 76079->76080 76123 7ff7f7338450 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 76080->76123 76082 7ff7f73490e0 76084 7ff7f7315b30 24 API calls 76082->76084 76086 7ff7f7319df0 std::bad_exception::bad_exception 24 API calls 76083->76086 76101 7ff7f7349238 Concurrency::details::ExternalContextBase::~ExternalContextBase 76083->76101 76090 7ff7f73490ed Concurrency::details::ExternalContextBase::~ExternalContextBase 76084->76090 76091 7ff7f73491af 76086->76091 76087 7ff7f73492fa 76088 7ff7f7322640 24 API calls 76087->76088 76102 7ff7f7349323 Concurrency::details::ExternalContextBase::~ExternalContextBase 76088->76102 76089 7ff7f7324ad0 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76092 7ff7f73491d4 Concurrency::details::ExternalContextBase::~ExternalContextBase 76089->76092 76090->76073 76091->76089 76124 7ff7f7328230 24 API calls 76092->76124 76094 7ff7f734922b 76125 7ff7f7348fd0 24 API calls 76094->76125 76095 7ff7f7349402 Concurrency::details::ExternalContextBase::~ExternalContextBase 76095->76049 76099 7ff7f7329470 24 API calls 76100 7ff7f73493ab LoadLibraryExW 76099->76100 76100->76095 76100->76102 76115 7ff7f7316d40 76101->76115 76102->76095 76102->76099 76118 7ff7f73224d0 76102->76118 76126 7ff7f7322390 24 API calls Concurrency::details::ExternalContextBase::~ExternalContextBase 76102->76126 76103->76041 76104->76037 76105->76068 76106->76070 76107->76064 76109 7ff7f734958d 76108->76109 76110 7ff7f7349553 76108->76110 76111 7ff7f7316d40 24 API calls 76109->76111 76127 7ff7f73495d0 24 API calls 2 library calls 76110->76127 76113 7ff7f734959d __std_exception_destroy 76111->76113 76113->76076 76114 7ff7f734957e GetSystemDirectoryW 76114->76109 76128 7ff7f7324d90 76115->76128 76117 7ff7f7316d68 Concurrency::details::ExternalContextBase::~ExternalContextBase 76117->76087 76119 7ff7f73224f3 76118->76119 76121 7ff7f73224fb Concurrency::details::ExternalContextBase::~ExternalContextBase memcpy_s 76118->76121 76119->76121 76139 7ff7f7326cc0 24 API calls 3 library calls 76119->76139 76121->76102 76122->76077 76123->76082 76124->76094 76125->76101 76126->76102 76127->76114 76129 7ff7f7324da4 76128->76129 76130 7ff7f7324db7 76128->76130 76129->76117 76133 7ff7f73675e0 76130->76133 76135 7ff7f7367638 76133->76135 76134 7ff7f7321b80 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76137 7ff7f7367670 76134->76137 76135->76134 76136 7ff7f7329030 Concurrency::details::ExternalContextBase::~ExternalContextBase 24 API calls 76138 7ff7f7324dee 76136->76138 76137->76136 76138->76117 76139->76121 76140->75704 76141->75704 76142->75704 76143->75704 76144->75704 76145->75709 76146->75712 76147->75707 76148->75528 76150 7ff7f7314437 IsBadReadPtr 76149->76150 76154 7ff7f7314552 76149->76154 76150->76154 76155 7ff7f731445c 76150->76155 76152 7ff7f731456e SetLastError 76152->76154 76153 7ff7f7314538 IsBadReadPtr 76153->76154 76153->76155 76154->75547 76158 7ff7f7314280 76154->76158 76155->76152 76155->76153 76155->76154 76156 7ff7f7314554 SetLastError 76155->76156 76156->76154 76159 7ff7f73142cf 76158->76159 76160 7ff7f73143d2 76159->76160 76162 7ff7f73143e4 76159->76162 76165 7ff7f7314190 76159->76165 76161 7ff7f7314190 10 API calls 76160->76161 76161->76162 76162->75547 76162->75558 76164->75556 76166 7ff7f73141fb 76165->76166 76167 7ff7f73141b4 76165->76167 76168 7ff7f73f0a50 _handle_error 8 API calls 76166->76168 76169 7ff7f73141bf 76167->76169 76170 7ff7f7314213 VirtualProtect 76167->76170 76171 7ff7f731420d 76168->76171 76169->76166 76173 7ff7f73141ea VirtualFree 76169->76173 76170->76166 76172 7ff7f7314268 76170->76172 76171->76159 76174 7ff7f73f0a50 _handle_error 8 API calls 76172->76174 76173->76166 76175 7ff7f7314275 76174->76175 76175->76159 76176->75566 76178 7ff7f7311000 76181 7ff7f731a440 76178->76181 76182 7ff7f731a458 memcpy_s 76181->76182 76187 7ff7f7311009 76181->76187 76183 7ff7f731a491 GetVersionExW 76182->76183 76184 7ff7f731a4a3 76183->76184 76189 7ff7f731a4c4 76183->76189 76184->76189 76191 7ff7f7319920 76184->76191 76189->76187 76219 7ff7f731d680 88 API calls 3 library calls 76189->76219 76192 7ff7f7319969 Concurrency::details::ExternalContextBase::~ExternalContextBase 76191->76192 76193 7ff7f7329470 24 API calls 76192->76193 76194 7ff7f73199c3 76193->76194 76195 7ff7f7349080 139 API calls 76194->76195 76196 7ff7f73199cd 76195->76196 76197 7ff7f73199de GetProcAddress 76196->76197 76202 7ff7f7319aee Concurrency::details::ExternalContextBase::~ExternalContextBase 76196->76202 76198 7ff7f7319a0c 76197->76198 76199 7ff7f73199f9 76197->76199 76203 7ff7f7319a20 76198->76203 76204 7ff7f7319a25 GetProcAddress 76198->76204 76200 7ff7f7329470 24 API calls 76199->76200 76201 7ff7f7319a02 76200->76201 76205 7ff7f7349080 139 API calls 76201->76205 76206 7ff7f73f0a50 _handle_error 8 API calls 76202->76206 76207 7ff7f7319a57 76203->76207 76209 7ff7f7329470 24 API calls 76203->76209 76204->76203 76205->76198 76208 7ff7f7319b7f 76206->76208 76210 7ff7f7319a68 GetProcAddress 76207->76210 76213 7ff7f7319a64 76207->76213 76208->76189 76218 7ff7f73197b0 17 API calls 2 library calls 76208->76218 76211 7ff7f7319a4d 76209->76211 76210->76213 76212 7ff7f7349080 139 API calls 76211->76212 76212->76207 76213->76202 76214 7ff7f7319a96 GetFileVersionInfoSizeExW 76213->76214 76214->76202 76215 7ff7f7319acc 76214->76215 76220 7ff7f73f0d2c 76215->76220 76218->76189 76219->76187 76224 7ff7f73f0ce8 76220->76224 76221 7ff7f7319ad4 GetFileVersionInfoW 76221->76202 76223 7ff7f73f0d12 76225 7ff7f73f0d1d 76223->76225 76230 7ff7f73f1cc8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 76223->76230 76224->76221 76224->76223 76229 7ff7f74009f0 EnterCriticalSection LeaveCriticalSection std::bad_exception::bad_exception 76224->76229 76231 7ff7f73f1ce8 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 76225->76231 76228 7ff7f73f0d23 76229->76224 76231->76228 76232 26c9cb8b480 76273 26c9cb953d0 76232->76273 76234 26c9cb8b4cc Sleep 76235 26c9cb8b515 76234->76235 76236 26c9cb8b4e6 76234->76236 76238 26c9cb8b523 76235->76238 76240 26c9cb84f20 58 API calls 76235->76240 76237 26c9cb93e78 31 API calls 76236->76237 76239 26c9cb8b4ef 76237->76239 76241 26c9cb8b55e 76238->76241 76242 26c9cb8b563 GetLocalTime wsprintfW 76238->76242 76247 26c9cb8b527 76238->76247 76245 26c9cb93fec 32 API calls 76239->76245 76240->76238 76243 26c9cb85040 14 API calls 76241->76243 76244 26c9cb8b5c1 _cftof_l 76242->76244 76243->76242 76248 26c9cb93fec 32 API calls 76244->76248 76246 26c9cb8b50c CloseHandle 76245->76246 76246->76235 76249 26c9cb8b5de CloseHandle 76248->76249 76255 26c9cb8b600 76249->76255 76250 26c9cb93e0c 24 API calls malloc 76250->76255 76251 26c9cb93e78 31 API calls 76251->76255 76252 26c9cb93d84 _Ref_count 25 API calls 76252->76255 76253 26c9cb813b0 9 API calls 76253->76255 76254 26c9cb81de0 34 API calls 76254->76255 76255->76250 76255->76251 76255->76252 76255->76253 76255->76254 76256 26c9cb8b759 Sleep 76255->76256 76260 26c9cb8b80d CreateEventA 76255->76260 76256->76255 76257 26c9cb8b770 EnumWindows 76256->76257 76257->76255 76258 26c9cb8b78e 76257->76258 76259 26c9cb8b790 Sleep EnumWindows 76258->76259 76259->76255 76259->76259 76261 26c9cb93e0c malloc 24 API calls 76260->76261 76264 26c9cb8b84f 76261->76264 76262 26c9cb8b880 Sleep 76262->76262 76262->76264 76263 26c9cb82b00 162 API calls 76263->76264 76264->76263 76268 26c9cb8b87f 76264->76268 76265 26c9cb8b8b3 CloseHandle 76265->76255 76266 26c9cb93fec 32 API calls 76266->76268 76267 26c9cb8b900 Sleep 76267->76268 76268->76262 76268->76265 76268->76266 76268->76267 76269 26c9cb8b969 WaitForSingleObject CloseHandle 76268->76269 76270 26c9cb8b97f CloseHandle 76268->76270 76271 26c9cb8b92c WaitForSingleObject CloseHandle 76268->76271 76272 26c9cb8b942 CloseHandle 76268->76272 76269->76270 76270->76255 76271->76272 76272->76255 76274 26c9cb8d5c0 76282 26c9cb8cbf0 CreateEventW 76274->76282 76277 26c9cb8d697 76303 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76277->76303 76278 26c9cb8d6a1 76304 26c9cb8c610 GdipDisposeImage GdipFree InitializeCriticalSectionAndSpinCount InitializeCriticalSectionAndSpinCount _RunAllParam 76278->76304 76281 26c9cb8d6ae 76283 26c9cb8cc4c 76282->76283 76284 26c9cb8cc42 76282->76284 76305 26c9cb8c9f0 HeapCreate 76283->76305 76311 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76284->76311 76288 26c9cb8cd3d CreateEventW 76291 26c9cb8cd86 CreateEventW 76288->76291 76292 26c9cb8cd7b 76288->76292 76289 26c9cb8cd32 76312 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76289->76312 76294 26c9cb8cdb4 CreateEventW 76291->76294 76295 26c9cb8cda9 76291->76295 76313 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76292->76313 76299 26c9cb8cdd7 76294->76299 76300 26c9cb8cde1 CreateWaitableTimerW 76294->76300 76314 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76295->76314 76296 26c9cb8cd3c 76296->76288 76297 26c9cb8cd85 76297->76291 76315 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76299->76315 76300->76277 76300->76278 76301 26c9cb8cdb3 76301->76294 76303->76278 76304->76281 76306 26c9cb8ca47 76305->76306 76307 26c9cb8ca3d 76305->76307 76310 26c9cb8ca72 InitializeCriticalSectionAndSpinCount 76306->76310 76317 26c9cb94698 24 API calls _errno 76306->76317 76316 26c9cb872b0 GdipDisposeImage GdipFree _RunAllParam 76307->76316 76310->76288 76310->76289 76311->76283 76312->76296 76313->76297 76314->76301 76315->76300 76316->76306 76317->76310 76318 140002b10 76319 140002b32 76318->76319 76320 140002c5d 76318->76320 76321 140002c62 memcpy_s 76319->76321 76326 140002b44 memcpy_s 76319->76326 76322 140002c96 VirtualAlloc 76321->76322 76323 140002cc8 memcpy_s 76322->76323 76324 14000c4d8 63 API calls 76323->76324 76325 140002ce4 CloseHandle 76324->76325 76325->76320 76326->76320 76327 14000c294 _RunAllParam 62 API calls 76326->76327 76327->76320 76328 140001750 76329 14000c364 72 API calls 76328->76329 76335 140001780 memcpy_s 76329->76335 76330 140001824 76331 14000184b 76330->76331 76333 14000c294 _RunAllParam 62 API calls 76330->76333 76334 14000bf30 _fltout2 8 API calls 76331->76334 76332 1400017d0 select 76332->76330 76332->76335 76333->76331 76336 14000185e 76334->76336 76335->76330 76335->76332 76337 1400017f4 recv 76335->76337 76337->76330 76338 140001814 76337->76338 76340 140001bd0 68 API calls memcpy_s 76338->76340 76340->76335 76341 140005ad0 76349 140005100 CreateEventW 76341->76349 76344 140005bb1 76371 140004b10 InitializeCriticalSectionAndSpinCount InitializeCriticalSectionAndSpinCount RaiseException _RunAllParam 76344->76371 76345 140005ba7 76370 140004a70 RaiseException __SehTransFilter 76345->76370 76348 140005bbe 76350 140005152 76349->76350 76351 14000515c 76349->76351 76378 140004a70 RaiseException __SehTransFilter 76350->76378 76372 140004f00 HeapCreate 76351->76372 76355 140005242 76379 140004a70 RaiseException __SehTransFilter 76355->76379 76356 14000524d CreateEventW 76358 140005296 CreateEventW 76356->76358 76359 14000528b 76356->76359 76360 1400052c4 CreateEventW 76358->76360 76361 1400052b9 76358->76361 76380 140004a70 RaiseException __SehTransFilter 76359->76380 76365 1400052f1 CreateWaitableTimerW 76360->76365 76366 1400052e7 76360->76366 76381 140004a70 RaiseException __SehTransFilter 76361->76381 76362 14000524c 76362->76356 76365->76344 76365->76345 76382 140004a70 RaiseException __SehTransFilter 76366->76382 76367 140005295 76367->76358 76368 1400052c3 76368->76360 76370->76344 76371->76348 76373 140004f57 76372->76373 76374 140004f4d 76372->76374 76376 140004f82 InitializeCriticalSectionAndSpinCount 76373->76376 76384 14000cdd8 61 API calls _errno 76373->76384 76383 140004a70 RaiseException __SehTransFilter 76374->76383 76376->76355 76376->76356 76378->76351 76379->76362 76380->76367 76381->76368 76382->76365 76383->76373 76384->76376 76385 14000c458 76386 14000c466 76385->76386 76387 14000c4a6 76386->76387 76390 14000c47a 76386->76390 76400 14000e7c4 61 API calls 3 library calls 76387->76400 76389 14000c4d2 76395 14000c42c 76389->76395 76393 14000c49c GetCurrentThreadId 76390->76393 76394 14000c48d GetLastError ExitThread 76390->76394 76393->76389 76396 14000e7a0 _getptd 61 API calls 76395->76396 76397 14000c435 76396->76397 76401 14000c408 76397->76401 76400->76389 76402 14000e71c __doserrno 61 API calls 76401->76402 76403 14000c415 76402->76403 76404 14000c422 ExitThread 76403->76404 76406 14000e8f8 63 API calls _freefls 76403->76406 76406->76404 76407 26c9cb81470 setsockopt CancelIo 76410 26c9cba8770 76407->76410 76411 26c9cba8777 76410->76411 76412 26c9cb814f0 76413 26c9cb81522 ResetEvent timeGetTime socket 76412->76413 76414 26c9cb81587 lstrlenW WideCharToMultiByte 76413->76414 76415 26c9cb81580 76413->76415 76416 26c9cb93e78 31 API calls 76414->76416 76418 26c9cb93a20 _cftof_l 7 API calls 76415->76418 76417 26c9cb815d2 lstrlenW WideCharToMultiByte gethostbyname 76416->76417 76419 26c9cb93d84 _Ref_count 25 API calls 76417->76419 76420 26c9cb81733 76418->76420 76421 26c9cb81619 76419->76421 76421->76415 76422 26c9cb81626 htons connect 76421->76422 76422->76415 76423 26c9cb8166c setsockopt 76422->76423 76424 26c9cb816e8 76423->76424 76425 26c9cb81699 WSAIoctl 76423->76425 76427 26c9cb93fec 76424->76427 76425->76424 76428 26c9cb94017 76427->76428 76429 26c9cb9402c 76427->76429 76460 26c9cb96bc0 24 API calls __doserrno 76428->76460 76445 26c9cb979cc 76429->76445 76431 26c9cb9401c 76461 26c9cb96b58 DecodePointer _invalid_parameter_noinfo 76431->76461 76434 26c9cb94027 76434->76415 76436 26c9cb940b0 76462 26c9cb94698 24 API calls _errno 76436->76462 76440 26c9cb940b8 76440->76434 76463 26c9cb96c00 24 API calls 2 library calls 76440->76463 76442 26c9cb9405c CreateThread 76442->76434 76444 26c9cb940a8 GetLastError 76442->76444 76444->76436 76447 26c9cb979f1 76445->76447 76448 26c9cb94040 76447->76448 76449 26c9cb97a0f Sleep 76447->76449 76464 26c9cb9ad7c 76447->76464 76448->76436 76450 26c9cb96fa8 76448->76450 76449->76447 76449->76448 76473 26c9cb96f24 GetLastError 76450->76473 76452 26c9cb96fb3 76453 26c9cb9404d 76452->76453 76484 26c9cb97924 30 API calls 3 library calls 76452->76484 76455 26c9cb96e6c 76453->76455 76486 26c9cb9ea40 76455->76486 76457 26c9cb96ec5 76458 26c9cb9ea40 type_info::_Type_info_dtor 24 API calls 76457->76458 76459 26c9cb96ee4 __doserrno 76458->76459 76459->76442 76460->76431 76461->76434 76462->76440 76463->76434 76465 26c9cb9ad91 76464->76465 76468 26c9cb9adae malloc 76464->76468 76466 26c9cb9ad9f 76465->76466 76465->76468 76471 26c9cb96bc0 24 API calls __doserrno 76466->76471 76469 26c9cb9ada4 76468->76469 76472 26c9cb96de8 DecodePointer 76468->76472 76469->76447 76471->76469 76472->76468 76474 26c9cb96f42 __doserrno 76473->76474 76475 26c9cb96f92 SetLastError 76474->76475 76476 26c9cb979cc __onexitinit 21 API calls 76474->76476 76475->76452 76477 26c9cb96f57 __doserrno 76476->76477 76477->76475 76478 26c9cb96f75 76477->76478 76479 26c9cb96f8b 76477->76479 76480 26c9cb96e6c __doserrno 21 API calls 76478->76480 76485 26c9cb94698 24 API calls _errno 76479->76485 76482 26c9cb96f7c GetCurrentThreadId 76480->76482 76482->76475 76483 26c9cb96f90 76483->76475 76485->76483 76487 26c9cb9ea5e 76486->76487 76489 26c9cb9ea6f 76486->76489 76490 26c9cb9e958 24 API calls 6 library calls 76487->76490 76490->76489 76491 26c9cb83830 CreateMutexW CreateMutexExW 76492 26c9cb83867 76491->76492 76500 26c9cb83899 _recalloc 76491->76500 76494 26c9cb83870 Sleep CreateMutexW GetLastError 76492->76494 76493 26c9cb83920 _amsg_exit 76495 26c9cb83928 GetConsoleWindow 76493->76495 76494->76494 76494->76500 76530 26c9cb8bdd0 18 API calls _cftof_l 76495->76530 76496 26c9cb838c0 lstrlenW 76509 26c9cb84900 76496->76509 76499 26c9cb83947 76501 26c9cb83965 76499->76501 76502 26c9cb8394b 76499->76502 76500->76493 76500->76496 76504 26c9cb838f6 lstrcmpW 76500->76504 76505 26c9cb8390c Sleep 76500->76505 76531 26c9cb8c1b0 42 API calls 4 library calls 76501->76531 76506 26c9cb93a20 _cftof_l 7 API calls 76502->76506 76504->76493 76504->76505 76505->76493 76505->76500 76507 26c9cb8395d 76506->76507 76532 26c9cb95ee0 76509->76532 76512 26c9cb84975 76514 26c9cb84b20 RegCloseKey RegCloseKey 76512->76514 76513 26c9cb8497d 76515 26c9cb84a7c 76513->76515 76516 26c9cb8498c 76513->76516 76519 26c9cb93a20 _cftof_l 7 API calls 76514->76519 76515->76514 76520 26c9cb84a91 RegQueryValueExW 76515->76520 76517 26c9cb84a0f 76516->76517 76518 26c9cb84990 76516->76518 76517->76514 76522 26c9cb84a24 RegQueryValueExW 76517->76522 76518->76514 76528 26c9cb849ad RegQueryValueExW 76518->76528 76521 26c9cb84b46 76519->76521 76523 26c9cb84aca GetSystemInfo wsprintfW 76520->76523 76524 26c9cb84b0f 76520->76524 76521->76500 76525 26c9cb84a64 lstrcpyW 76522->76525 76526 26c9cb84b12 lstrcpyW 76522->76526 76527 26c9cb84af7 lstrcpyW 76523->76527 76524->76526 76525->76514 76526->76514 76527->76514 76528->76514 76529 26c9cb849ea lstrcmpW 76528->76529 76529->76512 76529->76527 76530->76499 76533 26c9cb84951 RegOpenKeyExW 76532->76533 76533->76512 76533->76513 76534 26c9cb95530 76537 26c9cb95556 76534->76537 76535 26c9cb9555e 76536 26c9cb95593 76536->76535 76592 26c9cb8bce0 76536->76592 76537->76535 76537->76536 76546 26c9cb953dc 76537->76546 76541 26c9cb8bce0 3 API calls 76543 26c9cb955cb 76541->76543 76542 26c9cb953dc 75 API calls 76542->76535 76544 26c9cb953dc 75 API calls 76543->76544 76545 26c9cb955d8 76544->76545 76545->76535 76545->76542 76547 26c9cb9546b 76546->76547 76548 26c9cb953ee 76546->76548 76550 26c9cb954bc 76547->76550 76555 26c9cb9546f 76547->76555 76596 26c9cb995ac HeapCreate 76548->76596 76552 26c9cb95517 76550->76552 76553 26c9cb954c1 76550->76553 76568 26c9cb953f7 76552->76568 76615 26c9cb97100 24 API calls 2 library calls 76552->76615 76559 26c9cb979cc __onexitinit 24 API calls 76553->76559 76554 26c9cb954a6 76554->76568 76613 26c9cb96e44 27 API calls free 76554->76613 76555->76554 76555->76568 76610 26c9cb9a6f8 25 API calls free 76555->76610 76558 26c9cb95403 _RTC_Initialize 76561 26c9cb95407 76558->76561 76567 26c9cb95413 GetCommandLineA 76558->76567 76569 26c9cb954d5 __doserrno 76559->76569 76602 26c9cb99604 HeapDestroy 76561->76602 76562 26c9cb9549c 76611 26c9cb96e44 27 API calls free 76562->76611 76566 26c9cb954a1 76612 26c9cb99604 HeapDestroy 76566->76612 76603 26c9cb9ab64 29 API calls 2 library calls 76567->76603 76568->76536 76569->76568 76572 26c9cb954f7 76569->76572 76573 26c9cb9550d 76569->76573 76575 26c9cb96e6c __doserrno 24 API calls 76572->76575 76614 26c9cb94698 24 API calls _errno 76573->76614 76574 26c9cb95425 76604 26c9cb9a424 31 API calls __onexitinit 76574->76604 76578 26c9cb954fe GetCurrentThreadId 76575->76578 76578->76568 76579 26c9cb95431 76580 26c9cb95435 76579->76580 76581 26c9cb9543c 76579->76581 76605 26c9cb96e44 27 API calls free 76580->76605 76606 26c9cb9aa6c 43 API calls 2 library calls 76581->76606 76584 26c9cb95441 76585 26c9cb95455 76584->76585 76607 26c9cb9a76c 42 API calls 5 library calls 76584->76607 76591 26c9cb95459 76585->76591 76609 26c9cb9a6f8 25 API calls free 76585->76609 76588 26c9cb9544a 76588->76585 76608 26c9cb976c8 31 API calls 2 library calls 76588->76608 76589 26c9cb95469 76589->76580 76591->76568 76593 26c9cb8bce8 76592->76593 76594 26c9cb8bd4f 76592->76594 76593->76594 76595 26c9cb8bcf2 CreateThread CreateThread WaitForSingleObject 76593->76595 76594->76541 76594->76545 76595->76594 76597 26c9cb995d4 GetVersion 76596->76597 76598 26c9cb953f3 76596->76598 76599 26c9cb995f8 76597->76599 76600 26c9cb995de HeapSetInformation 76597->76600 76598->76568 76601 26c9cb97140 30 API calls 2 library calls 76598->76601 76599->76598 76600->76599 76601->76558 76602->76568 76603->76574 76604->76579 76605->76561 76606->76584 76607->76588 76608->76585 76609->76589 76610->76562 76611->76566 76612->76554 76613->76568 76614->76568 76615->76568 76616 140003da0 76617 14000c9e0 76616->76617 76618 140003de8 SleepEx 76617->76618 76621 140003e10 76618->76621 76619 140003e20 Sleep 76619->76619 76619->76621 76622 14000c364 72 API calls 76621->76622 76623 14000c294 _RunAllParam 62 API calls 76621->76623 76626 140003ea3 Sleep SleepEx 76621->76626 76629 140003e19 76621->76629 76631 1400012c0 6 API calls 76621->76631 76632 1400013b0 10 API calls _fltout2 76621->76632 76633 140001e00 75 API calls 76621->76633 76622->76621 76623->76621 76626->76621 76627 140003f01 CreateEventA 76627->76629 76628 140003f4c Sleep 76628->76629 76629->76619 76629->76627 76629->76628 76630 140003f79 CloseHandle 76629->76630 76630->76621 76631->76621 76632->76621 76633->76621 76635 14000aba0 76636 14000abcb 76635->76636 76637 14000ad5c 76636->76637 76662 140009ad0 SwitchToThread SetLastError 76636->76662 76639 14000abdb 76639->76637 76663 14000a400 76639->76663 76641 14000ac44 76642 14000ac4c 76641->76642 76643 14000ad10 WSAGetLastError 76641->76643 76700 140009400 htons bind 76642->76700 76645 14000ad1d 76643->76645 76647 14000ad1f SetLastError GetLastError 76645->76647 76646 14000ac67 76648 14000ad01 WSAGetLastError 76646->76648 76649 14000ac6f SetLastError 76646->76649 76650 14000ad48 SetLastError 76647->76650 76648->76645 76651 14000ac88 76649->76651 76650->76637 76652 14000ace8 GetLastError 76651->76652 76653 14000ac8d 76651->76653 76652->76645 76684 1400094e0 76653->76684 76655 14000ac9d 76656 14000aca1 76655->76656 76657 14000acd9 WSAGetLastError 76655->76657 76701 14000ab50 63 API calls 76656->76701 76657->76645 76659 14000aca9 76660 14000accb 76659->76660 76661 14000acad ResetEvent 76659->76661 76660->76647 76661->76637 76662->76639 76702 140008ba0 StrChrW 76663->76702 76665 14000a437 76706 140006b30 76665->76706 76667 14000a4a2 socket 76668 14000a4c1 76667->76668 76683 14000a450 76667->76683 76670 1400063c0 WSAIoctl WSAGetLastError 76668->76670 76669 14000a44c 76669->76667 76671 140006750 62 API calls 76669->76671 76669->76683 76672 14000a4cb 76670->76672 76673 14000a485 76671->76673 76674 14000a4e2 76672->76674 76676 140004a70 _RunAllParam RaiseException 76672->76676 76673->76667 76675 14000a494 WSASetLastError 76673->76675 76673->76683 76677 1400062d0 setsockopt setsockopt setsockopt setsockopt SetLastError 76674->76677 76675->76683 76676->76674 76678 14000a4ef 76677->76678 76679 14000a504 WSACreateEvent 76678->76679 76681 140004a70 _RunAllParam RaiseException 76678->76681 76680 14000a3d0 WideCharToMultiByte WideCharToMultiByte RaiseException 76679->76680 76680->76683 76682 14000a503 76681->76682 76682->76679 76683->76641 76685 1400094fc WSAEventSelect 76684->76685 76686 140009560 connect 76684->76686 76687 140009513 connect 76685->76687 76688 140009549 76685->76688 76686->76688 76689 140009582 WSAEventSelect 76686->76689 76687->76688 76690 140009537 76687->76690 76688->76655 76689->76688 76691 14000959b SetLastError 76689->76691 76690->76688 76692 14000953c WSAGetLastError 76690->76692 76693 1400095be 76691->76693 76692->76688 76694 1400095c3 GetLastError WSASetLastError 76693->76694 76695 1400095ed send 76693->76695 76694->76655 76696 140009604 WSAGetLastError 76695->76696 76697 140009614 76695->76697 76696->76697 76697->76688 76710 140004a70 RaiseException __SehTransFilter 76697->76710 76699 140009636 76700->76646 76701->76659 76703 140008be8 lstrlenW 76702->76703 76704 140008bcb 76702->76704 76705 140008c21 memcpy_s 76703->76705 76704->76665 76705->76665 76709 140006180 62 API calls 2 library calls 76706->76709 76708 140006b4d 76709->76708 76710->76699

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 26c9cb82b00-26c9cb82bd1 call 26c9cb95800 call 26c9cb93e78 call 26c9cb95ee0 * 2 gethostname gethostbyname 9 26c9cb82bd7-26c9cb82c21 inet_ntoa call 26c9cb945fc * 2 0->9 10 26c9cb82c7f-26c9cb82db4 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 26c9cb84d10 GetSystemInfo wsprintfW call 26c9cb84770 call 26c9cb84b60 0->10 9->10 20 26c9cb82c23-26c9cb82c26 9->20 21 26c9cb82db9-26c9cb82dc2 GetForegroundWindow 10->21 22 26c9cb82c30-26c9cb82c7d inet_ntoa call 26c9cb945fc * 2 20->22 23 26c9cb82dc4-26c9cb82dd4 GetWindowTextW 21->23 24 26c9cb82dda-26c9cb82e24 lstrlenW call 26c9cb84900 21->24 22->10 23->24 31 26c9cb82e26-26c9cb82e39 call 26c9cb93e0c 24->31 32 26c9cb82e3e-26c9cb82e8b call 26c9cb93e0c lstrlenW call 26c9cb84900 24->32 31->32 38 26c9cb82ea5-26c9cb82ee8 call 26c9cba8350 call 26c9cba8168 32->38 39 26c9cb82e8d-26c9cb82ea0 call 26c9cb93e0c 32->39 45 26c9cb82eea-26c9cb82eec 38->45 46 26c9cb82eee GetSystemInfo 38->46 39->38 47 26c9cb82ef4-26c9cb82f01 45->47 46->47 48 26c9cb82f10 47->48 49 26c9cb82f03-26c9cb82f0e 47->49 51 26c9cb82f15-26c9cb82f66 wsprintfW call 26c9cb84570 call 26c9cb84140 48->51 49->48 49->51 56 26c9cb82f68 51->56 57 26c9cb82f6f-26c9cb82f8e call 26c9cb93e0c call 26c9cb83fe0 51->57 56->57 62 26c9cb82f97-26c9cb83085 call 26c9cb93e0c call 26c9cb83db0 call 26c9cb83a60 call 26c9cb94118 GetLocalTime wsprintfW GetLocaleInfoW call 26c9cb95ee0 EnumDisplayMonitors 57->62 63 26c9cb82f90 57->63 74 26c9cb8308b-26c9cb830a4 call 26c9cb93de8 62->74 75 26c9cb8311c-26c9cb83123 lstrcatW 62->75 63->62 76 26c9cb83129-26c9cb8315f GetSystemDirectoryW GetCurrentHwProfileW 74->76 82 26c9cb830aa 74->82 75->76 78 26c9cb8316c 76->78 79 26c9cb83161-26c9cb8316a 76->79 81 26c9cb83175-26c9cb831d2 call 26c9cb831e0 call 26c9cb93d84 call 26c9cb93a20 78->81 79->81 84 26c9cb830b1-26c9cb830fe 82->84 86 26c9cb83107-26c9cb83118 call 26c9cb93de8 84->86 87 26c9cb83100 84->87 86->84 91 26c9cb8311a 86->91 87->86 91->76
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharInfoMultiWidewsprintf$System$Window_errnoinet_ntoalstrlenswprintf$AddressCountCurrentDirectoryDisplayEnumForegroundHandleInputLastLocalLocaleModuleMonitorsProcProfileTextTickTime_invalid_parameter_noinfogethostbynamegethostnamelstrcatmalloc
        • String ID: %d min$1.0$2024. 9. 2$>f:yhV:$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$Run:%s Con:%4d.%2d.%2d-%2d:%2d:%2d$X64 %s$kernel32.dll$x64$x86
        • API String ID: 3092165503-1594994734
        • Opcode ID: 6f9a26f35435b5e38f586dea0dd05bdbbb2e27cbbf1188ae0f7fa3827131af10
        • Instruction ID: 3266f864bf5f91e18d62fd4c00e381f50e0127c02c8166d85eb4beeeaf23ecaa
        • Opcode Fuzzy Hash: 6f9a26f35435b5e38f586dea0dd05bdbbb2e27cbbf1188ae0f7fa3827131af10
        • Instruction Fuzzy Hash: 6102B432202A85D6EB24EF60E8483FE73B5F748748FA04116DACE53A95DF3AC659C744

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 96 26c9cb8b480-26c9cb8b4e4 call 26c9cb953d0 Sleep 99 26c9cb8b515-26c9cb8b51c 96->99 100 26c9cb8b4e6-26c9cb8b50f call 26c9cb93e78 call 26c9cb93fec CloseHandle 96->100 102 26c9cb8b555-26c9cb8b55c 99->102 103 26c9cb8b51e-26c9cb8b525 call 26c9cb84f20 99->103 100->99 106 26c9cb8b55e call 26c9cb85040 102->106 107 26c9cb8b563-26c9cb8b5fd GetLocalTime wsprintfW call 26c9cba8270 call 26c9cb93fec CloseHandle 102->107 103->102 114 26c9cb8b527-26c9cb8b535 103->114 106->107 119 26c9cb8b600-26c9cb8b618 call 26c9cb81000 107->119 116 26c9cb8b540-26c9cb8b553 call 26c9cb84ff0 114->116 123 26c9cb8b647-26c9cb8b66b call 26c9cb93e0c * 2 119->123 124 26c9cb8b61a-26c9cb8b645 call 26c9cb93e0c * 2 119->124 133 26c9cb8b672-26c9cb8b69a 123->133 124->133 134 26c9cb8b6e6-26c9cb8b6e9 133->134 135 26c9cb8b69c-26c9cb8b6df call 26c9cb81000 call 26c9cb93e0c * 2 133->135 137 26c9cb8b6eb-26c9cb8b6fb call 26c9cb812c0 call 26c9cb93d84 134->137 138 26c9cb8b702-26c9cb8b706 134->138 135->134 137->138 139 26c9cb8b729-26c9cb8b73b call 26c9cb93e78 138->139 140 26c9cb8b708-26c9cb8b715 call 26c9cb93e78 138->140 155 26c9cb8b74a 139->155 156 26c9cb8b73d-26c9cb8b748 call 26c9cb81de0 139->156 152 26c9cb8b724-26c9cb8b727 140->152 153 26c9cb8b717-26c9cb8b722 call 26c9cb813b0 140->153 157 26c9cb8b74d-26c9cb8b76e call 26c9cb953d0 Sleep 152->157 153->157 155->157 156->157 165 26c9cb8b7b9-26c9cb8b7da call 26c9cb953d0 157->165 166 26c9cb8b770-26c9cb8b78c EnumWindows 157->166 165->119 172 26c9cb8b7e0-26c9cb8b87d call 26c9cb953d0 CreateEventA call 26c9cb93e0c 165->172 166->165 167 26c9cb8b78e 166->167 169 26c9cb8b790-26c9cb8b7b7 Sleep EnumWindows 167->169 169->165 169->169 178 26c9cb8b894-26c9cb8b8a1 call 26c9cb82b00 172->178 179 26c9cb8b87f 172->179 182 26c9cb8b8a6-26c9cb8b8a9 178->182 180 26c9cb8b880-26c9cb8b892 Sleep 179->180 180->178 180->180 183 26c9cb8b8c9-26c9cb8b8d0 182->183 184 26c9cb8b8ab-26c9cb8b8c4 CloseHandle 182->184 185 26c9cb8b8f4 183->185 186 26c9cb8b8d2-26c9cb8b8f1 call 26c9cb93fec 183->186 184->119 189 26c9cb8b8f7-26c9cb8b8fe 185->189 186->185 190 26c9cb8b957-26c9cb8b967 189->190 191 26c9cb8b900-26c9cb8b910 Sleep 189->191 196 26c9cb8b969-26c9cb8b97e WaitForSingleObject CloseHandle 190->196 197 26c9cb8b97f-26c9cb8b98f CloseHandle 190->197 191->189 193 26c9cb8b912-26c9cb8b919 191->193 193->190 194 26c9cb8b91b-26c9cb8b92a 193->194 199 26c9cb8b92c-26c9cb8b941 WaitForSingleObject CloseHandle 194->199 200 26c9cb8b942-26c9cb8b952 CloseHandle 194->200 196->197 197->119 199->200 200->119
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandle$Sleep$_errno$EnumObjectSingleWaitWindows_invalid_parameter_noinfo$CreateEventExceptionFilterLocalTimeUnhandledmallocwsprintf
        • String ID: %4d.%2d.%2d-%2d:%2d:%2d$206.238.220.204$206.238.220.204$6666$8888
        • API String ID: 1954332545-3840522574
        • Opcode ID: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
        • Instruction ID: ed9210369d74e5295b7cc2b57f2d4f5b08d8d155ee40fc8ac2cb029b6adf6195
        • Opcode Fuzzy Hash: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
        • Instruction Fuzzy Hash: 1CE15B35106A44C6EB24BF21E8A87BA77B0F795745FB00126E6CA07AE4CF7BC949C740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandleSleep$EnumObjectSingleWaitWindows$CreateEventLocalTimemallocwsprintf
        • String ID: %4d.%2d.%2d-%2d:%2d:%2d$192.168.1.2$6341
        • API String ID: 2252640433-291747511
        • Opcode ID: 5113a276d7b3d7c4d49730e836482ad4f995803a9944a159e0f4035b0e1660b7
        • Instruction ID: e3e323accacb2615fb48551e3c3c01420cefa30ba6004cd2a90dee8e39ebbb1f
        • Opcode Fuzzy Hash: 5113a276d7b3d7c4d49730e836482ad4f995803a9944a159e0f4035b0e1660b7
        • Instruction Fuzzy Hash: 50919072606A40C6EB20AF25E8983BE77B0F785B94F604115EACA07BE4DF7EC549C740

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 253 7ff7f7314610-7ff7f731463f 254 7ff7f7314641-7ff7f731465e GetModuleHandleW GetProcAddress 253->254 255 7ff7f7314665-7ff7f7314686 253->255 254->255 256 7ff7f731468c-7ff7f73146a0 255->256 257 7ff7f7314b72-7ff7f7314b7d SetLastError 255->257 258 7ff7f73146a2-7ff7f73146af SetLastError 256->258 259 7ff7f73146b4-7ff7f73146c7 256->259 260 7ff7f731488b-7ff7f73148b7 call 7ff7f73f0a50 258->260 259->257 261 7ff7f73146cd-7ff7f73146d6 259->261 261->257 262 7ff7f73146dc-7ff7f73146e1 261->262 262->257 264 7ff7f73146e7-7ff7f73146fa 262->264 266 7ff7f7314728-7ff7f7314758 GetNativeSystemInfo 264->266 267 7ff7f73146fc-7ff7f73146ff 264->267 266->257 269 7ff7f731475e-7ff7f7314785 VirtualAlloc 266->269 268 7ff7f7314703-7ff7f731470a 267->268 270 7ff7f731470c-7ff7f7314710 268->270 271 7ff7f7314712 268->271 272 7ff7f7314787-7ff7f73147a2 VirtualAlloc 269->272 273 7ff7f73147b4-7ff7f73147df GetProcessHeap HeapAlloc 269->273 274 7ff7f7314714-7ff7f7314726 270->274 271->274 272->273 275 7ff7f73147a4-7ff7f73147af SetLastError 272->275 276 7ff7f73147ff-7ff7f731485f 273->276 277 7ff7f73147e1-7ff7f73147fd VirtualFree SetLastError 273->277 274->266 274->268 281 7ff7f7314883 275->281 279 7ff7f73148b8-7ff7f7314908 VirtualAlloc call 7ff7f73f25e0 276->279 280 7ff7f7314861-7ff7f7314866 SetLastError 276->280 278 7ff7f731487b 277->278 278->281 287 7ff7f73149cc-7ff7f73149d4 279->287 288 7ff7f731490e 279->288 282 7ff7f731486c-7ff7f7314874 call 7ff7f7314b90 280->282 281->260 289 7ff7f7314876 282->289 290 7ff7f73149da-7ff7f73149e2 287->290 291 7ff7f7314a7e-7ff7f7314a83 287->291 292 7ff7f7314911-7ff7f7314916 288->292 289->278 290->282 293 7ff7f73149e8-7ff7f73149ef 290->293 296 7ff7f7314a85-7ff7f7314a92 call 7ff7f7314410 291->296 294 7ff7f7314918-7ff7f731491e 292->294 295 7ff7f7314962-7ff7f731496d 292->295 297 7ff7f73149fd-7ff7f7314a0a 293->297 298 7ff7f73149f1-7ff7f73149f8 293->298 299 7ff7f73149b3-7ff7f73149c4 294->299 300 7ff7f7314924-7ff7f7314948 294->300 295->280 301 7ff7f7314973-7ff7f7314993 VirtualAlloc 295->301 296->282 307 7ff7f7314a98-7ff7f7314aa2 call 7ff7f7314280 296->307 297->291 304 7ff7f7314a0c-7ff7f7314a0e 297->304 298->296 299->292 306 7ff7f73149ca 299->306 300->282 312 7ff7f731494e-7ff7f7314960 call 7ff7f73f2bb0 300->312 301->282 305 7ff7f7314999-7ff7f73149b0 call 7ff7f73f25e0 301->305 309 7ff7f7314a10-7ff7f7314a2b 304->309 305->299 306->287 307->282 320 7ff7f7314aa8-7ff7f7314ab6 307->320 313 7ff7f7314a6c-7ff7f7314a77 309->313 314 7ff7f7314a2d 309->314 312->299 313->309 319 7ff7f7314a79 313->319 318 7ff7f7314a30-7ff7f7314a41 314->318 322 7ff7f7314a4e 318->322 323 7ff7f7314a43-7ff7f7314a46 318->323 319->291 324 7ff7f7314ab8-7ff7f7314ac4 320->324 325 7ff7f7314aea-7ff7f7314af4 320->325 327 7ff7f7314a52-7ff7f7314a6a 322->327 326 7ff7f7314a48-7ff7f7314a4c 323->326 323->327 324->325 328 7ff7f7314ac6-7ff7f7314acc 324->328 329 7ff7f7314b22-7ff7f7314b28 325->329 330 7ff7f7314af6-7ff7f7314b1f RtlAddFunctionTable 325->330 326->327 327->313 327->318 328->325 331 7ff7f7314ace 328->331 332 7ff7f7314b2a-7ff7f7314b31 329->332 333 7ff7f7314b62-7ff7f7314b6d 329->333 330->329 336 7ff7f7314ad0-7ff7f7314ae5 331->336 334 7ff7f7314b33-7ff7f7314b3f 332->334 335 7ff7f7314b56-7ff7f7314b5d 332->335 333->289 339 7ff7f7314b4b-7ff7f7314b51 334->339 340 7ff7f7314b41 334->340 335->289 341 7ff7f7314ae7 336->341 339->289 340->339 341->325
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocErrorLastVirtual$Heap$FreeProcess$AddressFunctionHandleInfoModuleNativeProcSystemTable
        • String ID: RtlAddFunctionTable$ntdll
        • API String ID: 1700573182-1103699993
        • Opcode ID: 1198e67249c0b7e84dde9154b3b4e9c9355052bda3a350e5c94f78a972d0fa75
        • Instruction ID: d12f8aa4e7019dcaa70dcd2d6493a6624e38c759bd67162dd0ac25db05615054
        • Opcode Fuzzy Hash: 1198e67249c0b7e84dde9154b3b4e9c9355052bda3a350e5c94f78a972d0fa75
        • Instruction Fuzzy Hash: CEF18C3AF0968297EB60AB15E450779B3A1FF44B94F854039CA6E47790DF7CE442C790

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Close$OpenQueryValuelstrcmp
        • String ID: %s-%d$error
        • API String ID: 4288439342-992067998
        • Opcode ID: 339020dc813d921992459e6716a65cd383114c8633f93e4cc4539f4e2fb5fbc3
        • Instruction ID: acb5812799780f4feb31c7a867ef621a71572fe9b0fab6254912aa46a5aed3cf
        • Opcode Fuzzy Hash: 339020dc813d921992459e6716a65cd383114c8633f93e4cc4539f4e2fb5fbc3
        • Instruction Fuzzy Hash: 73512331216A51C2EB60DB11F89877B73B4F784B85F905125FACA83AA4EF3EC549CB40

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Crypt$ContextHash$AcquireCloseDestroyHandle$CreateDataDecryptDeriveRelease
        • String ID: 2b134t52mhhbGaN4$Error creating a keyset!$Microsoft Enhanced Cryptographic Provider v1.0
        • API String ID: 3666277636-84394693
        • Opcode ID: f172555bccba036a97b3cd1372cebb2be6ca885063ea5db245dcb55184fec282
        • Instruction ID: c4d893568dbef26ce094fd7e51bbbf7fc424321a89b7f8472bf0707a72cfb2d2
        • Opcode Fuzzy Hash: f172555bccba036a97b3cd1372cebb2be6ca885063ea5db245dcb55184fec282
        • Instruction Fuzzy Hash: FC417F3AF04A52C6F710EB61E8005B9B7B1FF84768B914235C92E53AE4DF38D10AC791

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValue_vswprintf_s_lswprintf
        • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
        • API String ID: 1494749741-3190923360
        • Opcode ID: 63a278c1726442162d98cc2237712d9ccc026d0492f426b623a28aeacd60e9e6
        • Instruction ID: 7b1e13287b735aec06d7aa99fc827a25a8c1875718494636e40e9b6704219acc
        • Opcode Fuzzy Hash: 63a278c1726442162d98cc2237712d9ccc026d0492f426b623a28aeacd60e9e6
        • Instruction Fuzzy Hash: D7316032216781C6EB60AB21F4587BA73B4F785B94F644211EEDA17B98DF3AC505CB10

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
        • String ID:
        • API String ID: 950253168-0
        • Opcode ID: e4f1b628e603b8c0e271cec45e5bcd3519c32228a8b6efe7a25591412e67fb9e
        • Instruction ID: 8e824c17b5f528d1ed209618fbe977e5d6acf9dd49b48f9d6a99e568a0066729
        • Opcode Fuzzy Hash: e4f1b628e603b8c0e271cec45e5bcd3519c32228a8b6efe7a25591412e67fb9e
        • Instruction Fuzzy Hash: EF513732605B80C7DB60DF65F44436AB7B4F789B98F504219EACA53B64DF3EC0599B00

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
        • String ID:
        • API String ID: 950253168-0
        • Opcode ID: 6be368349b335f687857114e3581a3aed3ff549df64c905fc01b56a36ba75a01
        • Instruction ID: e00b2aa1afe8dc942cd989892e5c322118a8095490c56380a45fdb8c14d7f693
        • Opcode Fuzzy Hash: 6be368349b335f687857114e3581a3aed3ff549df64c905fc01b56a36ba75a01
        • Instruction Fuzzy Hash: 76512A72204B8087DB65CF66F8407AAB7A4F789B98F004219EB9E57B65DF3DC149DB00

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$CreateWindow$CloseConsoleCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
        • String ID:
        • API String ID: 1785272045-0
        • Opcode ID: ee474838568d569156a9ab4685564af73a3dd786a2dd2134ad0acab19430d296
        • Instruction ID: fe11c5c89b342f1589b79449597d4b3e4c24726e3e961e716cd572b682034483
        • Opcode Fuzzy Hash: ee474838568d569156a9ab4685564af73a3dd786a2dd2134ad0acab19430d296
        • Instruction Fuzzy Hash: 52111575610A0082F717DB72FC697EA33A2BB8C795F44412ABB5A4B671CF3985899200

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: swprintf$DiskDriveFreeGlobalMemorySpaceStatusType
        • String ID: %sFree%d Gb $:$@$HDD:%d
        • API String ID: 2105347210-3501811827
        • Opcode ID: 921d8f27bbcfc5cac4d84ec7f6df4691689466164058b9f85b3ed9747272aa44
        • Instruction ID: edac89a69e61c022d170a2da520a0fb41f1901c1065afab2062fdb0ccf8c607b
        • Opcode Fuzzy Hash: 921d8f27bbcfc5cac4d84ec7f6df4691689466164058b9f85b3ed9747272aa44
        • Instruction Fuzzy Hash: CC313736209B84C6E760EB15F8447ABB7B4F389788FA01116EACD43B19DF3AC556CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Close$CreateInitializeInstanceOpenlstrlenswprintf
        • String ID: %s $DriverDesc$SYSTEM\CurrentControlSet\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
        • API String ID: 900129089-2074342395
        • Opcode ID: 414001dd6f4b59178dfbdb8a04c3b81a196c16d8098a2c073610e78b58e0a71d
        • Instruction ID: 44e44f2999d861d8ffaa7594ab7bc2ecf13e47f48022384dbc350ab9ea068822
        • Opcode Fuzzy Hash: 414001dd6f4b59178dfbdb8a04c3b81a196c16d8098a2c073610e78b58e0a71d
        • Instruction Fuzzy Hash: B9218572225A89C3EB10DF25E4597A977B0F7C8B45F905112EACE43B54DF3AC909CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 14f04c64a592990b04a434c863bea14f9e693fb1411986df20686f0e1fcf2037
        • Instruction ID: bd8ab25055cdf1c4f00d1f9544e5d18c370cd6b099f676828110252e3c138bc8
        • Opcode Fuzzy Hash: 14f04c64a592990b04a434c863bea14f9e693fb1411986df20686f0e1fcf2037
        • Instruction Fuzzy Hash: 77314E32215B80C6DB60EB25E8487BE73B4F788798F600115EADD43B99DF3AC555CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Heap$CreateInformationVersion
        • String ID:
        • API String ID: 3563531100-0
        • Opcode ID: 2da6a33331be37aea9e041944a378e02ae9d1d2031e246c02c7f00763c845b9d
        • Instruction ID: 2463b50f8d69bbb081123bf6edbc3b25ffb6a7c0226bc862cae08bc0b8aa3f70
        • Opcode Fuzzy Hash: 2da6a33331be37aea9e041944a378e02ae9d1d2031e246c02c7f00763c845b9d
        • Instruction Fuzzy Hash: E3E0C974A12650C3FB846715E84D77932B1F798745FA45415E9CA03B94EF3A85458710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocVirtualmallocrecvselect
        • String ID:
        • API String ID: 1241053632-0
        • Opcode ID: a988ccf7a066a7ec199917bd5ea2c0e45977bb7d9429f392867354966ccba78a
        • Instruction ID: 72a34ec5176a50ef011136d5b2f28e1f0a07e3bce7b67a6e404a10e5ccf7df62
        • Opcode Fuzzy Hash: a988ccf7a066a7ec199917bd5ea2c0e45977bb7d9429f392867354966ccba78a
        • Instruction Fuzzy Hash: 2A219F72716A80C1EB60AB25F5993BE72B0F789B88F600125DB8E47B99DF3AC0058704

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateMutex$Sleep$ConsoleErrorHandleLastModuleWindowlstrcmplstrlen
        • String ID: 2024. 9. 2$key$open
        • API String ID: 4141083079-93764921
        • Opcode ID: 66d0600071f0f3915794d2991b8f21b3d63c5bbc832a269f4ff7be3149a67255
        • Instruction ID: 2e51d2bb220331a6f181effb0746fa396318fbd75d01eb1b96f41a507a2dfb52
        • Opcode Fuzzy Hash: 66d0600071f0f3915794d2991b8f21b3d63c5bbc832a269f4ff7be3149a67255
        • Instruction Fuzzy Hash: 6B314B71612A45C2FB50BB20E8AC3BA33F1FB94705FA04566E5CA42AA5DF3BC808C740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Sleep$CloseCreateEventHandle
        • String ID: 206.238.220.204$206.238.220.204$206.238.220.204$6666$6666$8888
        • API String ID: 1603472376-913434440
        • Opcode ID: a0f3fcac8467a186e70fc3d0f1e9634cb6668e8e39ecb6f8bf227a2d123b2ab3
        • Instruction ID: f9672b19bd4d940d0eafbb644b3287daaa15567fe727fe739266967074bb03a5
        • Opcode Fuzzy Hash: a0f3fcac8467a186e70fc3d0f1e9634cb6668e8e39ecb6f8bf227a2d123b2ab3
        • Instruction Fuzzy Hash: B2812475220A4086E713DB66E854BE977A5F78DBC4F80412AFB1A47AF1CF38C945C740

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$EventSelectconnect$send
        • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
        • API String ID: 1826129850-4236689219
        • Opcode ID: 139d6e0b11e75e2d957019177b71ab07b7833485f606efeb0368cc19468fda0d
        • Instruction ID: 99e2289132232311c34ceb59dbb758c0b81f7082a8ce3018f105167220c7fc9e
        • Opcode Fuzzy Hash: 139d6e0b11e75e2d957019177b71ab07b7833485f606efeb0368cc19468fda0d
        • Instruction Fuzzy Hash: 22316171714A1082FBA2DB67E8957A92260FB4CBE4F500624EB1D87AF0CF79C8D59700

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 566 7ff7f7319920-7ff7f7319997 call 7ff7f73195f0 call 7ff7f7321d90 571 7ff7f7319999-7ff7f731999b 566->571 572 7ff7f73199ac-7ff7f73199b5 call 7ff7f731d970 566->572 573 7ff7f73199ba-7ff7f73199d8 call 7ff7f7329470 call 7ff7f7349080 571->573 574 7ff7f731999d-7ff7f73199a6 571->574 572->573 581 7ff7f73199de-7ff7f73199f7 GetProcAddress 573->581 582 7ff7f7319b42 573->582 574->573 576 7ff7f73199a8 574->576 576->572 584 7ff7f7319a17 581->584 585 7ff7f73199f9-7ff7f7319a15 call 7ff7f7329470 call 7ff7f7349080 581->585 583 7ff7f7319b45-7ff7f7319b4d 582->583 586 7ff7f7319b4f-7ff7f7319b52 583->586 587 7ff7f7319b61-7ff7f7319b6a call 7ff7f731d970 583->587 588 7ff7f7319a1b-7ff7f7319a1e 584->588 585->588 591 7ff7f7319b6f-7ff7f7319b9a call 7ff7f73f0a50 586->591 592 7ff7f7319b54-7ff7f7319b5b 586->592 587->591 594 7ff7f7319a20-7ff7f7319a23 588->594 595 7ff7f7319a25-7ff7f7319a3c GetProcAddress 588->595 592->591 597 7ff7f7319b5d 592->597 598 7ff7f7319a40-7ff7f7319a42 594->598 595->598 597->587 601 7ff7f7319a5f-7ff7f7319a62 598->601 602 7ff7f7319a44-7ff7f7319a5b call 7ff7f7329470 call 7ff7f7349080 598->602 605 7ff7f7319a68-7ff7f7319a78 GetProcAddress 601->605 606 7ff7f7319a64-7ff7f7319a66 601->606 602->601 607 7ff7f7319a7b-7ff7f7319a7e 605->607 606->607 607->582 609 7ff7f7319a84-7ff7f7319a87 607->609 609->582 611 7ff7f7319a8d-7ff7f7319a90 609->611 611->582 613 7ff7f7319a96-7ff7f7319aca GetFileVersionInfoSizeExW 611->613 613->582 614 7ff7f7319acc-7ff7f7319aec call 7ff7f73f0d2c GetFileVersionInfoW 613->614 617 7ff7f7319aee-7ff7f7319b0d 614->617 618 7ff7f7319b35 614->618 617->618 622 7ff7f7319b0f-7ff7f7319b33 617->622 619 7ff7f7319b38-7ff7f7319b40 call 7ff7f73f0d24 618->619 619->583 622->619
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc$FileInfoVersion$Size
        • String ID: GetFileVersionInfoSizeW$GetFileVersionInfoW$VerQueryValueW
        • API String ID: 2598009218-981298171
        • Opcode ID: efbc4de875c51c5db1a2f3792e47a6250654341176fabd58788366e8468207f5
        • Instruction ID: 8b2b01bfdebf4866d7be9a385c0a9a5105c0f43be585cafebdebb116ab806ed8
        • Opcode Fuzzy Hash: efbc4de875c51c5db1a2f3792e47a6250654341176fabd58788366e8468207f5
        • Instruction Fuzzy Hash: 3171A226F096D29AFB11EB61D4502BCA3A4AF487A8F904139DD6E537C9DE7CD407C3A0
        APIs
        Strings
        • <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!, xrefs: 000000014000A024
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$ErrorLast$send
        • String ID: <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!
        • API String ID: 484515946-1981346945
        • Opcode ID: 5d57d71f2378e127ec58ca066b800eec07ab1c04eeec1237c94df71af28c7d82
        • Instruction ID: e19302107cfcd4d779bf577067bd819c2068326c636a879e7a686293c695ea1d
        • Opcode Fuzzy Hash: 5d57d71f2378e127ec58ca066b800eec07ab1c04eeec1237c94df71af28c7d82
        • Instruction Fuzzy Hash: D35158B2205B4086EA66DB22F5403EEB3A5F74DBE0F440216EB9A47BA5DF38D595C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Sleep$CreateEvent$CloseHandleTimemalloctime
        • String ID:
        • API String ID: 3316233393-0
        • Opcode ID: 482f008a18393b0adca5cb6b4fb91beae11170d46349654fa1bb411dd128e68f
        • Instruction ID: 8082ef83bc92b70553dfdb52a9dee960ae8875b1953704e18da45eb19ea91207
        • Opcode Fuzzy Hash: 482f008a18393b0adca5cb6b4fb91beae11170d46349654fa1bb411dd128e68f
        • Instruction Fuzzy Hash: B7514572205B4086EB26DB22E5587E973A9E78DBD4F40421AFB5A47BE5CF38C944CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: InfoSystem$AddressHandleModuleNativeProc
        • String ID: GetNativeSystemInfo$kernel32.dll
        • API String ID: 3433367815-192647395
        • Opcode ID: 4c543a427f66828ddaee1c6b6b9de7146d4486ede89bd39138456da059a21970
        • Instruction ID: 7b93d89bbc848e30fbd4925d11d2df4bfe5e0043c7f40fb5c13d1854be9fc917
        • Opcode Fuzzy Hash: 4c543a427f66828ddaee1c6b6b9de7146d4486ede89bd39138456da059a21970
        • Instruction Fuzzy Hash: D501BB35616B85C6DBA0AB50F86837A72F5F788740FA40525D6CE43794EF3EC5648B10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Error$Mode$AttributesCreateFileInstance$InitializeLast
        • String ID: .lnk
        • API String ID: 3954637025-24824748
        • Opcode ID: b24c9fa08b6c10a9395fee26efdd86fb9591dd87fe76247a54ad9b3307d2d46f
        • Instruction ID: 9767d9c5006a4ebc35a844676f8172238514dda7a31090aca4bf3f6e3ea67c05
        • Opcode Fuzzy Hash: b24c9fa08b6c10a9395fee26efdd86fb9591dd87fe76247a54ad9b3307d2d46f
        • Instruction Fuzzy Hash: 73F1C13761968197E720EF25D4402AEB3A0FF84B58F544139EA6D876D8DF3CD942CBA0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorEventLastSelect
        • String ID:
        • API String ID: 1135597009-0
        • Opcode ID: ca51bb135ca9b6b53a41005a3fb522d120fffd9efbfa981f642130a86738c22e
        • Instruction ID: 9b8ff33ad4f21ee875c00557280bc8415497f07eb4acfa47184f87d0d427e899
        • Opcode Fuzzy Hash: ca51bb135ca9b6b53a41005a3fb522d120fffd9efbfa981f642130a86738c22e
        • Instruction Fuzzy Hash: E9218EF26006008BF759CF76E4493A936E0E70CB99F650218DB19C76E0CBBAC9D6DB44
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
        • String ID:
        • API String ID: 3283625137-0
        • Opcode ID: 1fc69dd64072fa7bf409c8ce7061121ab39990cf21b2db261d2c093eb0dfa2fa
        • Instruction ID: 5f880ac9181c2f12e2907e79713121bb8487ba28d92c78aa8c40f92f9aecd6a3
        • Opcode Fuzzy Hash: 1fc69dd64072fa7bf409c8ce7061121ab39990cf21b2db261d2c093eb0dfa2fa
        • Instruction Fuzzy Hash: AA21A731205B80C6FB54BBA6E5497BEB2B4F784BD8F644225AED9037D6DF3AC4508B00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
        • String ID:
        • API String ID: 3283625137-0
        • Opcode ID: b11140e7446571eafd14e7012cf083d785f14c4c77ccc4c9425ccbac4b8ec313
        • Instruction ID: 37f882430a81e144da6995cd907b33d2ea7b296969054656d38c24131aaea18f
        • Opcode Fuzzy Hash: b11140e7446571eafd14e7012cf083d785f14c4c77ccc4c9425ccbac4b8ec313
        • Instruction Fuzzy Hash: A72195B1215B8086EA16DB67B9417DAB290F78CBD0F444625BF69037E6DF38D4508740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc
        • String ID: timeKillEvent$timeSetEvent$winmm
        • API String ID: 190572456-1618422980
        • Opcode ID: 122c8a63f252d51b526212ba5446e8d602476a32e04a82d9a1aae74211740df4
        • Instruction ID: 2760bf511119373caba2bded11ffe22a43d675ce8208d3cec59d250bd99a3d23
        • Opcode Fuzzy Hash: 122c8a63f252d51b526212ba5446e8d602476a32e04a82d9a1aae74211740df4
        • Instruction Fuzzy Hash: 6251A479A096919AFB54EF24DC416B8A3A0AF40768F944138ED2E437D9DF3CD847C7A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$FreeHeapTimerWaitable_errnomalloc
        • String ID: bad allocation
        • API String ID: 996728788-2104205924
        • Opcode ID: f8b2bde9cf209f261d56d6a1b00d68b5bb4cd4d590ef32a8494881bf267ae9a2
        • Instruction ID: 94c656a112711b9f92b20cc6127c6b9282d1092eb86de163954d4faba0118a15
        • Opcode Fuzzy Hash: f8b2bde9cf209f261d56d6a1b00d68b5bb4cd4d590ef32a8494881bf267ae9a2
        • Instruction Fuzzy Hash: 9A412472212B8489EB61DF66E9547D833A8F748BC8F984125EF4D0BB69DF78C551C304
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocCloseHandleVirtual
        • String ID: .$l$n
        • API String ID: 1420394295-2376909228
        • Opcode ID: ce9479c637d506cdde78aefb60dd895aff2b1a61f0d53a8078a23adf0ea733dc
        • Instruction ID: cecaae5f03fb596294a166a6b727b5315bd6c99abd8d4f327956ccdac3478328
        • Opcode Fuzzy Hash: ce9479c637d506cdde78aefb60dd895aff2b1a61f0d53a8078a23adf0ea733dc
        • Instruction Fuzzy Hash: 81519C76324A8086E721DF26E4447DAB761F78DB84F10902AFB4A87BA5DF3DC505CB01
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: setsockopt$ErrorLast
        • String ID:
        • API String ID: 1564866530-0
        • Opcode ID: a4858c02dc920b4e29ad202f91ccd05f850526e49aa390ca8bb9a02fdcc47647
        • Instruction ID: 602cb659ebd87d0b786e6d9020230c23cdfcde8f81faa4eb3e089f71648bbc11
        • Opcode Fuzzy Hash: a4858c02dc920b4e29ad202f91ccd05f850526e49aa390ca8bb9a02fdcc47647
        • Instruction Fuzzy Hash: EC117271318981C3F720CF65F5043AAA761F7897A8FA40225FB9807EE8CB7EC5498B04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressFolderInit_thread_footerPathProcSpecial
        • String ID: /$/$/data
        • API String ID: 4283787320-2895359887
        • Opcode ID: d1e49fa3896eafa6007d938f4fdc5880bf972e46184820727c7f6e229fefdf32
        • Instruction ID: eba84cacabc52a3cba8f40eae5bb7c311e7dfb9965917a082535bd0e7589b4fb
        • Opcode Fuzzy Hash: d1e49fa3896eafa6007d938f4fdc5880bf972e46184820727c7f6e229fefdf32
        • Instruction Fuzzy Hash: C7B1C23AA0968157EB10EB2DD49017DB3A0FF847A4F944135EA6E836D6DF3CD846CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: EnumErrorEventEventsLastNetworkReset
        • String ID:
        • API String ID: 1050048411-3916222277
        • Opcode ID: fa868995986a14abb85073b18f218ae2a53ef825df2d0f67fe1e49d6a425e339
        • Instruction ID: 5a56c2ca883d86df65ce7083488b71bfca8bd6176ccbe13178db47678fe34849
        • Opcode Fuzzy Hash: fa868995986a14abb85073b18f218ae2a53ef825df2d0f67fe1e49d6a425e339
        • Instruction Fuzzy Hash: BD513AB2204B448BE762CF26E40479A77F1F78DBD8F190215EB89472A9DB7EC9458B40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CancelEventclosesocketsetsockopt
        • String ID:
        • API String ID: 852421847-0
        • Opcode ID: 2a9ad9b7fa4f886587210fcf5cdafb31a936560bafd6b588060e346cf5de1bbb
        • Instruction ID: ce0ffe7f9e1570da9ba7108c18ec1eda5a1a8d6658b0f1fc1e4fcf1126c827a9
        • Opcode Fuzzy Hash: 2a9ad9b7fa4f886587210fcf5cdafb31a936560bafd6b588060e346cf5de1bbb
        • Instruction Fuzzy Hash: 00F03732604A80C3D7049F25E548369B3B0F785B64FA04325EBBD07BA4CF7AC46AC700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CancelEventclosesocketsetsockopt
        • String ID:
        • API String ID: 852421847-0
        • Opcode ID: 49c26dcf36976051189be324e92bcf16e191800432304aafcf15dff69e109372
        • Instruction ID: 2d1809b97a9702a462fefa8dca50ef9d6389b22542af97769ffcb03c0baeda86
        • Opcode Fuzzy Hash: 49c26dcf36976051189be324e92bcf16e191800432304aafcf15dff69e109372
        • Instruction Fuzzy Hash: 28F0F936204A8097E751CF26E5443A9B370F789BB4F504325EB6D47BA5CF39C5AACB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: FileLibraryLoadModuleName
        • String ID: .dll$PATH
        • API String ID: 1159719554-3816765965
        • Opcode ID: c5343b12e3117846d8bc79dda1a13aca70fa381a8a0851b60b5b434cecc1e18b
        • Instruction ID: 3a6f0d85c9fd13305819a25d536cade7528d9fb7343143a6d9544cee10f8dcda
        • Opcode Fuzzy Hash: c5343b12e3117846d8bc79dda1a13aca70fa381a8a0851b60b5b434cecc1e18b
        • Instruction Fuzzy Hash: 64E1A136B09591ABEB50EE35C8412BCB3A0AF45768F944735DA3D836D9DF28D807C7A0
        APIs
        • GetVersionExW.KERNEL32 ref: 00007FF7F731A496
          • Part of subcall function 00007FF7F7319920: GetProcAddress.KERNEL32 ref: 00007FF7F73199E8
          • Part of subcall function 00007FF7F7319920: GetFileVersionInfoSizeExW.KERNELBASE ref: 00007FF7F7319AC1
          • Part of subcall function 00007FF7F73197B0: VerSetConditionMask.KERNEL32 ref: 00007FF7F73197E4
          • Part of subcall function 00007FF7F73197B0: VerSetConditionMask.KERNEL32 ref: 00007FF7F73197F3
          • Part of subcall function 00007FF7F73197B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF7F7319842
          • Part of subcall function 00007FF7F73197B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF7F731986A
          • Part of subcall function 00007FF7F73197B0: VerSetConditionMask.KERNEL32 ref: 00007FF7F7319889
          • Part of subcall function 00007FF7F73197B0: VerSetConditionMask.KERNEL32 ref: 00007FF7F731989A
          • Part of subcall function 00007FF7F73197B0: VerSetConditionMask.KERNEL32 ref: 00007FF7F73198AB
          • Part of subcall function 00007FF7F73197B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF7F73198C1
          • Part of subcall function 00007FF7F73197B0: VerifyVersionInfoW.KERNEL32 ref: 00007FF7F73198EA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Version$ConditionInfoMask$Verify$AddressFileProcSize
        • String ID: Qt: Untested Windows version %d.%d detected!$default
        • API String ID: 3189366613-4050888621
        • Opcode ID: 56fe74357d412eeec9feb3abae344f86caa2346e8b58c8be68436d8c79f3f852
        • Instruction ID: 13a09615f1b9087181b51c3dc679ab7a9d90676decbb7ee77cb319c1a9359883
        • Opcode Fuzzy Hash: 56fe74357d412eeec9feb3abae344f86caa2346e8b58c8be68436d8c79f3f852
        • Instruction Fuzzy Hash: CF418DB9D0C28293EB74A615949077DE3A0EF55371FE0003FD6AE426C5EE9CE84787A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocFreesend
        • String ID:
        • API String ID: 2354595252-0
        • Opcode ID: d32468d94f511778c6efb9e4a37247997571d09d1ecdf759417b344c15647baf
        • Instruction ID: c386b83460c13cd3b43a28069926cd7ebcb420af6f38d37e418ea9263e80ce11
        • Opcode Fuzzy Hash: d32468d94f511778c6efb9e4a37247997571d09d1ecdf759417b344c15647baf
        • Instruction Fuzzy Hash: BE513C72210B4087E766DF2BF45079AB7A5F788BC4F148129EB8A97B64DF78D445CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateErrorEventLastsocket
        • String ID:
        • API String ID: 2854923884-0
        • Opcode ID: e0cbaf7c63bf1ec2e30ce2e462ca0de58b14044d59c9cdb963edb7254d9caeaa
        • Instruction ID: 6f895d5ae6b0c7e0c03d244604886a8c65f5e7e6555a5c7cfe512488f2747cee
        • Opcode Fuzzy Hash: e0cbaf7c63bf1ec2e30ce2e462ca0de58b14044d59c9cdb963edb7254d9caeaa
        • Instruction Fuzzy Hash: 883183B5604B5086E666DB23B8043EA62E1F7CEBE4F040215BB9A47AF6DFBCC551C701
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressErrorLastStringhtons
        • String ID:
        • API String ID: 1418563660-0
        • Opcode ID: a3fb8ebb527ba10d12834dcc094aead56c5fcf668bc44d138c8b989b3c6a5e40
        • Instruction ID: b0cac0e71a32bd63811cbb38c6314f16192b3d890269d803ef2ef19208760f43
        • Opcode Fuzzy Hash: a3fb8ebb527ba10d12834dcc094aead56c5fcf668bc44d138c8b989b3c6a5e40
        • Instruction Fuzzy Hash: 4D01A2B62186A082E7158B26F4153B9A3A1FB48BC8F844025FFDD477A4DA39C9919700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateThread$ObjectSingleWait
        • String ID:
        • API String ID: 1771687473-0
        • Opcode ID: 81b2f335489e0c723144b70b464700628b019d4b610a67576bf3cf9a64e068e0
        • Instruction ID: 73b2172b9501969b97f94f26d11b97a33d67b38a2159de8ae5c5c095779b8346
        • Opcode Fuzzy Hash: 81b2f335489e0c723144b70b464700628b019d4b610a67576bf3cf9a64e068e0
        • Instruction Fuzzy Hash: A0018C31906B40C6E768EF71FC99B7633B1F398308FA44269D5CA42AA4CF3EC1148704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Heap$CreateInformationVersion
        • String ID:
        • API String ID: 3563531100-0
        • Opcode ID: dab1620e64bba2d977448fbcf9058565a5723aec7899ea49ad2290dc2e13d490
        • Instruction ID: 11b2e8d63657c493eb38dd465c5d544629449580d8c01811b72ebb2c961a9503
        • Opcode Fuzzy Hash: dab1620e64bba2d977448fbcf9058565a5723aec7899ea49ad2290dc2e13d490
        • Instruction Fuzzy Hash: 33E01A79612A8082FB8AAB56E8497EA2261FB8C785F805019FB4E077A5DF3DC4468704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocLibraryLoadVirtual
        • String ID:
        • API String ID: 3550616410-0
        • Opcode ID: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
        • Instruction ID: 042be6fbcf340d861f811d13bbc9479a7c03ed9c2a583731e71d9000e3dc31ac
        • Opcode Fuzzy Hash: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
        • Instruction Fuzzy Hash: 83C1C430219E0ACBDB68AE69D889775B3F0FB54311F65413DD8CAC7281DA79E892C7C1
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: FullNamePath$ExceptionThrow
        • String ID:
        • API String ID: 606229857-0
        • Opcode ID: cef41dd83b95d9f355ff0fae64ef258b4847377f3d45da9317d33ccdc43f3009
        • Instruction ID: 2ec1993c1fa698a755420ecb37e69ad8d29c09aaebb3eefe12489df4a92faa29
        • Opcode Fuzzy Hash: cef41dd83b95d9f355ff0fae64ef258b4847377f3d45da9317d33ccdc43f3009
        • Instruction Fuzzy Hash: F051A7776086C196DB20EF55E4402AEB360FB84BA4F944139DA9D837D4DF7CD546CB80
        APIs
        • VirtualFree.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,00000000,?,00007FF7F7314AA0), ref: 00007FF7F73141F7
        • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,?,00000000,?,?,00000000,?,00007FF7F7314AA0), ref: 00007FF7F731425E
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$FreeProtect
        • String ID:
        • API String ID: 2581862158-0
        • Opcode ID: 8f8e47707ebd93ed1f71c6a183001e7ecbe9b94e491bc39c99885a78eb5476a0
        • Instruction ID: ab3de2f94b6ecabe32bc8e55b2acd381b2c23fa5e17cef97d64da0b11c624e43
        • Opcode Fuzzy Hash: 8f8e47707ebd93ed1f71c6a183001e7ecbe9b94e491bc39c99885a78eb5476a0
        • Instruction Fuzzy Hash: BE21F4BAF14A8582EF20DB06D450A68A361FBA4FD4FD65035CE1D47791DE3CD892C790
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: send
        • String ID:
        • API String ID: 2809346765-0
        • Opcode ID: 4d82d8ce8297748054077ff5a83405a44117ba6789b74d22cb788790d759d827
        • Instruction ID: a9a0367f8085be0a3a8f34c5c9eb81f2418d8be8a90d8d859ca2e5cd89ffc5f9
        • Opcode Fuzzy Hash: 4d82d8ce8297748054077ff5a83405a44117ba6789b74d22cb788790d759d827
        • Instruction Fuzzy Hash: B921E1B2704A9041E3618F27B8407EAB694F7CDBD4F045121FF5983BA2FBB8C4828300
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocVirtualmallocrecvselect
        • String ID:
        • API String ID: 1241053632-0
        • Opcode ID: 505b6903d59803aef40d8381a865ccc397fe224001b798411c91ea7f351c35a7
        • Instruction ID: e79e53effcdf3112c95f2337ea6b6acd2f53d3d590a13a7037282b1afe0fdc01
        • Opcode Fuzzy Hash: 505b6903d59803aef40d8381a865ccc397fe224001b798411c91ea7f351c35a7
        • Instruction Fuzzy Hash: 1D219CB2714A8081EB71DF26F5543EA63A0E789FC8F408125EB5D87BA9EF38C1458B00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Gdip$CreateDisposeFreeHeapImagefree
        • String ID:
        • API String ID: 1469048323-0
        • Opcode ID: 1e852e01241bb4f9f199057eb3e4331d9c0c2a302e0f1085875ebc1fe2c2c545
        • Instruction ID: dae731aab3e7e43c1ed64305412f85e523cdb1364ea630222100eea01466795a
        • Opcode Fuzzy Hash: 1e852e01241bb4f9f199057eb3e4331d9c0c2a302e0f1085875ebc1fe2c2c545
        • Instruction Fuzzy Hash: 3D116AB3111B80CAE754DF25E48462D77F8F788B88F685419EF8913B29CB39C8A0CB44
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateHeapfree
        • String ID:
        • API String ID: 2345683253-0
        • Opcode ID: 28c10530bac5da55857837622ebc9bb0a9222c4d30909a16d0c3f2103b32b967
        • Instruction ID: e9c3ad32272f9072ca89ff6d639c6e7b0cee97d95a3e8c3e1d0d463da563d760
        • Opcode Fuzzy Hash: 28c10530bac5da55857837622ebc9bb0a9222c4d30909a16d0c3f2103b32b967
        • Instruction Fuzzy Hash: C8116AB3114B808AD751CF26E48075D77B8F788B88F685029EF9917B29CB34C8A1CB48
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorIoctlLast
        • String ID:
        • API String ID: 4052769934-0
        • Opcode ID: 312aed48b350a6209cc86974967232855cb715dd87e6e1548b6b0fe6eba230ae
        • Instruction ID: f01f3c849799de985b5d5e858bfb08d7df10fa5871a8be8eb346f901d8f668c6
        • Opcode Fuzzy Hash: 312aed48b350a6209cc86974967232855cb715dd87e6e1548b6b0fe6eba230ae
        • Instruction Fuzzy Hash: F7F08272504740C3D7118F20B48029AB7A5F7C8760F940339FBAD46AA4CB3CC699DE00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ObjectSingleSleepWait
        • String ID:
        • API String ID: 309074506-0
        • Opcode ID: 603a922227ff03948ea78d4582b52cf0cf5df44459da400247924caec94784ac
        • Instruction ID: e61617ec54a607614f8729d208c7933ec504356b0bf9dae2a8fcd807036d5cba
        • Opcode Fuzzy Hash: 603a922227ff03948ea78d4582b52cf0cf5df44459da400247924caec94784ac
        • Instruction Fuzzy Hash: 3CE0EC7261494085E752DB7BA85436423A1FB8CF64F1407219B7D8A2E5CE35C0419264
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocFree
        • String ID:
        • API String ID: 2087232378-0
        • Opcode ID: 0b4d83cdc7f3374882a2405b78c883344f199d32df5bac03a6686caa87e666e1
        • Instruction ID: 70cb798ce691b1d1b3747c3c80cce9e382c7a2f5387daa1aeb325cd09070d138
        • Opcode Fuzzy Hash: 0b4d83cdc7f3374882a2405b78c883344f199d32df5bac03a6686caa87e666e1
        • Instruction Fuzzy Hash: B241E4B2700A8486D71ACF2AE9407D9A7A1F788BC8F048529FF4A47B69DE34C891C740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocFree
        • String ID:
        • API String ID: 2087232378-0
        • Opcode ID: 35ec61db66e325779c8396a2d5ca1d82070d184fb1970e64289eed608e10a2fb
        • Instruction ID: f16518db71c21787d7e0962e8ac704ec91cd38b893080e9dde5852ea236419e3
        • Opcode Fuzzy Hash: 35ec61db66e325779c8396a2d5ca1d82070d184fb1970e64289eed608e10a2fb
        • Instruction Fuzzy Hash: E2217F72714A4086D746CB2AF54039963A1F78CBC4F548525FB5997B58DF34D8E28B40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: DecodePointer
        • String ID:
        • API String ID: 3527080286-0
        • Opcode ID: 9da76b86c43469502cb9962a14670a8e5049ec898b9d5911d73b5e2543db7b42
        • Instruction ID: ba10ca93fc3ce3adecbb10fc561c3f58aeee1361be2677ef7c62d7882972e79e
        • Opcode Fuzzy Hash: 9da76b86c43469502cb9962a14670a8e5049ec898b9d5911d73b5e2543db7b42
        • Instruction Fuzzy Hash: 3A011A36A14B84C2E764AB62F44572AB764F799BC4F684525EFCC07F59CE39C5118A00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressCurrentProcThread
        • String ID:
        • API String ID: 3962317920-0
        • Opcode ID: acc812e3850b7be8dd11515c35d5aee543ce9ef8fc169abd74eb55cbd8338b55
        • Instruction ID: 99517b35d93ec8e280f5e39e78bf18f2cb98a989860e0b78884c58b4ab6f037a
        • Opcode Fuzzy Hash: acc812e3850b7be8dd11515c35d5aee543ce9ef8fc169abd74eb55cbd8338b55
        • Instruction Fuzzy Hash: 8711E836509F8184D3809F34F94139973E8F709B58FA44239DAAC877A9EF388065C720
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CurrentThreadstd::bad_exception::bad_exception
        • String ID:
        • API String ID: 299378639-0
        • Opcode ID: 058f0110385e271502d91cabf9693d420978a267fc73d507fc430bd55fc21fba
        • Instruction ID: 8dfb33ca87a8df9487d93f47f4686d1fe29d5f1808fcd351b608dd058051c237
        • Opcode Fuzzy Hash: 058f0110385e271502d91cabf9693d420978a267fc73d507fc430bd55fc21fba
        • Instruction Fuzzy Hash: A3F08225709B8252DB54AB15F805169E2A4AF497E0FD44338EFBC077E6DE3CD0918650
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Startup
        • String ID:
        • API String ID: 724789610-0
        • Opcode ID: 90d8150e3757ef238170da936ae11fff972097fbe498c69ec85e5f8ebc6fd6bb
        • Instruction ID: 2911937ff579bdcfe6b4ac6631c023d3c56698f6ad4b92838af04f44b9dc91a7
        • Opcode Fuzzy Hash: 90d8150e3757ef238170da936ae11fff972097fbe498c69ec85e5f8ebc6fd6bb
        • Instruction Fuzzy Hash: 84F05276220A84DAEB12EF25E8193D873A4F74C784F808016FB8D8B768DF38C2118B00
        APIs
          • Part of subcall function 000000014000E71C: GetLastError.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E726
          • Part of subcall function 000000014000E71C: FlsGetValue.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E734
          • Part of subcall function 000000014000E71C: FlsSetValue.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E760
          • Part of subcall function 000000014000E71C: GetCurrentThreadId.KERNEL32 ref: 000000014000E774
          • Part of subcall function 000000014000E71C: SetLastError.KERNEL32(?,?,?,000000014000E559,?,?,?,?,000000014000CDFD,?,?,?,000000014000105E), ref: 000000014000E78C
        • ExitThread.KERNEL32 ref: 000000014000C424
          • Part of subcall function 000000014000E8F8: FlsGetValue.KERNEL32(?,?,?,000000014000C422,?,?,?,?,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000E911
          • Part of subcall function 000000014000E8F8: FlsSetValue.KERNEL32(?,?,?,000000014000C422,?,?,?,?,?,?,?,?,?,?,?,00000001400015D2), ref: 000000014000E922
          • Part of subcall function 000000014000E8F8: _freefls.LIBCMT ref: 000000014000E92B
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Value$ErrorLastThread$CurrentExit_freefls
        • String ID:
        • API String ID: 1216290073-0
        • Opcode ID: 50720535ccd6fb1326abae26ff6c97f43710cf1c4642367276e24177af361050
        • Instruction ID: b3ac20aaedd1452b9766895f4c06c775f723c0e6f08f999d19768f29f34785b6
        • Opcode Fuzzy Hash: 50720535ccd6fb1326abae26ff6c97f43710cf1c4642367276e24177af361050
        • Instruction Fuzzy Hash: 73C002B471238441FE2EB7B6345A7A811506B5D780E441438BA5A1B3A3DD7984094300
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: setsockopt
        • String ID:
        • API String ID: 3981526788-0
        • Opcode ID: e95747ce8f3f3750f5459e05a253b64576bad900133d075150429dbf0668e463
        • Instruction ID: cf5048b8f6b0cb3c2e2677f4137b1ab2fc995b420aa23efcee12e8e639857660
        • Opcode Fuzzy Hash: e95747ce8f3f3750f5459e05a253b64576bad900133d075150429dbf0668e463
        • Instruction Fuzzy Hash: 5AC012716141C187E720DF14D4053966B20F789344F900525F78806AA4C77DC25ACF04
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: setsockopt
        • String ID:
        • API String ID: 3981526788-0
        • Opcode ID: aad93ee022f5210646a99c84337d3774725d5d85ae8e5a47ae194036c45a8d95
        • Instruction ID: f9c991f187c9692375a014dc1883362d59b838f17bd84156b4685b9339654db1
        • Opcode Fuzzy Hash: aad93ee022f5210646a99c84337d3774725d5d85ae8e5a47ae194036c45a8d95
        • Instruction Fuzzy Hash: D0C012716141C187E720DF14D4043966B20F789348F900525FB8806AA4C77EC25ACF04
        APIs
        • HeapAlloc.KERNEL32(?,?,?,00007FF7F74039B5,?,?,00000000,00007FF7F740803F,?,?,?,00007FF7F7400B83,?,?,?,00007FF7F7400A79), ref: 00007FF7F7401C3E
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocHeap
        • String ID:
        • API String ID: 4292702814-0
        • Opcode ID: 460da5771890f454806aba5e565a12d6929184467c6de6092689245f29d5b967
        • Instruction ID: 65916961f8ad360d459a7bd5baa3affcc5baf7a410bf5a190fdac09dcdaa376e
        • Opcode Fuzzy Hash: 460da5771890f454806aba5e565a12d6929184467c6de6092689245f29d5b967
        • Instruction Fuzzy Hash: 50F08208B4D24246FF6876616840378D1944F957A2FC80230DD3F862C5DF2CE48359B4
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Process$AddressLibraryLoadProc$AllocCreateCurrentDirectoryFileMemoryModuleNameOpenSystemVirtualWrite
        • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
        • API String ID: 675209239-4110464286
        • Opcode ID: cb6061bd00fcf5d5817a298436270a70da75f0555b869f46bbdfee4cd9ce1f11
        • Instruction ID: fa2f060eb592f5cf070ba75698728f287e45628c92b8bb6be58aae88b00f764d
        • Opcode Fuzzy Hash: cb6061bd00fcf5d5817a298436270a70da75f0555b869f46bbdfee4cd9ce1f11
        • Instruction Fuzzy Hash: CCA11731612B81C6EB20EF61E8587BA77F5F749B88F900025DACA07A58DF7BC249C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: File$ClipboardCloseGloballstrlen$CountCreateHandleMutexObjectPointerReleaseSingleTickWaitWritewsprintf$DataLockOpenSizeSleepUnlock
        • String ID: [$[esc]$f
        • API String ID: 4024049034-3848119899
        • Opcode ID: 97fd7cb3ef38961945420586d2202e0037aa361a794408fddb7f4b1b4befad8b
        • Instruction ID: a9d4b7576ceac4c53acb14df34965f958b79cc8a1e245e0691e0cabdd774f7b8
        • Opcode Fuzzy Hash: 97fd7cb3ef38961945420586d2202e0037aa361a794408fddb7f4b1b4befad8b
        • Instruction Fuzzy Hash: 6A917D71212A45C6EB10FB25E8587BA77F0FB94B84FA44125DACA43AA5DF3FC549C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch$BitmapBitsDesktopModeSelectWindowmalloc
        • String ID: $gfff$gfff
        • API String ID: 1524144516-4202476792
        • Opcode ID: d936499b14b76e66d130f8d05095c3ee707fe66b3643cec9522bfb7bd31049c9
        • Instruction ID: 630541571334697bb97450b2df4cbc5d2f7cf58d3714e3d999a2a884bc500ef2
        • Opcode Fuzzy Hash: d936499b14b76e66d130f8d05095c3ee707fe66b3643cec9522bfb7bd31049c9
        • Instruction Fuzzy Hash: C2D1A032B15B40C6E715EB76E45837E73B1FB89B88F244225DE8A57B98EF3AC4458700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno_invalid_parameter_noinfo
        • String ID: U
        • API String ID: 3902385426-4171548499
        • Opcode ID: 30f2d96b9074e97b7c7e9f06a6e76ee1250dada0a486160a752ccb230227623d
        • Instruction ID: 7b024e8f60725e0e4ff9318b7bc2593b0660e0517677ab888b198949dce6d3f5
        • Opcode Fuzzy Hash: 30f2d96b9074e97b7c7e9f06a6e76ee1250dada0a486160a752ccb230227623d
        • Instruction Fuzzy Hash: 7112E132216A81C6EB20AF25D44837E77B5F385B98F744116EBCA47AA9DB3FC445CB10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: iswctype$_errno_invalid_parameter_noinfo_whiteout
        • String ID: %$*$F$I$L$N$h$w
        • API String ID: 3700623789-4081125726
        • Opcode ID: 5a47cfcad9870c6166d9b56845e0fa845daf07801b6f0568e4e7a86a5554995e
        • Instruction ID: 3a43cacbe7f742d51046b4182f051299d8fb4f8d2725d0f497ef73d231edb7a5
        • Opcode Fuzzy Hash: 5a47cfcad9870c6166d9b56845e0fa845daf07801b6f0568e4e7a86a5554995e
        • Instruction Fuzzy Hash: 14C2B07261A691C6FB60AF76D0483BE7BB0F785788F744115EAC657B99DB3AC840CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_getptdfree
        • String ID: $@
        • API String ID: 3872287888-1077428164
        • Opcode ID: 4ad68d052edb4066e7183ac2d39c2eb6e9cce887ff5bc7de5fef0a40779fa4e1
        • Instruction ID: ec8fa9b2de03bce30bbd0f779517e598af44ff1c3f64a5e5342da50d76466fc6
        • Opcode Fuzzy Hash: 4ad68d052edb4066e7183ac2d39c2eb6e9cce887ff5bc7de5fef0a40779fa4e1
        • Instruction Fuzzy Hash: EF52CD72A0A690C6FBA5AB69D44C37E7BB1B74579CF381405DACE477E8D63BC8408B00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_getptdfree
        • String ID: $@
        • API String ID: 3872287888-1077428164
        • Opcode ID: de789989f5679af20ad6b3dcbe4606d5ff2aeb23094d55da5cea7cfbe456f95e
        • Instruction ID: c4b7adbe74170d37bc43721bc9ce0890dfd36c0c7eea12d864fd826e3bd483ca
        • Opcode Fuzzy Hash: de789989f5679af20ad6b3dcbe4606d5ff2aeb23094d55da5cea7cfbe456f95e
        • Instruction Fuzzy Hash: 7952BA7221A690C7FB65AA25D44C3BE7BB0B74178CF785416DACA4B6E5DB3BC840CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
        • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
        • API String ID: 2977986460-1099148085
        • Opcode ID: d4b34376749ff32eba99456bda1799e250470724f7914fc7af70a848fadcdb06
        • Instruction ID: 24400fcc7f611c61377dd410b96275a944ed170fa68a51d8e087ef66bfd402cb
        • Opcode Fuzzy Hash: d4b34376749ff32eba99456bda1799e250470724f7914fc7af70a848fadcdb06
        • Instruction Fuzzy Hash: 06418132206A41C6FB20AB22F95877A77F0F789BA5FA44121ADC907B54DF7EC4598B04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CurrentErrorLastThread$TimerWaitablefree$CloseCreateEventsHandleMultipleWaitmallocrecv
        • String ID: ---------------> Client Worker Thread 0x%08X started <---------------$---------------> Client Worker Thread 0x%08X stoped <---------------$bad allocation
        • API String ID: 1496484581-800104984
        • Opcode ID: a483d8a4f07ee7daca44cb9bd2cf3cbe87aec68c923bb870d730149bae29c94a
        • Instruction ID: 4c021a7c22d31e4d970747619d2afbc85d95eaad42067b551fb8804eca4911d8
        • Opcode Fuzzy Hash: a483d8a4f07ee7daca44cb9bd2cf3cbe87aec68c923bb870d730149bae29c94a
        • Instruction Fuzzy Hash: 46C19F32602B40C6EB68AF25E95837E73F4F744B98F644115DADA877A5DF3AC815C301
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
        • API String ID: 808467561-2761157908
        • Opcode ID: 32cef84cd1dc972d3f30f67bf0faffc5798012c0ccfd2e5b877c42ffa3d6f4fc
        • Instruction ID: e1ce67f6048584e1d7c00c52a99cd83e5c17e6a3eee0e4c13768e2e385e39a43
        • Opcode Fuzzy Hash: 32cef84cd1dc972d3f30f67bf0faffc5798012c0ccfd2e5b877c42ffa3d6f4fc
        • Instruction Fuzzy Hash: 05B2E57AF182828BE7649F24D5407FDB7A1FB54385F805139DA2D97AC4DB3CA902CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
        • String ID: $"%1$%s\shell\open\command$WinSta0\Default$h
        • API String ID: 1783372451-2159495357
        • Opcode ID: dfd323aeb03c13e2d7b38d1d30753097b8c80399a4e347c45ec02a5e266f6bc6
        • Instruction ID: 3ce4d8a3a10181fc294ae781f714a71ec0520d45cbc3537413abc7d0eea93acf
        • Opcode Fuzzy Hash: dfd323aeb03c13e2d7b38d1d30753097b8c80399a4e347c45ec02a5e266f6bc6
        • Instruction Fuzzy Hash: 9D619E31722A45C5FF20EB61D8987F973B5FB88748FA00025DA8D46A99EF3AC649C710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeTickWaitlstrcat
        • String ID: <$\sys_vdio.key
        • API String ID: 3264482950-1798576524
        • Opcode ID: 1c1d0dc86c9ff9c9df10a55f1d15d96183aa64237dc76bcdb1e2e0bd592c1929
        • Instruction ID: ec0e85870cc3213a655ad338b9cef320cc01a6b8aab5cad5d26a3fbbc0e5f29d
        • Opcode Fuzzy Hash: 1c1d0dc86c9ff9c9df10a55f1d15d96183aa64237dc76bcdb1e2e0bd592c1929
        • Instruction Fuzzy Hash: 46510A31201A45C6EB10EF26E868B7A37B5F798B89F604425DACE47BA4DF3BC449C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno_invalid_parameter_noinfo
        • String ID: U
        • API String ID: 3902385426-4171548499
        • Opcode ID: 9f96dc6598ded2c050553f4775ecba739cf52e8cf7bfc7702792ad462be09d09
        • Instruction ID: 8d05af604ccfa80e0dcc2d3fd2554be2d30862863765662f2faebcdbb87be62e
        • Opcode Fuzzy Hash: 9f96dc6598ded2c050553f4775ecba739cf52e8cf7bfc7702792ad462be09d09
        • Instruction Fuzzy Hash: BD32B431119AC5CBE719AB68D8497BA73F1FB95344F24051DE8C7C31D2DA3AD842DB82
        APIs
        Strings
        • CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}, xrefs: 0000026C9CB83C3A
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: lstrcat$CloseCreateProcess32$FirstHandleInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
        • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}
        • API String ID: 2719888535-4035668053
        • Opcode ID: d33f07defdf78316018c5fc0878d74b5aedf32f29980ee74f23bdecb8d2c4bf9
        • Instruction ID: 87ee099aacb2353d15c6f338ba1ca2d5c1eb4334b5dffed62478e122fab434e1
        • Opcode Fuzzy Hash: d33f07defdf78316018c5fc0878d74b5aedf32f29980ee74f23bdecb8d2c4bf9
        • Instruction Fuzzy Hash: C5916B72701B90C6EB10EF65E8846BD7BB1F788B88F600116DE8D57A68DF3AC559CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: DecodePointerwrite_multi_char$_errno_invalid_parameter_noinfo$_getptdfreewrite_char
        • String ID:
        • API String ID: 3562693915-0
        • Opcode ID: 43b494f0418648be60998cf239ea68d13273c4f8f163afde2bbbfde4244db2c5
        • Instruction ID: 48af7cf17b2c29a19a6c07d646dded758f99c250626164ad1c641a559f18bc74
        • Opcode Fuzzy Hash: 43b494f0418648be60998cf239ea68d13273c4f8f163afde2bbbfde4244db2c5
        • Instruction Fuzzy Hash: 9E62BD7260AA80C6FB64AB15E45837E7BF1B791798FB44016DBCB57AD4DB7AC840CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Close$OpenQueryValuelstrcpy
        • String ID: %08X
        • API String ID: 2032971926-3773563069
        • Opcode ID: e5e4124dce340e64fc084ef5771f100bb91bccaaee7df38b6378f83399f0ca44
        • Instruction ID: 1ab83d623ea7d2a451242d6c7edd56b5ff5560d92d5d429fff47c5c9ca2b88bd
        • Opcode Fuzzy Hash: e5e4124dce340e64fc084ef5771f100bb91bccaaee7df38b6378f83399f0ca44
        • Instruction Fuzzy Hash: D1516431619A80D2EB60EB15E4887BBB3B0F7C4794FA44125EBCD42AA8DF3EC545CB04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
        • String ID: %s%s$@$Windows\System32\svchost.exe$h
        • API String ID: 4033188109-2160973000
        • Opcode ID: 4603eddee24f2c2698b3de494bfe0deafb39d4e7db297f61fd0084748d6fe062
        • Instruction ID: f43da4b7ee9677b7309404a10b42d9cc9d677f0b865c594b53a01680162dd2a8
        • Opcode Fuzzy Hash: 4603eddee24f2c2698b3de494bfe0deafb39d4e7db297f61fd0084748d6fe062
        • Instruction Fuzzy Hash: 4E419B32215BC1C6EB20EF61E8443BAB7B5F788788F940015EAC957E58DF7AC519CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountLookup
        • String ID: NONE_MAPPED$Network
        • API String ID: 1972796461-3150097737
        • Opcode ID: dc04e29aa2e29e93e0f6f97a95982f0179af726db92d6d1e0a5c71dd7b62d461
        • Instruction ID: d1555d9cd84eac1fadbafde1da95cbcecea949e538109b430628dd6c0c8d0041
        • Opcode Fuzzy Hash: dc04e29aa2e29e93e0f6f97a95982f0179af726db92d6d1e0a5c71dd7b62d461
        • Instruction Fuzzy Hash: D9414032606A41C6EB20AB11E8987BB73F4FB89B85FA44425EAC947B55DF3EC505CB10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Process$HandleOpenToken$AddressAdjustCloseCurrentLookupModulePrivilegePrivilegesProcValue
        • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
        • API String ID: 2787840106-1577477132
        • Opcode ID: de3b0c7de4938cd4d9b60420ee93e2d79fa07d28ae88f8e18ff7779c5da0ff56
        • Instruction ID: 68f277f404c4067bbc3f578d8188cdcf927993a67e2f46145113366f79acb30d
        • Opcode Fuzzy Hash: de3b0c7de4938cd4d9b60420ee93e2d79fa07d28ae88f8e18ff7779c5da0ff56
        • Instruction Fuzzy Hash: E2211B71616A45C3EB10EB61F4593BA77F0FB89B58FA00015AACE47B55DF7BC0498B40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: File_set_error_mode$HandleModuleNameWrite
        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 1085760375-4022980321
        • Opcode ID: a75b4c166f4ff9e0fa6da0bd796e45336551005c980250f4ac4646e2192a69c9
        • Instruction ID: 2212d64771e97b8a5c61fc2030e0a7f12c6d892390ad112c7dbbb278cc3a4b94
        • Opcode Fuzzy Hash: a75b4c166f4ff9e0fa6da0bd796e45336551005c980250f4ac4646e2192a69c9
        • Instruction Fuzzy Hash: 6251C332306690C2FB64F735E4297BA73F0FB85788FA44115AED943BA6CF3AC5058644
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorFormatFreeLastLocalMessage
        • String ID: No space left on device$No such file or directory$Permission denied$The specified module could not be found.$Too many open files
        • API String ID: 1365068426-3654939424
        • Opcode ID: be521251e698086a4d4e1ef04526cc968ae02a472e1e1e25b1f7a3c59cb21574
        • Instruction ID: 037260788a355d579ce59a67978e8cb606d85cc487362971c801ad2eba094687
        • Opcode Fuzzy Hash: be521251e698086a4d4e1ef04526cc968ae02a472e1e1e25b1f7a3c59cb21574
        • Instruction Fuzzy Hash: 8651713AA04A5197E760EF25D88057CB3A0BF84BB4F948136ED2E836D4DF79D846C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateEvent$Gdip$CountCriticalDisposeFreeImageInitializeSectionSpin
        • String ID: <$<$`
        • API String ID: 3048658606-2220807966
        • Opcode ID: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
        • Instruction ID: 92310ee4e2c47a5c6b96f3d7ee2b046e4ff668954c09234666b816004c6d4cc9
        • Opcode Fuzzy Hash: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
        • Instruction Fuzzy Hash: 2851DC72202B51C2E718AF34E85876D36B8F745F58F24422DAFA95BB98CF7A8451CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
        • String ID: SeShutdownPrivilege
        • API String ID: 3435690185-3733053543
        • Opcode ID: 991f30af3a6744b5f69f974a0569d38b3971da61082ad6ce6e3ec9eac49991d0
        • Instruction ID: 6b224f155c52d4a053015e8fa4ad8b9bcdb63aabed638518a3f31d048552f9e8
        • Opcode Fuzzy Hash: 991f30af3a6744b5f69f974a0569d38b3971da61082ad6ce6e3ec9eac49991d0
        • Instruction Fuzzy Hash: AE115E72626A40C3FB50AB25E85937B77F5F788B40FA04415E9CE86A14DE3EC458CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Process$Exit$CloseHandleToken$AdjustCommandCreateCurrentErrorFileInfoLastLineLookupModuleNameOpenPrivilegePrivilegesStartupValueWindows
        • String ID:
        • API String ID: 2667809516-3916222277
        • Opcode ID: a274c2ab89dcb3f931120a1ddd554a39c3b12f7e05ca43a7662b359e7219e845
        • Instruction ID: 3e602c4fab31665c8c4f2a9b4fffbfda6c94d47fee6445b28abfbff6bff09d7a
        • Opcode Fuzzy Hash: a274c2ab89dcb3f931120a1ddd554a39c3b12f7e05ca43a7662b359e7219e845
        • Instruction Fuzzy Hash: 14112176601A40CBE764AF70F8993BE73B4F788758F940115AACA07A99CF3AC155C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
        • String ID: gfffffff
        • API String ID: 1282097019-1523873471
        • Opcode ID: 556f12f472df7c314a951936d8e99cd1d3ce7c173c0ae253b973df429c375633
        • Instruction ID: 92754716f371ae3e729c15187c2286f6e0c3ffce4a03549d7120517c40cc1056
        • Opcode Fuzzy Hash: 556f12f472df7c314a951936d8e99cd1d3ce7c173c0ae253b973df429c375633
        • Instruction Fuzzy Hash: 3BB111737063C8C6EB52DB29C6493BD7BB5A7127D8F248621CB9A077DAE63A8415C310
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
        • String ID:
        • API String ID: 3778485334-0
        • Opcode ID: a231cb6aec9b0e57251850d34f2610e13ffa11949d7c845deaba270be49158b0
        • Instruction ID: b5305d5148918f7b53ecec5b4e79ebb6042db30035800cbd7bc08e8058e4b260
        • Opcode Fuzzy Hash: a231cb6aec9b0e57251850d34f2610e13ffa11949d7c845deaba270be49158b0
        • Instruction Fuzzy Hash: 2731023190AB84C6EB50AB54F84877A77B4F795794FA04026DACE43BA5DF7EC1548B00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Event$ClearCloseOpen
        • String ID: Application$Security$System
        • API String ID: 1391105993-2169399579
        • Opcode ID: 64425f49ed47b34c4a421d998de9bdb23b72944f8aa1223f8da030d793edcbb5
        • Instruction ID: ce91327e283b6098717e9efabe672ecf95a6dae16ee2fa72b12ceb32a05526ff
        • Opcode Fuzzy Hash: 64425f49ed47b34c4a421d998de9bdb23b72944f8aa1223f8da030d793edcbb5
        • Instruction Fuzzy Hash: 4601DE35606B40C6FB25AB26F4983B973F4B78C794F6411268ACD07765EE3AC155C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: MessageMultipleObjectsWait$PeekPost
        • String ID:
        • API String ID: 105686753-0
        • Opcode ID: bde40b9d549f6fae919aee2e8763a9875290cbc4817eaa1538dff8214ff397bc
        • Instruction ID: 90f33b0622a9e56c3e02fac2bda027588f2ca021eadb2220805459c0b9525f49
        • Opcode Fuzzy Hash: bde40b9d549f6fae919aee2e8763a9875290cbc4817eaa1538dff8214ff397bc
        • Instruction Fuzzy Hash: F0221236A0CAC197EB14AF24C8413BDA360FF84788F905139DA6E636D5DF39E486C790
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _get_daylight$_invalid_parameter_noinfo$InformationTimeZone
        • String ID:
        • API String ID: 435049134-0
        • Opcode ID: 137aa6c628618abedf1ddfa1769073cfff43dc3b72dfa687c4f3e24b5cce473d
        • Instruction ID: 1ca0fe581c21a3a0861faa25e2790832e43c3a4bb59565289de8c7c91065bffb
        • Opcode Fuzzy Hash: 137aa6c628618abedf1ddfa1769073cfff43dc3b72dfa687c4f3e24b5cce473d
        • Instruction Fuzzy Hash: D9B1D22AB0828296EB18FF26D8415B9E351AF857C4F80413AEA7D477D5DF3DE44387A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 87ff3d6eeb635e790895d91028e87dc3f406e0927c6df138aeb043b668ae2b89
        • Instruction ID: 07b75f05056cb389c232d503058d9957bf88583297a4e8fbfa5e0cc1c69c483d
        • Opcode Fuzzy Hash: 87ff3d6eeb635e790895d91028e87dc3f406e0927c6df138aeb043b668ae2b89
        • Instruction Fuzzy Hash: E331A73A614B8196DB24DF24E8402FEB3A4FB88794F900139EAAD43B94DF3CD556CB50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseControlCreateDeviceFileHandle
        • String ID: \\?\$^Volume\{([a-z]|[0-9]|-)+\}\\
        • API String ID: 33631002-4034573397
        • Opcode ID: a2c130af8c3b6cf50b6a52d76a7e523c0275167e47f78f66250d50651771c600
        • Instruction ID: ff73183976e3354f3b2dcdcfb1c3d7d3f371055a02cf4715248a47c07ac47a79
        • Opcode Fuzzy Hash: a2c130af8c3b6cf50b6a52d76a7e523c0275167e47f78f66250d50651771c600
        • Instruction Fuzzy Hash: 6DD1903AA0969197EB10EF29E4406BDB3A0FF84754F944239DA6D836D4DF3CD846CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
        • String ID: SeDebugPrivilege
        • API String ID: 2349140579-2896544425
        • Opcode ID: 3df3e9674ee82a8dd9461d8c8e16cfb09a5d387e4b33b5c3f15a18fe30b99d19
        • Instruction ID: 787652d7ace9cf58026a41ce19ab7ca32cc9a71d4342b5cbf7a7a4d1df801134
        • Opcode Fuzzy Hash: 3df3e9674ee82a8dd9461d8c8e16cfb09a5d387e4b33b5c3f15a18fe30b99d19
        • Instruction Fuzzy Hash: 50113032616B80C3EB10AF51F44926BB3B4F789748F940015EACE46B14DF7EC018CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: DirectoryGlobalMemoryPathStatus
        • String ID: @$C:\Program Files\VMware\VMware Tools\$VMware
        • API String ID: 2404642766-3945705589
        • Opcode ID: 9eef2ea4262c92f19372715fd3c3978f4fca6487c545fe70191300ad05ea55d3
        • Instruction ID: 1c7447c3d7993cd39ed54d8fdba7bbf984ab18c07e6a732b80cffe7b44e1f617
        • Opcode Fuzzy Hash: 9eef2ea4262c92f19372715fd3c3978f4fca6487c545fe70191300ad05ea55d3
        • Instruction Fuzzy Hash: DA115B36616A80C1EF20FB21E4993BA73B0F798788FD0402596CE42A95EF3EC509CB04
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorFileLastWrite$ConsoleOutput
        • String ID:
        • API String ID: 1443284424-0
        • Opcode ID: 401fe4669268a13e147bc2a0c3f252077b6128bc5c543b1d41c0b6380ef1694e
        • Instruction ID: 789d5367c10da489537df1acf092dc8af6436894fc78f55a9ef87408f106e30e
        • Opcode Fuzzy Hash: 401fe4669268a13e147bc2a0c3f252077b6128bc5c543b1d41c0b6380ef1694e
        • Instruction Fuzzy Hash: 5BE11326B18A81AAEB04DF64D0541EDBB70FB457D8F90413ADE6E17BD8CE38D416C790
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: QDateTimeParser::parse Internal error (%s)$QDateTimeParser::parse Internal error 2$QDateTimeParser::parse Internal error 3 (%s %s)$QDateTimeParser::parse Internal error 4 (%s)$default
        • API String ID: 0-412086101
        • Opcode ID: 2f91bf01c8acce56a866329e44f367f359a3cfcc74283a7fccceca5c0ea94de4
        • Instruction ID: 7882a0200a7ab5d723df586f992175cc6e815f812c57c64cb7a74b2c1af7ca6a
        • Opcode Fuzzy Hash: 2f91bf01c8acce56a866329e44f367f359a3cfcc74283a7fccceca5c0ea94de4
        • Instruction Fuzzy Hash: 0AD2E536A086829BEB20EF24D4402EDB772FF85794F904139DA2D576D9DF38E942C790
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
        • String ID:
        • API String ID: 1789362936-0
        • Opcode ID: 0e6cdfb65babf1bf3c4be1fd3b5a506397d62204a4a8a4036368e1bef1891cbb
        • Instruction ID: 4203d40e75d78602b3c35b37f5ec7683defdde88e78971de7271a5f6ea5defb8
        • Opcode Fuzzy Hash: 0e6cdfb65babf1bf3c4be1fd3b5a506397d62204a4a8a4036368e1bef1891cbb
        • Instruction Fuzzy Hash: 30218131205680C6EB64AB15E48C37AB7F1FB8CB94F948265DADA42794EF3EC548CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AllocateCheckFreeInitializeMembershipToken
        • String ID: Network
        • API String ID: 3429775523-2939797024
        • Opcode ID: 8ad016942c7da11828b6f5aa434babc68504aae5a5167266cc484b2e2891f1f3
        • Instruction ID: f3429d07a1d5d3eef64c7c28fbc9bf5305603705acf0ce455173f2da4d0e21d2
        • Opcode Fuzzy Hash: 8ad016942c7da11828b6f5aa434babc68504aae5a5167266cc484b2e2891f1f3
        • Instruction Fuzzy Hash: 4611FAB2619B44C7E7209F26F49436BBBB0F788744F60112AE6CA46B68DB3DD149CF00
        APIs
        • _get_daylight.LIBCMT ref: 00007FF7F73FA406
          • Part of subcall function 00007FF7F73F938C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F73F93A0
        • _get_daylight.LIBCMT ref: 00007FF7F73FA417
          • Part of subcall function 00007FF7F73F932C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F73F9340
        • _get_daylight.LIBCMT ref: 00007FF7F73FA428
          • Part of subcall function 00007FF7F73F935C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F73F9370
          • Part of subcall function 00007FF7F74010CC: HeapFree.KERNEL32(?,?,?,00007FF7F7407920,?,?,?,00007FF7F7407963,?,?,00000001,00007FF7F7407E28,?,?,?,00007FF7F7407D5B), ref: 00007FF7F74010E2
          • Part of subcall function 00007FF7F74010CC: GetLastError.KERNEL32(?,?,?,00007FF7F7407920,?,?,?,00007FF7F7407963,?,?,00000001,00007FF7F7407E28,?,?,?,00007FF7F7407D5B), ref: 00007FF7F74010F4
        • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7F73FA634), ref: 00007FF7F73FA44F
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
        • String ID:
        • API String ID: 3458911817-0
        • Opcode ID: 2b8e42fba298950875784907ae90498541b511e2692174a64a3f91a37cb06da3
        • Instruction ID: a33cd6fe0aecc081e93af2e0cf94aed167d852453cd763404e8a3d9d95054a82
        • Opcode Fuzzy Hash: 2b8e42fba298950875784907ae90498541b511e2692174a64a3f91a37cb06da3
        • Instruction Fuzzy Hash: 7F619D7AA0828296EB14FF25D5815B9E360BF49784FC0413AEABD477D5DF3CE40287A0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
        • API String ID: 0-2761157908
        • Opcode ID: 48b426091ca7310074e47ba4353bcb83d81d6977aa3c1439b94c3d96a45d4ada
        • Instruction ID: c783d35dcf1fa0c429f33cb097b2bc29a5ece109fd13d3990c9ba5887afdcab0
        • Opcode Fuzzy Hash: 48b426091ca7310074e47ba4353bcb83d81d6977aa3c1439b94c3d96a45d4ada
        • Instruction Fuzzy Hash: 2B62E077B26290CAF724DFB4C008BBD37F1B754348F60A419DEC567A88EA368915CB64
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo
        • String ID: gfffffff
        • API String ID: 3215553584-1523873471
        • Opcode ID: 7945e267a0154df2b998390322b850647b738dcd4beeb1d66246e91b04171181
        • Instruction ID: f541aa184c2fb23bda8774816bbdeeb4db0219400af488af5c12ddd2a9a27015
        • Opcode Fuzzy Hash: 7945e267a0154df2b998390322b850647b738dcd4beeb1d66246e91b04171181
        • Instruction Fuzzy Hash: A1914367B083C686EB25DF2994007BAABA4AB55BC4F458036CE6D477C5DE3CE503C760
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: QMetaMethod::invoke: Dead lock detected in BlockingQueuedConnection: Receiver is %s(%p)$QMetaMethod::invoke: Unable to handle unregistered datatype '%s'$QMetaMethod::invoke: Unable to invoke methods with return values in queued connections$default
        • API String ID: 0-3719105355
        • Opcode ID: 0a1dd0c491e2e491c67967bac0761aa9f640679ed4053f5351dec3832318cb0d
        • Instruction ID: 4b70d36f2aebd2c741244aa0a2c7b53f9aec540d4cdd185fa52668930e14cb00
        • Opcode Fuzzy Hash: 0a1dd0c491e2e491c67967bac0761aa9f640679ed4053f5351dec3832318cb0d
        • Instruction Fuzzy Hash: B522B23AA05B859AEB50DF25D8402ADB7A0FF88B94F904139DEAD47BE8DF38D441C750
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: memcpy_s
        • String ID:
        • API String ID: 1502251526-0
        • Opcode ID: 61c8d48a73c74d7b2b5693099c23eccbf95a4682f3061de545b2f75f73c9d44c
        • Instruction ID: b1bd5e039bd6eda3ba5b95f0c7f0036deab981a68efc9d54f45b309b7eaca15b
        • Opcode Fuzzy Hash: 61c8d48a73c74d7b2b5693099c23eccbf95a4682f3061de545b2f75f73c9d44c
        • Instruction Fuzzy Hash: AAC1F576B1828A87DB24DF19E244A7AF7A5F794785F848134DB5E43784DB3CE812CB80
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: malloc
        • String ID: $gfff$gfff
        • API String ID: 2803490479-4202476792
        • Opcode ID: 758d396988162ef052379c07bd050d4c25eb1eec0b7406e23305d088414f20ac
        • Instruction ID: b8cecee3a01372af715f34db698f71af6c3856eac05da8091c77da44e32c93a9
        • Opcode Fuzzy Hash: 758d396988162ef052379c07bd050d4c25eb1eec0b7406e23305d088414f20ac
        • Instruction Fuzzy Hash: 37E18270618A48CFEB49EF78D44977D77F2FF59301F204229A84AD7292EB3598428B81
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: <$<$`
        • API String ID: 0-2220807966
        • Opcode ID: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
        • Instruction ID: 9663d4defe82fb06473056d96674e6fc940051d97059012cf64383bf675be4df
        • Opcode Fuzzy Hash: df5c58209d20144fac77f641d0bf13223d1090dc20bdac81c627280d7c07bfee
        • Instruction Fuzzy Hash: 095163B06196198FEF98DF28D49436537E5FB49700F1581BE9C5ACF29ACF75C8418B80
        APIs
        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F7403376
          • Part of subcall function 00007FF7F73F787C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7F73F7859), ref: 00007FF7F73F7885
          • Part of subcall function 00007FF7F73F787C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7F73F7859), ref: 00007FF7F73F78AA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
        • String ID: -
        • API String ID: 4036615347-2547889144
        • Opcode ID: 4818ce36b43b8457feceb959f8c110170a1097cd530babca61bdf488c472f1ae
        • Instruction ID: 1b235e4c938d95745e48895567df2f1a2ca04148f113b444fd3050fa3a18e801
        • Opcode Fuzzy Hash: 4818ce36b43b8457feceb959f8c110170a1097cd530babca61bdf488c472f1ae
        • Instruction Fuzzy Hash: FE910336A0878546EB749B25954077AFB91FB85BD0F81423DEAAD47BD8CF3CD4028740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2959964966-0
        • Opcode ID: 2c31b7c5487f01d281f7e0ea84f95429dd58f40f530a4d6afe04b2f875753eb5
        • Instruction ID: 39233c8762e98e2a150af145adc951e597a38b588d00845f021ff6fd5dcb6347
        • Opcode Fuzzy Hash: 2c31b7c5487f01d281f7e0ea84f95429dd58f40f530a4d6afe04b2f875753eb5
        • Instruction Fuzzy Hash: DB32AE76B16254CAF764AFA5C0487BC37F2A328748FB4501ACEC657AC5D63AC949C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errnoswprintf$_invalid_parameter_noinfo_vswprintf_s_lmalloc
        • String ID:
        • API String ID: 2736340244-0
        • Opcode ID: 6d0d3b0f645c5a8fb496adac5f8cebacee4c21e0aa47414c173cae9568fb7acf
        • Instruction ID: 421d7e22435e04f3fec4d4c7382c6e3753a120b1f77bd76c10c5deeead93c3c4
        • Opcode Fuzzy Hash: 6d0d3b0f645c5a8fb496adac5f8cebacee4c21e0aa47414c173cae9568fb7acf
        • Instruction Fuzzy Hash: A7226431519A48CBEB25EF64DC896FA77E5FB58301F20462ED48BC3191DB34E645CB82
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _set_error_mode$_errno_invalid_parameter_noinfo
        • String ID:
        • API String ID: 1239817535-0
        • Opcode ID: 0b0ba07c33e6806856d6d18b595c067dd94e202b36702a5aed12f79ed91a311e
        • Instruction ID: e1966fbe2d6c0feea5c434ea147be36c4767cf829edc84416c5432dc503704bc
        • Opcode Fuzzy Hash: 0b0ba07c33e6806856d6d18b595c067dd94e202b36702a5aed12f79ed91a311e
        • Instruction Fuzzy Hash: 9161E831718948CBE7ACFF29E86937A72E5E798301F20452EE48BC31D6DE35C9058645
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ExceptionRaise_clrfp
        • String ID:
        • API String ID: 15204871-0
        • Opcode ID: e37cea3d6c78cc31d989566bfc0951e48ead2e3c7dd949fca7103c317dc8dc40
        • Instruction ID: cdce13487d45f55509ca9ef06be3983636b3b5dfb58e5ad754ef20bb302e2ec1
        • Opcode Fuzzy Hash: e37cea3d6c78cc31d989566bfc0951e48ead2e3c7dd949fca7103c317dc8dc40
        • Instruction Fuzzy Hash: A1B18B77604B848BEB15DF29C88277CB7A0F744B88F558921DB6D837A4CB39D412CB60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Find$CloseFileFirst
        • String ID:
        • API String ID: 2295610775-0
        • Opcode ID: 41e6a5274b1e6dac8f16ab5682416ee48d99485c2ad493626b45c1f81abd2e0c
        • Instruction ID: c3e95a06ebcc6bcc40247ec1eff8bf491002887e0ffeff5792d0381880f8ff33
        • Opcode Fuzzy Hash: 41e6a5274b1e6dac8f16ab5682416ee48d99485c2ad493626b45c1f81abd2e0c
        • Instruction Fuzzy Hash: CC31933AA0869253EB11AB259400379A350BF81BB8F948334EA7D473D5DE3DE80787A1
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: bindhtons
        • String ID:
        • API String ID: 791846173-0
        • Opcode ID: 9171ba2a606171ecc4786a987eabdf1552a5d8aa28dfa7c78a1eb5a2f926cfbb
        • Instruction ID: c79988fff8cfa01555859b8aaa688cabdabc1db1eaae0ee3b347a4f5fb49d4fa
        • Opcode Fuzzy Hash: 9171ba2a606171ecc4786a987eabdf1552a5d8aa28dfa7c78a1eb5a2f926cfbb
        • Instruction Fuzzy Hash: C22130B2605240CBDBA0AB29F184779B3F0F34C794F948126EADA83798D779C9D18B44
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: bindhtons
        • String ID:
        • API String ID: 791846173-0
        • Opcode ID: 6925adac4821d2ed962af63ddee1dd4fd3ce71ae2cc773bd1999aba9ab4df3dd
        • Instruction ID: bd2a576e2ffe52d7c01e4800f3e05812210ccc8ab2bd70da35787ebc86e8efb7
        • Opcode Fuzzy Hash: 6925adac4821d2ed962af63ddee1dd4fd3ce71ae2cc773bd1999aba9ab4df3dd
        • Instruction Fuzzy Hash: C82141F26042508BD7A1DB2AF1807AA73E0F38C794F444126FB89877A8D738C9D1CB04
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: Qt: Dead lock detected while activating a BlockingQueuedConnection: Sender is %s(%p), receiver is %s(%p)$default
        • API String ID: 0-188496423
        • Opcode ID: a95adbecaaaae865c9a6235cf9876b8f58fef2973d9c2cf80c44910392610114
        • Instruction ID: d48d6392f0405268ff5999fae63e4c64f3fea2d3cf50a766cbe84e809fa29461
        • Opcode Fuzzy Hash: a95adbecaaaae865c9a6235cf9876b8f58fef2973d9c2cf80c44910392610114
        • Instruction Fuzzy Hash: 7A32D636B05B8596EBA0EB15E4406A9B3A5FF447A4F840239EE7D477D4CF38E412D390
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: QObject: shared QObject was deleted directly. The program is malformed and may crash.$default
        • API String ID: 0-1590212175
        • Opcode ID: e5aff6f39530e9404b11ef22b592e89cf7a9c916e3d653303b7a8b4dc03af99d
        • Instruction ID: cdda689407bca05027c59433f488a704918467a7cb48e1480f6e0b32b64e6ee8
        • Opcode Fuzzy Hash: e5aff6f39530e9404b11ef22b592e89cf7a9c916e3d653303b7a8b4dc03af99d
        • Instruction Fuzzy Hash: 9E22F43AA0968593EBA4AB25D140779B3A1FF85BA0F845639DA7D037D0CF3DE442C790
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: @$h
        • API String ID: 0-1029331998
        • Opcode ID: 2fe978780a992464d5cc280ba7ad23027c9ff948f24b5252a9945e522b4a1024
        • Instruction ID: bb1d643b38703e6eabf5d22ffdd2e15f995644c1a8b18e688bbb7422220e181c
        • Opcode Fuzzy Hash: 2fe978780a992464d5cc280ba7ad23027c9ff948f24b5252a9945e522b4a1024
        • Instruction Fuzzy Hash: 18B1983051CA488FEB69EF68D8597A977E5FB98305F20452EE48FC3290DF38D5458B82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: $h
        • API String ID: 0-1972213566
        • Opcode ID: b611456b3bcc38833470a90ab28e03b1449d2f3e91fc85b15cff31219b87bb00
        • Instruction ID: 726024a7ad6330df981011aa2eca33bf8b3d7edab8da8e0a21d9689f3ea7e84e
        • Opcode Fuzzy Hash: b611456b3bcc38833470a90ab28e03b1449d2f3e91fc85b15cff31219b87bb00
        • Instruction Fuzzy Hash: B5716F31519A8CCBEB25FF59C8597FA73B5FB98304F20412AE48AD3191DE39D6058B82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: @$h
        • API String ID: 0-1029331998
        • Opcode ID: 171764235454b9f9713eebf5721cb306266bc98bd4d40bab5b9d69e11f9a6c74
        • Instruction ID: 4898d1283af816bf77c5d2f9406b453d789162c881fbbe55d435b0f292476534
        • Opcode Fuzzy Hash: 171764235454b9f9713eebf5721cb306266bc98bd4d40bab5b9d69e11f9a6c74
        • Instruction Fuzzy Hash: 37519E7051CB88CFEB64EF58D8497EAB7E5FB98305F10452EA48AC3290DB79D505CB82
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: [RO] %ld bytes
        • API String ID: 0-772938740
        • Opcode ID: f7cae8bca4d91966f46de86ca1ffd11b4dd1f0efa15ac6301475bef029487ce5
        • Instruction ID: e33129bf6711ca6124daf0ac3bad5939803ad97d7143a341e13e8269404430f2
        • Opcode Fuzzy Hash: f7cae8bca4d91966f46de86ca1ffd11b4dd1f0efa15ac6301475bef029487ce5
        • Instruction Fuzzy Hash: FA42793320A2C4CBC369DF28E4443AE7BA0F365B48F54816ADBC587B46D779E954CB60
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: qt.
        • API String ID: 0-1039624776
        • Opcode ID: 02817b13b5f54e953de6f2b544777969141c6c08e9bdaa88296a4eb03950aaa7
        • Instruction ID: 15f8269137688c86cd31b2727ce1e80057b1613b29b67f6a05599a0c9bd58f83
        • Opcode Fuzzy Hash: 02817b13b5f54e953de6f2b544777969141c6c08e9bdaa88296a4eb03950aaa7
        • Instruction Fuzzy Hash: 3EE1077AB082D2A7FBB0AA25844067CA791EF41754F844139DEAD876C4CE3CE842D7A1
        APIs
          • Part of subcall function 0000026C9CB856A0: GetCurrentProcess.KERNEL32 ref: 0000026C9CB856B7
          • Part of subcall function 0000026C9CB856A0: OpenProcessToken.ADVAPI32 ref: 0000026C9CB856CA
          • Part of subcall function 0000026C9CB856A0: LookupPrivilegeValueW.ADVAPI32 ref: 0000026C9CB856F5
          • Part of subcall function 0000026C9CB856A0: AdjustTokenPrivileges.ADVAPI32 ref: 0000026C9CB85718
          • Part of subcall function 0000026C9CB856A0: GetLastError.KERNEL32 ref: 0000026C9CB8571E
          • Part of subcall function 0000026C9CB856A0: CloseHandle.KERNEL32 ref: 0000026C9CB8572D
        • ExitWindowsEx.USER32 ref: 0000026C9CB88A5D
          • Part of subcall function 0000026C9CB856A0: CloseHandle.KERNEL32 ref: 0000026C9CB85748
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
        • String ID:
        • API String ID: 681424410-0
        • Opcode ID: e6a5fa4d446211fe06beb4dab869005ee2c12317f8f14c7869f8b8567d4f9dba
        • Instruction ID: f8000b28ae788ac5dbedeb9f41837e3b453413e944905a3f33a48f6b31f27ea9
        • Opcode Fuzzy Hash: e6a5fa4d446211fe06beb4dab869005ee2c12317f8f14c7869f8b8567d4f9dba
        • Instruction Fuzzy Hash: ACE048766055C0C7F776BB21E09A3FD7375F788B54F9400265A8E065868D2AC285C600
        APIs
          • Part of subcall function 0000026C9CB856A0: GetCurrentProcess.KERNEL32 ref: 0000026C9CB856B7
          • Part of subcall function 0000026C9CB856A0: OpenProcessToken.ADVAPI32 ref: 0000026C9CB856CA
          • Part of subcall function 0000026C9CB856A0: LookupPrivilegeValueW.ADVAPI32 ref: 0000026C9CB856F5
          • Part of subcall function 0000026C9CB856A0: AdjustTokenPrivileges.ADVAPI32 ref: 0000026C9CB85718
          • Part of subcall function 0000026C9CB856A0: GetLastError.KERNEL32 ref: 0000026C9CB8571E
          • Part of subcall function 0000026C9CB856A0: CloseHandle.KERNEL32 ref: 0000026C9CB8572D
        • ExitWindowsEx.USER32 ref: 0000026C9CB88A3C
          • Part of subcall function 0000026C9CB856A0: CloseHandle.KERNEL32 ref: 0000026C9CB85748
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
        • String ID:
        • API String ID: 681424410-0
        • Opcode ID: 0177cb3e1cdb11d46ee6c13810d57ab7c6ed36ee73c6af6f37b08cae63a0b0c8
        • Instruction ID: 0032c09460871648b4a3ca5347205e9e4095607130739c1f1c3edc47b3a16792
        • Opcode Fuzzy Hash: 0177cb3e1cdb11d46ee6c13810d57ab7c6ed36ee73c6af6f37b08cae63a0b0c8
        • Instruction Fuzzy Hash: 86E048766055C0C7F776FB61E09A3FD7375F788B54FD400165A8E065868D3AC285C600
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: WriteOnly device
        • API String ID: 0-1802527306
        • Opcode ID: 4a57033495bddb99051febc7f191ded91fe92d2e0222cebf793c46ac7e716f0a
        • Instruction ID: 16269f2cd98a68b490dac83f0cc9157442b749f504d12d9a53d287d84bb6c4c4
        • Opcode Fuzzy Hash: 4a57033495bddb99051febc7f191ded91fe92d2e0222cebf793c46ac7e716f0a
        • Instruction Fuzzy Hash: 0C81466BB286D09BE714DB64C840AFE7670FF08B48F854039EF69877C4DA289616C760
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo
        • String ID: 0
        • API String ID: 3215553584-4108050209
        • Opcode ID: c1934f50d4c005c5c6b6a34040f2f2f02356029904a6b0e8a89a5b866e439fbd
        • Instruction ID: 868385cff2d941b0c4a232835ca121102eaaacd3b33c15cc80397ed2b22e0c00
        • Opcode Fuzzy Hash: c1934f50d4c005c5c6b6a34040f2f2f02356029904a6b0e8a89a5b866e439fbd
        • Instruction Fuzzy Hash: 4571A61AA0C6C667EF6C6A1990043F9E791AF417C4FD4013ADDBA076D9CE2DE84387B1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: <
        • API String ID: 0-4251816714
        • Opcode ID: e47fd5fbee84351a533ef5d5c3845aba2d1ac3dcc413a039a609c7d872dfff1b
        • Instruction ID: 6cdcc9a76227431a4d795fbd5258fe121668b628942345ee5b00695287f64362
        • Opcode Fuzzy Hash: e47fd5fbee84351a533ef5d5c3845aba2d1ac3dcc413a039a609c7d872dfff1b
        • Instruction Fuzzy Hash: 7D514130208A08CFF754EF28D859B6A77F5FB99304F50452DE54AC32A1DB39D946CB42
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a26e77949d60ab34aa2646b0a25bc0193e1ff5bac38168d8d5f289d12d4320e6
        • Instruction ID: 1a6582b55b023f5b11bb40117bc9a0b4fce10e41b2ee92438bceecba0701157b
        • Opcode Fuzzy Hash: a26e77949d60ab34aa2646b0a25bc0193e1ff5bac38168d8d5f289d12d4320e6
        • Instruction Fuzzy Hash: 90527C30619785CFD729DF2CC4856A9BBE0FB69300F54856ED8CACB742D634E846CB92
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f266c445950e1297430ac87a0a67c37b17f20ecc0e40b636969d92f470b947e8
        • Instruction ID: ac85e8c6c91afa2c82385ef1976d75cdd8d4611370bbde73a249661ad7e87830
        • Opcode Fuzzy Hash: f266c445950e1297430ac87a0a67c37b17f20ecc0e40b636969d92f470b947e8
        • Instruction Fuzzy Hash: 7622C577B785504BD71CCB19E892FA977A2F394308709A52CEA17D3F44DA3DEA06CA00
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8b618b6dd7e769c3153b16458297dc523fa2e891019ddc6d672f21eeebca888b
        • Instruction ID: ca0dd0d54c68b16e46df82ec91c4448a82e97292d1558e22ca457ed25f107bf5
        • Opcode Fuzzy Hash: 8b618b6dd7e769c3153b16458297dc523fa2e891019ddc6d672f21eeebca888b
        • Instruction Fuzzy Hash: 9402A077B04982A6EB10EB38C4802FCA7A1EF44758BD84636CA2D976D5DF25E947C390
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo$malloc
        • String ID:
        • API String ID: 610097836-0
        • Opcode ID: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
        • Instruction ID: 1ed1866ccbebb95ea90f14841e64c5ed7422ccfc367e98ab4b178f506c329d5d
        • Opcode Fuzzy Hash: e24b6ed1d8ea57e9a4e8ffa4945a5f3e950eb114645b7d582015a0678ead6225
        • Instruction Fuzzy Hash: 90E1A170518A48CFF769EF14D8597BA37F1FB48301F60452AE586C32E1DB399946CB82
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e7f3db23d335aabe829bdd43622417786b09a7f35892de39b79545b5ac86ba9a
        • Instruction ID: edd8ef5bea0c556a02e52ff5e38f695b1f38724982bc1ce9622a308dc953f137
        • Opcode Fuzzy Hash: e7f3db23d335aabe829bdd43622417786b09a7f35892de39b79545b5ac86ba9a
        • Instruction Fuzzy Hash: 58E1F37AB086829BE7149F74D45027CBBA1AF84754FC48139DE2E977D4DE39E802CB90
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 7a15f2423462a5abbdb9c6da5a9c4fcc013eb56b701b34c872b6b0bf0065a190
        • Instruction ID: 86a195b7e4fa481f4f272cb1fa6758afe8f48f13568980ff05cd26a04bd3cf1c
        • Opcode Fuzzy Hash: 7a15f2423462a5abbdb9c6da5a9c4fcc013eb56b701b34c872b6b0bf0065a190
        • Instruction Fuzzy Hash: 7BA1A67051CA48CFEB58EF18D8856B9B7F1FB98301F20426EE48AD71A5DB35D906CB81
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3845032702664346093a983adc84234d0f38439fe42eeb9723b335d03598f4d2
        • Instruction ID: 6f2f006b86d1f9eb0deba097518f45e6ff6337902c15431117139df1e11c1e21
        • Opcode Fuzzy Hash: 3845032702664346093a983adc84234d0f38439fe42eeb9723b335d03598f4d2
        • Instruction Fuzzy Hash: 42715E7061CB48CFD768EF28D44976AB7E1FB89710F10492EE49EC3251DB35E8468B82
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
        • Instruction ID: 52cef456fdbf6cdccf25a4cbe79914841aae757aa9245bd1b8f2ed0f8c6f4637
        • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
        • Instruction Fuzzy Hash: 4A51D072B166A1CBE7588F18E008F7C3AE9F794382F61D039DA9297F44DA76CD548B00
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
        • Instruction ID: 53659f113055ede85aaf2fc74df7715867b2c9a905a4beaaa91a52d4308609d6
        • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
        • Instruction Fuzzy Hash: 3551E577B252A18BE75A8F19E404FAC3AA5F398385F51D039EB129BF51D676CC50CB00
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f6496731fa74dfd9424f69598ecc8c71401180258f910eac2dd5601b098a0783
        • Instruction ID: 9b6c778e573336f9bafeb18e4adddb3794519f3f94127f40b72b2e3b558e9acb
        • Opcode Fuzzy Hash: f6496731fa74dfd9424f69598ecc8c71401180258f910eac2dd5601b098a0783
        • Instruction Fuzzy Hash: 91512A12F1C1E9AFF7159EBD1C0059C6F219B71248F84416DDE9897F8BC928EA07C791
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f8a8174c90d8608e81318d94b2c031deb892454abe5a591ccbc75316d7478f5c
        • Instruction ID: e44bc40a5cfeb26f180c872285166bf00eaff567d6f7d984be60ac294865146b
        • Opcode Fuzzy Hash: f8a8174c90d8608e81318d94b2c031deb892454abe5a591ccbc75316d7478f5c
        • Instruction Fuzzy Hash: 5C51E36AA0869553FBB5AB259400679A790FF04F98F94813EDE6D077D4CF3CE842D390
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorFreeHeapLast
        • String ID:
        • API String ID: 485612231-0
        • Opcode ID: 80371e6dac681631be04dcf261c6f98bc6bea27ba4b5753d1749bcb0e5166604
        • Instruction ID: 69042441729d6784eaedfa2a9030abd9c0ff8ec7b12a45954e709d338b26921c
        • Opcode Fuzzy Hash: 80371e6dac681631be04dcf261c6f98bc6bea27ba4b5753d1749bcb0e5166604
        • Instruction Fuzzy Hash: 2641F626714A9982EF08DF6AD954179B3A1F748FD4F899032DE1D97BA8DF3CC0428380
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c379b1aee352c79a0ecec65525e13c06bad3dfb5bf851640375506568d2c6066
        • Instruction ID: 042b8d9f4528da8e5c071133901a2e87bd788c9d1e4ac96ca6996b84fc2b8a88
        • Opcode Fuzzy Hash: c379b1aee352c79a0ecec65525e13c06bad3dfb5bf851640375506568d2c6066
        • Instruction Fuzzy Hash: 36E01A97A9FFC4EBE762A5504C7E6383EE2ABB2B04B5C004B8BC002683F9574C148201
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_errno
        • String ID:
        • API String ID: 2288870239-0
        • Opcode ID: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
        • Instruction ID: 51af694ee541781cef785b072861296096f3347a830badfe73c31341e53d87d1
        • Opcode Fuzzy Hash: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
        • Instruction Fuzzy Hash: F2B164301B6548CBE789FB24C5D97F93761BB98300F944175988E8E5A7CE12DC46DBA0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$FreeHeap_errno
        • String ID:
        • API String ID: 2737118440-0
        • Opcode ID: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
        • Instruction ID: c70c0605558f7821de2eb2cc936f85d9a3632fb079bc8d85636882b79c265ea7
        • Opcode Fuzzy Hash: 2e4d513bdbcfd8bd2ec7bcf5c7b34eda39d1d1b6ccbe2ef803f71952144ddf35
        • Instruction Fuzzy Hash: 41A15472223544C9EB45BB31C8993FC3331ABC6F48F954572EA8D6B5A7CEA2C8458760
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc$Token$InformationProcess$CloseCopyCurrentHandleLengthLibraryLoadOpen
        • String ID: AllocateAndInitializeSid$BuildTrusteeWithSidW$GetEffectiveRightsFromAclW$GetNamedSecurityInfoW$GetUserProfileDirectoryW$GetVolumePathNamesForVolumeNameW$LookupAccountSidW$advapi32$kernel32$userenv
        • API String ID: 2696503892-3103641746
        • Opcode ID: 119ff1c74d3851af8e6b534a9a4d689b4cea124b3013ada68ca1587a54ffe470
        • Instruction ID: 2445ed76768675da6a13a4328abbadb509abbbf26a8aabcdf96aaa7fbaed0939
        • Opcode Fuzzy Hash: 119ff1c74d3851af8e6b534a9a4d689b4cea124b3013ada68ca1587a54ffe470
        • Instruction Fuzzy Hash: 92815E39A08B8296FB10FB19E854279A3A5FF44B90F940138D96D437E5DF7CE446C7A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
        • API String ID: 2643518689-564504941
        • Opcode ID: 7acbe540bc04eb17a634a09565014fbe7794e89a6f31f33c4fabbf1735c0f02e
        • Instruction ID: c57f1bbe0956c3347ed82e1e0e72a9f77042431a3cd35fd877d795c176fda48c
        • Opcode Fuzzy Hash: 7acbe540bc04eb17a634a09565014fbe7794e89a6f31f33c4fabbf1735c0f02e
        • Instruction Fuzzy Hash: 8751B534603B15C5EF59BB51F86C73937F0AB59B94FA401269CDE477A0EE3AC8458210
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$DisposeFreeFromImageLock$AllocBitmapDeleteGdiplusObjectShutdownUnlock
        • String ID:
        • API String ID: 562715702-0
        • Opcode ID: cdc0204bc30cf34552371714a5366ee355cd303610cee03585cb9d2d35280443
        • Instruction ID: 2bfd4a6de74d41678abb90abc1e0ca2ed3b4c4d385c588852daac8f8a26bdecd
        • Opcode Fuzzy Hash: cdc0204bc30cf34552371714a5366ee355cd303610cee03585cb9d2d35280443
        • Instruction Fuzzy Hash: 8C912B32706B40C6EB14EB61E8982BD33B1F748B98F600525DE9E57BA9DF3AC459C340
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno$_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2315031519-0
        • Opcode ID: 54416721b11f383574e6eb75bbea4055506d4160d704af51a6d319baa15b6c74
        • Instruction ID: 83648f5720a60aed95f28547ef3144f2ec583288f922a639ead2ef5b042cdbbf
        • Opcode Fuzzy Hash: 54416721b11f383574e6eb75bbea4055506d4160d704af51a6d319baa15b6c74
        • Instruction Fuzzy Hash: F2220332216B84C6E752BF64D4883BC3BF1B751BA8FB48106CADA077D6E676C649D301
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
        • String ID: bad exception$csm$csm$csm
        • API String ID: 1639654010-820278400
        • Opcode ID: ee4cf200c058bec5ed6b23d82509feab73e8c37503a7504ed1a0638e07e7d0de
        • Instruction ID: 31541b96e2653494871a14b3f2ec29f51f2ad6a1b3fc548faab9757a94e7c634
        • Opcode Fuzzy Hash: ee4cf200c058bec5ed6b23d82509feab73e8c37503a7504ed1a0638e07e7d0de
        • Instruction Fuzzy Hash: 39E1A932602A40CAEB64BB65D0A83BD37B0FB45B8CF644225EE8A07BD6DB36C455C751
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocal$AllocCountErrorFreeLastVersionwsprintf
        • String ID: %d/$%d/$%d/$%d/$%d/None/%s
        • API String ID: 407931619-3175268128
        • Opcode ID: 66a97c90580ce347094714e55ca43378ea6e37b53cdfd1314d87ae6dfdcbb0e2
        • Instruction ID: ef43c0247dfbb59be76cf368c3091fdee64ecaeddd81c08156ebae85e6354a1f
        • Opcode Fuzzy Hash: 66a97c90580ce347094714e55ca43378ea6e37b53cdfd1314d87ae6dfdcbb0e2
        • Instruction Fuzzy Hash: A9515135216B40D6EB64AF11E49877A73B4F796B84FA40065EACA03A54DF3BC545CF10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$BlockUnwind$std::exception::exception$BaseImageThrowtype_info::operator==
        • String ID: csm$csm$csm
        • API String ID: 3798665358-393685449
        • Opcode ID: eb9d16b6ff1c1c6764852427ea27808433c176a4d810e4af76dc441884f6b13f
        • Instruction ID: ee289789cb32f119109368eeb9613e1dcc1f9184995a30a6cc71b26e2b3542f1
        • Opcode Fuzzy Hash: eb9d16b6ff1c1c6764852427ea27808433c176a4d810e4af76dc441884f6b13f
        • Instruction Fuzzy Hash: 06F1B33061AA88CFEB58BF68C4593B973F1FB54301F64412EE48A932D2DB76D8458782
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Gdip$Image$free$Dispose$BitmapCreateEncodersFromSaveStream$Scan0Sizemalloc
        • String ID: &
        • API String ID: 1890951399-3042966939
        • Opcode ID: 60ad61b9c2a00a2fb8edbd6bf83d103515c805d4293a766110f50120b13cc51f
        • Instruction ID: 484ea45ed7d5c7d0c52dff3fd51aa6e3acc5107f4d1712decd6e9f3565aabc4f
        • Opcode Fuzzy Hash: 60ad61b9c2a00a2fb8edbd6bf83d103515c805d4293a766110f50120b13cc51f
        • Instruction Fuzzy Hash: 6B91AE33312A80C6EF24EF61C4A87B933B1E754B9CF694561EAA9277C4EF2AC4058340
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Gdip$Image$free$Bitmap_errno$BitsGraphicsHeapPalette$AllocContextCreateDeleteDisposeDrawFormatFreeFromHeightLockPixelScan0SizeUnlockWidth_callnewhmallocmemcpy_s
        • String ID:
        • API String ID: 3799618542-0
        • Opcode ID: e8420e5db0a413dcbbb5ff5e2a4ca2867ef6350a45bdd43dbb9f23277287debd
        • Instruction ID: 8dea0f591f04c9e52f97371d227c62ea2c10d68a01bb8d317492eac824c6d01d
        • Opcode Fuzzy Hash: e8420e5db0a413dcbbb5ff5e2a4ca2867ef6350a45bdd43dbb9f23277287debd
        • Instruction Fuzzy Hash: 1DC1FC73202680CAEB20EF21C498BB93BB4F754B9CF654565EE9A67B85DF3AC500C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: VisibleWindow
        • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
        • API String ID: 1208467747-3439171801
        • Opcode ID: 32ff9c33e7c21981f1e92648b8f3a94a06c835b35deeed59398db8ea4e336351
        • Instruction ID: e7ab9605f0ee486587228fcb21068719c009ffcfdf0c10155a2aa9eb465d3b7e
        • Opcode Fuzzy Hash: 32ff9c33e7c21981f1e92648b8f3a94a06c835b35deeed59398db8ea4e336351
        • Instruction Fuzzy Hash: 9B510D78343741C0FF99BB55E55877433F06B5A7E9F6864699CCE06399FA2BC8408704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast
        • String ID:
        • API String ID: 1452528299-0
        • Opcode ID: a5f0163f4acb8b974cacfdb07cbf087a1492aeecdc8c13315bce12a0094e587a
        • Instruction ID: eb1f86bfe18019bcf7b280ae9b47f9cb941cb71a68690f4c38e1ba9d4c684d0d
        • Opcode Fuzzy Hash: a5f0163f4acb8b974cacfdb07cbf087a1492aeecdc8c13315bce12a0094e587a
        • Instruction Fuzzy Hash: 14B1BD32302A40CAEB64EB25E9987B933F5FB48B84F644465CE8E47B90EF3AD555C710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalErrorLastSection$Leave$Enter
        • String ID:
        • API String ID: 3650451384-0
        • Opcode ID: 1c300547cf81033922c0f2f8a93969f9d7edcc1f4596588974520377087e211c
        • Instruction ID: 7ad27bf34863c6bf8fe744d9ce82e7e9009ef55e81a34259adc1220e4f2661f0
        • Opcode Fuzzy Hash: 1c300547cf81033922c0f2f8a93969f9d7edcc1f4596588974520377087e211c
        • Instruction Fuzzy Hash: 8A51F776204A408AE772DB27B4443AAB7A1F78DBE0F145125EB9A477B0DF79D885C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$FreeHeap__free_lconv_mon__free_lconv_num_errno
        • String ID:
        • API String ID: 2573795696-0
        • Opcode ID: cb00de6662f5520fdc5f3791fe64273e5581ddefffeafd99a740971fc32c6413
        • Instruction ID: b50029db13986ea3d4274995a004026024313027ad888936ef6951ca8bacfa73
        • Opcode Fuzzy Hash: cb00de6662f5520fdc5f3791fe64273e5581ddefffeafd99a740971fc32c6413
        • Instruction Fuzzy Hash: 27410A36213684C9EF95BF25C4593BC33B4EB84B9CF684435DA8D4A296DF6AC981C720
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$EventSelectconnect$send
        • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
        • API String ID: 1826129850-4236689219
        • Opcode ID: dcf0498b7daf1886a9e955b361d597334a96f5170af3cf8f91b6c37e3f771d0e
        • Instruction ID: 980f0d10f20fc1db46c2f8c8b9264932f28bcabf5dc789f97f34c5eae2626533
        • Opcode Fuzzy Hash: dcf0498b7daf1886a9e955b361d597334a96f5170af3cf8f91b6c37e3f771d0e
        • Instruction Fuzzy Hash: 3B316431711550C3F760AF6AE59873932B0F748BA4FA04625DA9983EE4CF7BC8969700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalErrorLastSection$Leave$Enter
        • String ID:
        • API String ID: 3650451384-0
        • Opcode ID: 21337f2ffdf3b93cbb6cca8b1675b67f4d5956b45ff553cf537671f279ca96a2
        • Instruction ID: c0a8bf9259a326facd32831eca03d99e55b51e2ed8f9d38450b81e999d3e0ac3
        • Opcode Fuzzy Hash: 21337f2ffdf3b93cbb6cca8b1675b67f4d5956b45ff553cf537671f279ca96a2
        • Instruction Fuzzy Hash: E0512C32245A40C7E771AF25E40833EB3B1F789B68F654225CADA43BA1DF7AD884C741
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$CreateFrameInfo
        • String ID: csm
        • API String ID: 4181383844-1018135373
        • Opcode ID: 371cf207fb1d4a3a8c67313975563ac93265a610aa77a25a5adbaa666b453dcc
        • Instruction ID: 805ac43ca0c8b55a4f004b1edc42d3dab0314a11762ff9579f349797210eabc0
        • Opcode Fuzzy Hash: 371cf207fb1d4a3a8c67313975563ac93265a610aa77a25a5adbaa666b453dcc
        • Instruction Fuzzy Hash: 26514C70559A48CFEBA4FF58C449BB973F0FB58311F64026EE089C3692D771E8428B86
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$CreateFrameInfo_amsg_exit
        • String ID: csm
        • API String ID: 2825728721-1018135373
        • Opcode ID: bc2077fb82e993c6a671ee9943b81fbe161145c008b44bcd5635a92dfd771e75
        • Instruction ID: d7a01dd98470dc64c87c35a78233033a1841ebcbcc29636668c85071a0afe067
        • Opcode Fuzzy Hash: bc2077fb82e993c6a671ee9943b81fbe161145c008b44bcd5635a92dfd771e75
        • Instruction Fuzzy Hash: 91418C36116B80C2DB70AB12E4543BE73B4F788B98F654226EEDD47B91DB3AC4558700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLastLeave
        • String ID:
        • API String ID: 4082018349-0
        • Opcode ID: 5e2c67101b115eefd770f9530645276a89eac283016001a0172ea502d058b9de
        • Instruction ID: 6e01709a8ba1740ca42a514f380075336646ba5ebc0d647d1793daf810846aa5
        • Opcode Fuzzy Hash: 5e2c67101b115eefd770f9530645276a89eac283016001a0172ea502d058b9de
        • Instruction Fuzzy Hash: 8B418431712A50C3E718BB25E85C37D32B1FB85B95FA401219ED6477A2DF3BC8558341
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: PerformanceQuery$AddressCountCounterFrequencyHandleModuleProcTick
        • String ID: GetTickCount64$QueryPerformanceCounter failed, although QueryPerformanceFrequency succeeded.$default$kernel32
        • API String ID: 3248421294-3823320790
        • Opcode ID: c59a33e538b6d16315bac9845251cd1345709dcc26705cc9562fa14b61e4d09c
        • Instruction ID: 462d9677e8ec569104387e57f3bd2d1d12d4bdad206f191f03066859951e1445
        • Opcode Fuzzy Hash: c59a33e538b6d16315bac9845251cd1345709dcc26705cc9562fa14b61e4d09c
        • Instruction Fuzzy Hash: A8214C68F0D74293FB14BF58E881635A3A0AF84750FA44039D86E433D0EFACE586C7A4
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseValue$CreateDeleteOpenlstrlen
        • String ID: AppEvents$Network
        • API String ID: 3197061591-3733486940
        • Opcode ID: 36e90fbbfea98bc956dd5aeff78b519238191f212cae5700653f1760c57783c9
        • Instruction ID: a062892193536aa8419f1131064cefab785ca99aad346a4cd974e2b0bb31fbcf
        • Opcode Fuzzy Hash: 36e90fbbfea98bc956dd5aeff78b519238191f212cae5700653f1760c57783c9
        • Instruction Fuzzy Hash: 93211F76615A40C7EB20AB12F80876AB7B5F784BE5F540121EED947B98CF7EC149CB04
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
        • String ID:
        • API String ID: 1080698880-0
        • Opcode ID: 6d8b7b3dc11a15fff77c7ccf32e137587439f77b0189d775a4a507dbfda42e36
        • Instruction ID: b31086db0c9a3a0606dc5166162d75e7787c1ab7c55cd6249a3e958b0bc39ab8
        • Opcode Fuzzy Hash: 6d8b7b3dc11a15fff77c7ccf32e137587439f77b0189d775a4a507dbfda42e36
        • Instruction Fuzzy Hash: A381C432702780C6EB24AF25E54837E76F5F748BA8FA40625EADE57BD4DB3AD5108700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: String$CloseHandleProcess$FreeOpen$CurrentToken
        • String ID:
        • API String ID: 3697972778-0
        • Opcode ID: c0b0e474b926fcc330e320d504bf00c551296146189a67d64404ddb141be6ede
        • Instruction ID: 7697a47a6120b880681a4e639a922daa21d8b6db6fabab5d74ffe06e4c48f774
        • Opcode Fuzzy Hash: c0b0e474b926fcc330e320d504bf00c551296146189a67d64404ddb141be6ede
        • Instruction Fuzzy Hash: 9C516F35202780C2FB64BB55E4683BA73B0FB84F98F284515DEDA47B95DF3AC8048B50
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
        • String ID:
        • API String ID: 2295021086-0
        • Opcode ID: 8a0d1357173deac69c26e3324236e112c1b1041ebc1a21b94e928fbcca27f017
        • Instruction ID: e2dce2e290126ea6f58e8720a36369c839806660ab40a7b1d7ec44c4733d82bd
        • Opcode Fuzzy Hash: 8a0d1357173deac69c26e3324236e112c1b1041ebc1a21b94e928fbcca27f017
        • Instruction Fuzzy Hash: 5E519032603740DAFB61BBA4E5483BC76F0A741BECFB44225DADE07AD5EB3A85458701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: MultipleObjectsWait$CloseErrorExceptionHandleLastThrowValue
        • String ID: @$QThread internal error while waiting for adopted threads: %d$default
        • API String ID: 260478653-2992040041
        • Opcode ID: a17424416e23380ba081f0f70fe6da9368696a7339bf18603e62f94c7f294120
        • Instruction ID: cb122cf76bef2fbee4d1071594781f610f44b12559b6ba723e1ac3792de06414
        • Opcode Fuzzy Hash: a17424416e23380ba081f0f70fe6da9368696a7339bf18603e62f94c7f294120
        • Instruction Fuzzy Hash: AFC1C439B0868696EB64AF25D4406B9B761FF44B94F944239D93D073E5DF3CE406C390
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
        • String ID: @
        • API String ID: 3473179607-2766056989
        • Opcode ID: 70613ee20f0b469d2dc4fa8b7aa00a0ec4ba75fb24369761d5266e73a85542bd
        • Instruction ID: 2d05cb04e96c91e717245b8de591ab5073896691001096a10f645672ae6b5a19
        • Opcode Fuzzy Hash: 70613ee20f0b469d2dc4fa8b7aa00a0ec4ba75fb24369761d5266e73a85542bd
        • Instruction Fuzzy Hash: E8815876302B81C6EB54AF29D48C73977B0E755B78F648325CABA432D4EB3AC595C304
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: lstrlen$_errno$CloseEnumInfoOpenQuery_invalid_parameter_noinfo
        • String ID: Software\Tencent\Plugin\VAS
        • API String ID: 47975445-3343197220
        • Opcode ID: e7f4e84029ec382a2d93beb0de2337fa29a23218f62e48d748265e7efd93be2b
        • Instruction ID: 0b4ee992180514dfa3fdd301f25145e58012fb209d3eb3826da605d1db9ddb8f
        • Opcode Fuzzy Hash: e7f4e84029ec382a2d93beb0de2337fa29a23218f62e48d748265e7efd93be2b
        • Instruction Fuzzy Hash: 37514332615B81C6E760EB25E8843FE77B5F788748FA00126EACD43A58DF3AC559CB40
        APIs
        Strings
        • <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!, xrefs: 0000026C9CB91B14
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave$ErrorLast$send
        • String ID: <C-CNNID: %Iu> OnSend() event should not return 'HR_ERROR' !!
        • API String ID: 484515946-1981346945
        • Opcode ID: 3feb2db3476dfe5488b86a50e82330a31573681218d9595143e5917083d90cfd
        • Instruction ID: ead18342235b0465aa0f79f2e957b4502e070f2451af1af34a829d5fecc14a3a
        • Opcode Fuzzy Hash: 3feb2db3476dfe5488b86a50e82330a31573681218d9595143e5917083d90cfd
        • Instruction Fuzzy Hash: A8517C32206B40C2EB64AF22E5483BEB3B4F749B94F640515DBDA47BA5EF3AD495C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2959964966-0
        • Opcode ID: 5b15c66cd6d411bd027aebc04f631a0e3f4aaa2a84db44a19bfb65910699da26
        • Instruction ID: 2ad578a828f3e7dcca5b6841372cd18c75f779e616187c9de3e27487977eb1a4
        • Opcode Fuzzy Hash: 5b15c66cd6d411bd027aebc04f631a0e3f4aaa2a84db44a19bfb65910699da26
        • Instruction Fuzzy Hash: 82A1C372713740CAFB60AB64D64837D76F5B7447A8F244615DEDD03AEADB3AC8828702
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno$_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2315031519-0
        • Opcode ID: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
        • Instruction ID: 7637da5ca6ab5230df90213ba189ae6692777f3ca119276d888667982f53bfae
        • Opcode Fuzzy Hash: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
        • Instruction Fuzzy Hash: 0031C47010A644CEF3097F68D88E3B977E0EB45320F25065CE8C6873E3DA76A82646D2
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$Event$ResetSelectSwitchThreadbindconnecthtons
        • String ID:
        • API String ID: 1298600207-0
        • Opcode ID: 6976ed68a7b460f545eb79997a661905af692d36da6c8cd53b89725313569a83
        • Instruction ID: d64727576c8a6d2d868d0a146045c9de92c4c7019b67b1b58c249258549f4aa9
        • Opcode Fuzzy Hash: 6976ed68a7b460f545eb79997a661905af692d36da6c8cd53b89725313569a83
        • Instruction Fuzzy Hash: B2414932A06B40C3EB64AB22E64837E73B5FB48B85F604025DBCA43B95DF7AC465C741
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ConditionMask$InfoVerifyVersion
        • String ID:
        • API String ID: 2793162063-0
        • Opcode ID: 10c6aff73516db3e0e7fc4b1498109461d770d16e70cbd1f77bc26cf72f8573f
        • Instruction ID: a0f00240da1131b8a103700ccea5a8166bde9bbb3ef933b585e6de062ed2acd5
        • Opcode Fuzzy Hash: 10c6aff73516db3e0e7fc4b1498109461d770d16e70cbd1f77bc26cf72f8573f
        • Instruction Fuzzy Hash: 7941A336A08681C7D724DF11E44426ABBA1FB8CB94F448139DA9E47B98DF3CD606CF90
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno$_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2315031519-0
        • Opcode ID: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
        • Instruction ID: 6522c1e9105f12bb08af5a6e5364c446bc0fb74b7d41a2b71f2f631d75a38269
        • Opcode Fuzzy Hash: 93f627117ff418e048685a1d2756b48fc0f2c634aa3720686b95d148af7d0f99
        • Instruction Fuzzy Hash: 3F31E431202650C6E3567FA5D89E77E3AB1A7817E4F354119EAD0073D3EA7AC944C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProcProcessToken$CurrentInformationOpen$CloseCopyHandleLength
        • String ID: HOME$HOMEDRIVE$HOMEPATH$USERPROFILE
        • API String ID: 2161948334-698974742
        • Opcode ID: 522bbb0ce41df5e904172ec52821add264b1887ae4c821b0e5e19679b0eeeca8
        • Instruction ID: 5e74f50ce7ca11b88d923f929c1c41af4d8a1bf66f4390f4b748576b5c3c7c32
        • Opcode Fuzzy Hash: 522bbb0ce41df5e904172ec52821add264b1887ae4c821b0e5e19679b0eeeca8
        • Instruction Fuzzy Hash: 1CE1803AB05A819BEB10EF35D8901BCB3A0FF44768F944539DA2D876D5DE38E806C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: swprintf$_errno_invalid_parameter_noinfomalloc
        • String ID: %s %s$onlyloadinmyself$plugmark
        • API String ID: 3059695456-591889663
        • Opcode ID: bd173990919955496a5d2fd31b15c617698a0f7984e0d23985bbef0f184765d7
        • Instruction ID: 112a351b15e418f9d82a14736171bdb99e97cf3d639d6e15b4a629b4b668b9f6
        • Opcode Fuzzy Hash: bd173990919955496a5d2fd31b15c617698a0f7984e0d23985bbef0f184765d7
        • Instruction Fuzzy Hash: 29A1AC36301A85C6FB10EF66D4883B977B1E789BC8F648025DE8D0BBA6DE3AC5458350
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Priority$CurrentResume
        • String ID: QThread::start: Failed to create thread$QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 682968308-3963483154
        • Opcode ID: a895a4ec4cb16228a666090ac22768035e26b0b9b9618cbf51015f0cb63221b3
        • Instruction ID: f5d13dc73c942cf0d27d33b702d94afb39e38e3b859f2c46780f8fd37fbd0553
        • Opcode Fuzzy Hash: a895a4ec4cb16228a666090ac22768035e26b0b9b9618cbf51015f0cb63221b3
        • Instruction Fuzzy Hash: FD417229B08785A6E758BF24A9112B8A391FF84774F944338DA7D032E1DF3CE456C7A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: File$CloseCreateHandleWritelstrlenwsprintf
        • String ID: %s %s
        • API String ID: 2369136734-2939940506
        • Opcode ID: 09ce7afcb9fb6050578c75cf102adc5c64cf37ae564d7fe82caabfb4846adaf7
        • Instruction ID: ee3f04a4aa89438c6cbf04b7e19ac5f143f7fde17174a66f7dfa08b25cda371d
        • Opcode Fuzzy Hash: 09ce7afcb9fb6050578c75cf102adc5c64cf37ae564d7fe82caabfb4846adaf7
        • Instruction Fuzzy Hash: A8318131615A85D6FB20EF21E8887BBB3B1F7C4794FA44111AACD47A98DF3AC549CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2819658684-0
        • Opcode ID: 4947a362412c4fceee330a8e71a7679ddf0a543ef0673e77153d394316c0f519
        • Instruction ID: 429307cffb5f93a16766092f5a489fd07237edef76ae89a1cad16305e7c9425f
        • Opcode Fuzzy Hash: 4947a362412c4fceee330a8e71a7679ddf0a543ef0673e77153d394316c0f519
        • Instruction Fuzzy Hash: 7B510530516A0ACBFBA5BB19D44C3B97AF0FB94330FB44229D4C9C62CACA36C8418B45
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandle$Gdip$CriticalCurrentDeleteDisposeErrorFreeImageLastObjectSectionSingleThreadWaitfree
        • String ID:
        • API String ID: 1027730736-0
        • Opcode ID: 347c1ec12ef1d2ec7bf1145c1b6afb1a60276238f096c0ea2858b635a1103b41
        • Instruction ID: 6ed712cd821bc1b6932e580d80055b1d4e2d6932114aa4b55727c9669bea3ea1
        • Opcode Fuzzy Hash: 347c1ec12ef1d2ec7bf1145c1b6afb1a60276238f096c0ea2858b635a1103b41
        • Instruction Fuzzy Hash: 3B515032203B41C6FB55AF34D4983BD33B4EB81B98F68457A9A9A876E5CF36C8558310
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: strchr
        • String ID: in $QObject::%s: No such %s %s::%s%s%s$QObject::%s: Parentheses expected, %s %s::%s%s%s$default$method$signal$slot
        • API String ID: 2830005266-1438824482
        • Opcode ID: ed1abf882f2c03d4d3c043e58149050cc9689118d8bd9510a25f0b8134be170e
        • Instruction ID: b0cda2fd8dc08de9555a02a6ac77df9667b087fd9d1a7af5e634bdc2d227320e
        • Opcode Fuzzy Hash: ed1abf882f2c03d4d3c043e58149050cc9689118d8bd9510a25f0b8134be170e
        • Instruction Fuzzy Hash: 1C41B226A09B8192EB60AF00A8402B9B7A1FF85B90F848139DE7D03BD5DF3CD446D390
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$EnterErrorLastLeave
        • String ID:
        • API String ID: 4082018349-0
        • Opcode ID: aceef0d8f6cd6c68b7d24092875a9f92703ae0e2651d92f7e848195387b296dd
        • Instruction ID: b4e7f089d26b888c0d45c6a61a452a046993f1a4652cccc548b9489de251008b
        • Opcode Fuzzy Hash: aceef0d8f6cd6c68b7d24092875a9f92703ae0e2651d92f7e848195387b296dd
        • Instruction Fuzzy Hash: 49216D31605A40CBE368AB25E44837E33B1F789BA8F7402209ED697AA6DF3AC445C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$AllocHeap_callnewhfreemalloc
        • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
        • API String ID: 3198430600-868042568
        • Opcode ID: 71f902fbc9141746ee0dab03b95b383ee8bd6d96c1cc4bade1ccfda00f101f5a
        • Instruction ID: b71de6f3379f58900f4fc9f34855504e3d3208fd8580c4f930387f12819867c3
        • Opcode Fuzzy Hash: 71f902fbc9141746ee0dab03b95b383ee8bd6d96c1cc4bade1ccfda00f101f5a
        • Instruction Fuzzy Hash: DEE1A272606690CBE774EF29E48877E7BB1F395788F244451DBD683B99DA3AD840CB00
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: bad allocation
        • API String ID: 0-2104205924
        • Opcode ID: e8f0598dbd45f399888059267843e7640e179de0418f77ab1c84c48c3c6fc7e4
        • Instruction ID: f07756a689856a11aa47122bd3e39ec20cd2568fc8818c720a6ffdf7fc0a27ea
        • Opcode Fuzzy Hash: e8f0598dbd45f399888059267843e7640e179de0418f77ab1c84c48c3c6fc7e4
        • Instruction Fuzzy Hash: 8D81BF76706B80C2EB60AB01F598BBAB7B0F758BD8F644121DEC907B99DB3AC445C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Window$CountForegroundInfoInputLastTextTickmallocwsprintf
        • String ID: %d min
        • API String ID: 4179731349-1947832151
        • Opcode ID: 422eb00071ef3fa8c2918f9fc1214eccc8ab5220253c98e71f31a22b5cd05278
        • Instruction ID: 1e9215dca510f4cb37dd90eb7a91d45591ec55d112e2199f305c1a38137e0754
        • Opcode Fuzzy Hash: 422eb00071ef3fa8c2918f9fc1214eccc8ab5220253c98e71f31a22b5cd05278
        • Instruction Fuzzy Hash: 6241B172605684C7E764EF2AE4483BAB7B1F788B84F644125EE8A47B54DF3AC505CF00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentInfoInformationInitializeLineSleepStartupThreadValueVersion__setargv_cinit_errno
        • String ID:
        • API String ID: 2481119767-0
        • Opcode ID: fa810e96e6b49a81c5a3de3deb820a248b92c227eb375945ca1b424efe49a0c5
        • Instruction ID: 3737a9570037b712ae191be714f8b2416b3819e6e03301eaee5be58e8c98341e
        • Opcode Fuzzy Hash: fa810e96e6b49a81c5a3de3deb820a248b92c227eb375945ca1b424efe49a0c5
        • Instruction Fuzzy Hash: 9E319030A83602C6FFA477B1D94E37D32B19B2176DF344224D8D5462D7EE2BC8499622
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: 30668c2f20c6f80ff7138b934324c66d2765922e04ca970253a5424b5db80f86
        • Instruction ID: 6c8a879f0a69108fd231bd41c627f60009261369c5590c101156878ed99a7a06
        • Opcode Fuzzy Hash: 30668c2f20c6f80ff7138b934324c66d2765922e04ca970253a5424b5db80f86
        • Instruction Fuzzy Hash: FD210E316197C4CEF3197B58D84A3F972E0EB49360F300259E5C5872E3D669AC018651
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: bcb02bae539d5dc8e5dc439c059f32d07212becae44f91b8e5163380297e7527
        • Instruction ID: 92dfc75f1744bc4c46a4af8fb3f8c3246982c919585d78023a96daad026802aa
        • Opcode Fuzzy Hash: bcb02bae539d5dc8e5dc439c059f32d07212becae44f91b8e5163380297e7527
        • Instruction Fuzzy Hash: 1C212B3161A7C4CFF7187B58D88E3BC76E0EB45320F340249E9D5472E3DAAA98414692
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseCurrentHandleInit_thread_footerObjectSingleThreadWait
        • String ID: QThread::wait: Thread tried to wait on itself$QThread::wait: Thread wait failure$default
        • API String ID: 3558220368-2839480340
        • Opcode ID: 5606b09bc6a5dc592dbef470d28760f875ccfb88470aa8651be09fd3ff341b3a
        • Instruction ID: 7e1117f69a304c8ff554c772c02bb8680a8522add4b29d582510e809961a02b8
        • Opcode Fuzzy Hash: 5606b09bc6a5dc592dbef470d28760f875ccfb88470aa8651be09fd3ff341b3a
        • Instruction Fuzzy Hash: 1841B727B186C2A2E768AF359805378A390FF44774F984339DA7D032E1CF38E45683A0
        APIs
        Strings
        • <C-CNNID: %Iu> recv 0 bytes (detect package), xrefs: 0000026C9CB91389
        • <C-CNNID: %Iu> OnReceive() event return 'HR_ERROR', connection will be closed !, xrefs: 0000026C9CB91319
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$recv
        • String ID: <C-CNNID: %Iu> OnReceive() event return 'HR_ERROR', connection will be closed !$<C-CNNID: %Iu> recv 0 bytes (detect package)
        • API String ID: 316788870-281152440
        • Opcode ID: e006504f11bb0893ad072e5ecebb35c70b253aa6bceec88274e66d0847f92e8c
        • Instruction ID: e3daca179ad8811508077ee51d83b8578a6548adc74768e2333d6e9445db05f7
        • Opcode Fuzzy Hash: e006504f11bb0893ad072e5ecebb35c70b253aa6bceec88274e66d0847f92e8c
        • Instruction Fuzzy Hash: 67314172606A40C6EB90AF36E48877E37F0F748B9CF645125DE89C7799DB3AC8819740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateFreeInitializeInstanceStringUninitialize
        • String ID: FriendlyName$Network
        • API String ID: 841178590-1437807293
        • Opcode ID: c51619dea522e0c55fc0899b43e0b55aa5e9855a9860aea8fcd38e191733d5da
        • Instruction ID: d33c5d3faed8d27face61a78b6bc0981662f48ab08698d02bbc5cd07b378ecd3
        • Opcode Fuzzy Hash: c51619dea522e0c55fc0899b43e0b55aa5e9855a9860aea8fcd38e191733d5da
        • Instruction Fuzzy Hash: 2D31EE36205A86C2EB50DF35E4947AA77B4F7C4B95F654012DACE83B24DF3AC589CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AttributesCreateErrorFileLastProcesslstrlen
        • String ID: WinSta0\Default$h
        • API String ID: 591566999-1620045033
        • Opcode ID: c8e2f4124be8c9a6e4893f230f4c199dab45ef929636d0fe5c6bc72b415117a5
        • Instruction ID: aada8a8c7bf9a7c04e73552dc4209205bc1e3ddd75f13ce39bad34d6a5923bab
        • Opcode Fuzzy Hash: c8e2f4124be8c9a6e4893f230f4c199dab45ef929636d0fe5c6bc72b415117a5
        • Instruction Fuzzy Hash: 2E318131605681C2EB64EB25F4593BEB3F1E7847D4F604231AAED47B99EF3AC4458B00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$write_char
        • String ID:
        • API String ID: 1772936973-0
        • Opcode ID: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
        • Instruction ID: a4601b0cae3f31b5dad24c166ec9023707c11a00adf9264c8a179d430478d3e8
        • Opcode Fuzzy Hash: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
        • Instruction Fuzzy Hash: D4213B30515B88CFEB64BA98D44A375B3F0EB69311F31015AE699C72E2DA75DC81CB82
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Current$Thread$HandleProcessValue$AllocCloseDuplicateInit_thread_footer
        • String ID:
        • API String ID: 1145076070-0
        • Opcode ID: 408a2b34e50e2ba976580d2fae296fcd2328d94a12b92b755e17d9db50ea5d54
        • Instruction ID: 8ee2f6b971d59fc417913c188df7d99589d4934a7bb5576a90c4a70a8e099eb9
        • Opcode Fuzzy Hash: 408a2b34e50e2ba976580d2fae296fcd2328d94a12b92b755e17d9db50ea5d54
        • Instruction Fuzzy Hash: 0731103991978293EB90AB15A444269B2A1FF45BA0F940238DABE077D5DF3CF046C7A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_close_nolock_errno
        • String ID:
        • API String ID: 186997739-0
        • Opcode ID: 663138914dc975fbd29fce16c083a78efe6195e4759d07de2d0406a2aad54802
        • Instruction ID: 5cc5dedca658c94836696732a0df01bd55a3a7608c2f02ca2b41d40ea8090122
        • Opcode Fuzzy Hash: 663138914dc975fbd29fce16c083a78efe6195e4759d07de2d0406a2aad54802
        • Instruction Fuzzy Hash: 2321D23111AA44CEF3147F65D98E3B876B0EB81331F350A1CE4DA872E3CA7698948752
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
        • String ID:
        • API String ID: 443098685-0
        • Opcode ID: a6a614697040017534cd3b1d3e96cc5a4ea4528f5d59ece13cf00c21120499df
        • Instruction ID: d355eeae27097f1c311f8b5790f7bf03b1768cb38e137b36cbe8c4d9d3e26622
        • Opcode Fuzzy Hash: a6a614697040017534cd3b1d3e96cc5a4ea4528f5d59ece13cf00c21120499df
        • Instruction Fuzzy Hash: 76218331725A51C7E7609B25F888F3A76B0F79CB58FE05211EED943E94DB3AC8458B40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: 821f5293a29abbd7863e97bfbf14561feb01f87c9b858ffea3149c09338b6ff9
        • Instruction ID: 3a28a55326589f3326ff1570ab482307a3fe6c1a5cec53d8af19b35186103d3b
        • Opcode Fuzzy Hash: 821f5293a29abbd7863e97bfbf14561feb01f87c9b858ffea3149c09338b6ff9
        • Instruction Fuzzy Hash: D4210132312940C5F3167B65D89A37D3B70A781BF9F294114EA94073D3DABA84808354
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
        • String ID:
        • API String ID: 443098685-0
        • Opcode ID: f519665c691364a73c8828fb6620903fabd3b4a25194a309f82e53ada5401924
        • Instruction ID: 305f93d56b7a1220d1d78e3cac75812468a422e5bfdccfe149107610b3fc70fd
        • Opcode Fuzzy Hash: f519665c691364a73c8828fb6620903fabd3b4a25194a309f82e53ada5401924
        • Instruction Fuzzy Hash: 0C21C472720A5086E771CB22F844F9A7690F79CBE4F905210FFA943AA4DF39C541DB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: 173280ab0a16f06b6be0f486b7fc90be9e63d45bf980aa7259864e1372d933b7
        • Instruction ID: 7dcb6e82f0d047ff7de61784c907f91f54209dae86a749e409d58b55bee60cfd
        • Opcode Fuzzy Hash: 173280ab0a16f06b6be0f486b7fc90be9e63d45bf980aa7259864e1372d933b7
        • Instruction Fuzzy Hash: 6A21FF32216680C5F7567B68D85E3BD3A716781BF9F390304AEF4073C2DA7A84408320
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$BuffersErrorFileFlushLast__doserrno
        • String ID:
        • API String ID: 1845094721-0
        • Opcode ID: b93863f42654a4b52d6dd73c40ccdba5987062f1c3bd463329d4bbee9e2aa4a0
        • Instruction ID: ecc231bc13fafb0a9228997ce2eec623fa43c374c19710d6015b660075453b39
        • Opcode Fuzzy Hash: b93863f42654a4b52d6dd73c40ccdba5987062f1c3bd463329d4bbee9e2aa4a0
        • Instruction Fuzzy Hash: AE21A131602A44C6F7157FA5D59D37E36F0AB80790F390128EAD6072D6DBBA89488314
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: File$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
        • String ID: [
        • API String ID: 3163932117-4056885943
        • Opcode ID: 73e49f8ca6e268b064f541a2adff590462e5e9fe521d7392cec81c559873f1d1
        • Instruction ID: c6aa2c0966a8c049bf2c9046e7754d6597a031c618c9190df8327b5d014ac952
        • Opcode Fuzzy Hash: 73e49f8ca6e268b064f541a2adff590462e5e9fe521d7392cec81c559873f1d1
        • Instruction Fuzzy Hash: BB31613121AA40C2F754EF92F89977AB7B1F794744FA04016E9CD42AA4EF3EC558CB50
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _set_error_mode$CriticalSection_errno$CountFileInitializeLeaveModuleNameSleepSpinfreemalloc
        • String ID:
        • API String ID: 3619412461-0
        • Opcode ID: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
        • Instruction ID: df246ff8c6376f34dac7d0bb614137ce8a4dadaf4fa6554d3ba4a5508a72cdeb
        • Opcode Fuzzy Hash: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
        • Instruction Fuzzy Hash: FC214731613680C2F7A0BB51E81C37A72B0FB867D8F745424A5CA576D2DF7AC8408711
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_close_nolock_errno
        • String ID:
        • API String ID: 186997739-0
        • Opcode ID: 39692bd83cbc8bad7885e4b5d4687ea0fb49e434dd73b264a51106f0543e9273
        • Instruction ID: 994151c80b0859d0b7fb0c4c191052b0ee701cb268c613f9e56909b77ad24bb1
        • Opcode Fuzzy Hash: 39692bd83cbc8bad7885e4b5d4687ea0fb49e434dd73b264a51106f0543e9273
        • Instruction Fuzzy Hash: 66110332606A84C6FB553F64D89E37D3AB0A7807E0F354624E6E5072C3EABBC944C310
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$write_char
        • String ID:
        • API String ID: 1772936973-0
        • Opcode ID: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
        • Instruction ID: 325478164cbc3698b7141dfb78b72678ed72236fb3d73e84049bdea5d34ecf24
        • Opcode Fuzzy Hash: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
        • Instruction Fuzzy Hash: EC115B32006B80C6E7617B62D40937DB6B0F395BD8F285011EBD407797EB3BC9518741
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$write_char
        • String ID:
        • API String ID: 1772936973-0
        • Opcode ID: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
        • Instruction ID: 120dbbb54fd68ed29ee0ec01cab7f648261cf291df6b9bbbcb9b910a5c01dd98
        • Opcode Fuzzy Hash: ea6d6c994a736733083169bee3cb065916d4f19d50813b09805ee92671e3cf58
        • Instruction Fuzzy Hash: 07117372501A80C6E7607BA2E40A37D77B0F395BE8F298015EF8403782EB3ADA81C751
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 6c706e776ac81385c870dcad09bcf9c717d9a6faa38eacb18e293ef4a9f07b38
        • Instruction ID: e44b48cc4cde0c475eda53abd962454d453952fcfd77df9a1fe12381171886fe
        • Opcode Fuzzy Hash: 6c706e776ac81385c870dcad09bcf9c717d9a6faa38eacb18e293ef4a9f07b38
        • Instruction Fuzzy Hash: 5511D625B18B4186E750AB02E844735E2A0FB88FF5F904234D92E837D4CF7CD446C794
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
        • String ID:
        • API String ID: 3421218197-3916222277
        • Opcode ID: 2d2fce262e285fa9fa2810391d16c93d7bb5af68b546423bde804a28fab8f9c8
        • Instruction ID: f9f04b5e14bfae8ddb3bb2ac3e39fb6051fde91a6e73a03a5abcf938c88afff6
        • Opcode Fuzzy Hash: 2d2fce262e285fa9fa2810391d16c93d7bb5af68b546423bde804a28fab8f9c8
        • Instruction Fuzzy Hash: 7F011A32615B85C7DB609B24F85876BB7F4F784780FA00125E6CA43A68DF3EC1498B00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
        • String ID:
        • API String ID: 4202892810-0
        • Opcode ID: e6c73dd4b36f160f1a62fbf4a0c0e9ac1c0c35662008cd925dc09f0461ab862e
        • Instruction ID: 27864e326862e407991bbcc65f0c940748e943e6c89aaded279c951d330365ca
        • Opcode Fuzzy Hash: e6c73dd4b36f160f1a62fbf4a0c0e9ac1c0c35662008cd925dc09f0461ab862e
        • Instruction Fuzzy Hash: B1111B71215A84C7E750EB52F81CB7A77B0F788B98FA44110EADA43B64CF7EC5498B00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd
        • String ID: MOC$RCC$csm
        • API String ID: 3186804695-2671469338
        • Opcode ID: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
        • Instruction ID: 7b46387339eb32adb9bc9a9264f8085ce22b6e95d9b9c81d434cd0cec9505564
        • Opcode Fuzzy Hash: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
        • Instruction Fuzzy Hash: FCF0ED38852149CFF75977A4C50D3B432F1FF18306F6691E994849A2E3D7FEC9808A92
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$_amsg_exit
        • String ID: MOC$RCC$csm
        • API String ID: 2610988583-2671469338
        • Opcode ID: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
        • Instruction ID: 624a1fc0c27355cb606c157d1c2ca48eb6bbd6affd7a79d1bcdf87ab6803eac2
        • Opcode Fuzzy Hash: e00eff0fe5e15c3e8c090d11fcbd1bf996e4955e1c4277de16df4e8acf759e70
        • Instruction Fuzzy Hash: A9F01236522214C6EF653B64C05E3FC35B4F79870DFE6D56582D4423C2D7FE48808A52
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalErrorLastSection$EnterLeave
        • String ID:
        • API String ID: 2124651672-0
        • Opcode ID: 647e02dd2c1bdac2cb0593e1bcada1d5777c8686bc1b852d6813ed41c29527b2
        • Instruction ID: c04cde14f7ce488b0a53c1b9a60e375d1a75cfc539acd7e2e506f326c2e33fe6
        • Opcode Fuzzy Hash: 647e02dd2c1bdac2cb0593e1bcada1d5777c8686bc1b852d6813ed41c29527b2
        • Instruction Fuzzy Hash: 7F417D36201B40CBE754BB21E45CABA73B5F74DB98F645225DE8A83791DF3AC845CB01
        APIs
          • Part of subcall function 00007FF7F7382530: GetProcAddress.KERNEL32 ref: 00007FF7F73825D0
          • Part of subcall function 00007FF7F7382530: GetProcAddress.KERNEL32 ref: 00007FF7F73825E7
          • Part of subcall function 00007FF7F7382530: GetProcAddress.KERNEL32 ref: 00007FF7F73825FE
          • Part of subcall function 00007FF7F7382530: GetProcAddress.KERNEL32 ref: 00007FF7F7382615
          • Part of subcall function 00007FF7F7382530: GetCurrentProcess.KERNEL32 ref: 00007FF7F7382630
          • Part of subcall function 00007FF7F7382530: OpenProcessToken.ADVAPI32 ref: 00007FF7F738265C
          • Part of subcall function 00007FF7F7382530: GetTokenInformation.ADVAPI32 ref: 00007FF7F7382688
          • Part of subcall function 00007FF7F7382530: GetTokenInformation.ADVAPI32 ref: 00007FF7F73826BC
          • Part of subcall function 00007FF7F7382530: GetLengthSid.ADVAPI32 ref: 00007FF7F73826CC
          • Part of subcall function 00007FF7F7382530: CopySid.ADVAPI32 ref: 00007FF7F73826EA
        • LocalFree.KERNEL32 ref: 00007FF7F73807E0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc$Token$InformationProcess$CopyCurrentFreeLengthLocalOpen
        • String ID: .bat$.cmd$.com$.exe$.pif
        • API String ID: 3463338316-2292669753
        • Opcode ID: a4ee9e539fb5e06da0ce4f5bc97e58f13e50c77d53f1c576658f6c62b7bba354
        • Instruction ID: 3f76d200a619958aff2e21426044650ea8d4fb20dcb71214b5ab09230832f643
        • Opcode Fuzzy Hash: a4ee9e539fb5e06da0ce4f5bc97e58f13e50c77d53f1c576658f6c62b7bba354
        • Instruction Fuzzy Hash: BDF16F36A097819BF710AB28D8412BDB7A0FF80758F944138DA6D476E8DF7CD546CB90
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_errno_getptd$_lockmalloc
        • String ID:
        • API String ID: 1369581901-0
        • Opcode ID: 677f3550d650548e460b7bf04926cfe641f17280e9f94b78788199c02c4676c8
        • Instruction ID: dc019a88d9f45a8745499d57227c677760fe06cc5073efc3b606e98904d30df3
        • Opcode Fuzzy Hash: 677f3550d650548e460b7bf04926cfe641f17280e9f94b78788199c02c4676c8
        • Instruction Fuzzy Hash: 0F518230A1AA84CFEB64AF64D4857B977F1EB95310F204169D89EC7292DA35D8438782
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$malloc$_callnewhfree
        • String ID: d$d$d
        • API String ID: 1789327305-1898527202
        • Opcode ID: d89cf67625e5f3d9be3ac12f6ba0e19bfac00179c11cbf98e92fe216d6527eaa
        • Instruction ID: 43d7b3f669b6cefbf1776542ee7b016215251b85e4ca5d1e04511e3a2f4e7921
        • Opcode Fuzzy Hash: d89cf67625e5f3d9be3ac12f6ba0e19bfac00179c11cbf98e92fe216d6527eaa
        • Instruction Fuzzy Hash: D851DAB0519A58CFEB91EF18D088B657BE4FB18740F6541FA984CCB26ADB75C844CF90
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseCreateHandleThread$CurrentEvent
        • String ID:
        • API String ID: 1633135894-0
        • Opcode ID: 9c8cad1299e0c9272d8f2c6ec9908b311088d7a55ff6301e464786220b0a3468
        • Instruction ID: 1fb566939cc77774c55ac4b8bc4994c360a2f3c13811a053a9d69601bf11d994
        • Opcode Fuzzy Hash: 9c8cad1299e0c9272d8f2c6ec9908b311088d7a55ff6301e464786220b0a3468
        • Instruction Fuzzy Hash: 7E517039B1869282EB24AF15E951678B761FF40B51F955239C57E037E0CF3DE442C7A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: DecodePointer$ExitProcess
        • String ID:
        • API String ID: 1284615037-0
        • Opcode ID: 95cc4c190d7943855aadbb998e58200c754987734139fa49f6c9bfbe4b09495d
        • Instruction ID: fba014d55234bff6db037d36cb8ba2181e6a8da65593399408c55d2d6b6babcf
        • Opcode Fuzzy Hash: 95cc4c190d7943855aadbb998e58200c754987734139fa49f6c9bfbe4b09495d
        • Instruction Fuzzy Hash: B8417832613A40C2FB44BB12E89833972F4F798B98F740425AAC913BA4EF3BC451C701
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$Heapmalloc$AllocFree_callnewhfree
        • String ID: d$d$d
        • API String ID: 4257515785-1898527202
        • Opcode ID: 5ac4ee45e769e9299644d6e5f03c679bef95057c7f94c81e09fa81b34d444265
        • Instruction ID: fbce33b3a7dd3b61d36c32673e68f09726e4cd1f2d96e2b747fdc2b3ce006d39
        • Opcode Fuzzy Hash: 5ac4ee45e769e9299644d6e5f03c679bef95057c7f94c81e09fa81b34d444265
        • Instruction Fuzzy Hash: 0E412672112B90C9E7909F21E4443AD3BF8F348F88F69813ADA8817798EF76C454CB60
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$FreeHeap_errnofreefreeaddrinfogetaddrinfohtons
        • String ID:
        • API String ID: 443883550-0
        • Opcode ID: fda43265b886c102daf43b2b617a422d89d82c2805bd548c61f079e8a940deb0
        • Instruction ID: 50175a7ab7c3d6a5b88329f58359eef7a87a8542b6e2c1f6a5431d6645aecb95
        • Opcode Fuzzy Hash: fda43265b886c102daf43b2b617a422d89d82c2805bd548c61f079e8a940deb0
        • Instruction Fuzzy Hash: B9319276205B81C2EB60AF11E4883BE73B1F788784F644125DACD47B94EF39C944CB40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _set_error_mode$_errno$_lockfreemalloc
        • String ID:
        • API String ID: 360200360-0
        • Opcode ID: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
        • Instruction ID: 9573c952e79388c26a9f67463b5ed6a1169f35d5f22ac8afc95920a0ea89f659
        • Opcode Fuzzy Hash: adf093be1493d26b0308fb18adbfc07a86a0bd316682e00d36ba23ed80a1460b
        • Instruction Fuzzy Hash: 0721903065A6D9CFF764BFA4D45D7BD72F0EB98350F604428A089C32D2DB7AD840A752
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseEventThread$CurrentHandleSwitchclosesocketshutdown
        • String ID:
        • API String ID: 3526870478-0
        • Opcode ID: 932c4ec2da38c0ac6b1f6ceccf3195afbf5e37ca85e201a0a25c999c6e004dca
        • Instruction ID: 1eb977e74ebd8494691182358037f40ccbffea9e4faef4d81f1623520b2b60c7
        • Opcode Fuzzy Hash: 932c4ec2da38c0ac6b1f6ceccf3195afbf5e37ca85e201a0a25c999c6e004dca
        • Instruction Fuzzy Hash: B3313E76602A41C2E750AF35D45823D33B1E788FA8F254221EEAA43BD8CF39C895C740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: EventReset$ObjectSingleTimeWait_errno_invalid_parameter_noinfotime
        • String ID:
        • API String ID: 2413556668-0
        • Opcode ID: 58d5c98b484be63242f2a745b5d15b4acce531cbd3b6e134beeab50c125b9f3c
        • Instruction ID: 4e3ad804f0708b9828c12fdf7477bfe81e14fda1ee29c29d0dd1272088560e5f
        • Opcode Fuzzy Hash: 58d5c98b484be63242f2a745b5d15b4acce531cbd3b6e134beeab50c125b9f3c
        • Instruction Fuzzy Hash: 44311736605A80C6DB50EF29E84836D77B0FB88F98F684121EE8E87765CF3AC445C311
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2235982556.0000000140001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
        • Associated: 00000000.00000002.2235967278.0000000140000000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236001126.000000014001F000.00000002.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236014503.0000000140028000.00000004.00001000.00020000.00000000.sdmpDownload File
        • Associated: 00000000.00000002.2236026809.000000014002F000.00000002.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_140000000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseEventThread$CurrentHandleSwitchclosesocketshutdown
        • String ID:
        • API String ID: 3526870478-0
        • Opcode ID: 341751bcb2a9e39f1c64cda1b8c336d908026eaed392cb499eb77cff94f1bf09
        • Instruction ID: ee6b78ee20e75a199ac0f8d51655120480989cb093c4aabf2c1e140e6d99fe91
        • Opcode Fuzzy Hash: 341751bcb2a9e39f1c64cda1b8c336d908026eaed392cb499eb77cff94f1bf09
        • Instruction Fuzzy Hash: 51310BB6600A5082E762DF36E4507AD23A1E78CFE4F151221EF2A477E9CF34C885C740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorEventLastSelect
        • String ID:
        • API String ID: 1135597009-0
        • Opcode ID: 69ada47511ffae6a1b2352c791967df792aaf6681adecbb36eed45c614523dad
        • Instruction ID: 1ff8fc4c263abd575abc074a924706e0161ea17e8477869276eeff6f38470a15
        • Opcode Fuzzy Hash: 69ada47511ffae6a1b2352c791967df792aaf6681adecbb36eed45c614523dad
        • Instruction Fuzzy Hash: A9217CF2A01600C7F768AF75E49D37936F0E718B28FA40118CA99866D4CB7AC8D6CB44
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
        • String ID:
        • API String ID: 517548149-0
        • Opcode ID: 84a5488434b8dac386b9b2b17d419ada68844002088eb87c8cee20c73c3e860a
        • Instruction ID: 352cef112e1a38372de33ab777380b4ad4c511ccfa5f197b323044415088ec65
        • Opcode Fuzzy Hash: 84a5488434b8dac386b9b2b17d419ada68844002088eb87c8cee20c73c3e860a
        • Instruction Fuzzy Hash: 09212C3660AB84C6EB64AF21E85827A77F5F789FC4F584014EACA0BB54EF39C551C704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalDeleteSection$CloseCurrentErrorHandleLastObjectSingleThreadWaitfree
        • String ID:
        • API String ID: 3850363221-0
        • Opcode ID: 62b29d53877b0602228696265d4c3e16b8dba605d7c938668be82d41532a3494
        • Instruction ID: 6f9d9c2946dfac334f2846196d633b50ea3fdbbf9a84cdf4afe39504d6887d7d
        • Opcode Fuzzy Hash: 62b29d53877b0602228696265d4c3e16b8dba605d7c938668be82d41532a3494
        • Instruction Fuzzy Hash: A8314F32606B81E7EB04AF64E8982B973B4FB85760FA40625D7ED437A1DF7AC465C300
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLastValue$CurrentSleepThreadfree
        • String ID:
        • API String ID: 4106700288-0
        • Opcode ID: 57c3c7dc90d119b9a0a8397eb99df9ec0dc69960eb39fbd81eb1c175a554dc43
        • Instruction ID: c19ccc7fae677c1eac17c7acc688094af7b34efab6e92648387aa82885f61284
        • Opcode Fuzzy Hash: 57c3c7dc90d119b9a0a8397eb99df9ec0dc69960eb39fbd81eb1c175a554dc43
        • Instruction Fuzzy Hash: 84012C35613B41C7EF58BB65E46C73872F1BB48B94FA88224D9E6023D2EE3AD4459610
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$CallTranslator
        • String ID: MOC$RCC
        • API String ID: 3569367362-2084237596
        • Opcode ID: d98c30be7d4ee96f75737c1608306c21bbb9889ae77cccfa80ef6e71d2261ecd
        • Instruction ID: 6e1dbfebe50085e58a6e7a651d2022109fd5d327fda2509b7abd994b3d0268d6
        • Opcode Fuzzy Hash: d98c30be7d4ee96f75737c1608306c21bbb9889ae77cccfa80ef6e71d2261ecd
        • Instruction Fuzzy Hash: AE71BE30109B89CEE724BF54C0197FAB3F1FB80305F60066ED08587596EBB5E555C782
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_errno
        • String ID:
        • API String ID: 2288870239-0
        • Opcode ID: 782557a0797fb3a6741017a31a7857cbc3ea5258c35366068c63795a3bce058c
        • Instruction ID: fb47e338bd40752784372ec943d179e8c99e75a3fa6edda12454b10378059ec1
        • Opcode Fuzzy Hash: 782557a0797fb3a6741017a31a7857cbc3ea5258c35366068c63795a3bce058c
        • Instruction Fuzzy Hash: 0D71C071209A49CFEBA0EFA9D088B79B7E1FB68344F24455AD04DC7251DB36E882CB51
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
        • String ID:
        • API String ID: 3655708593-3916222277
        • Opcode ID: 83c6cd6e49ca538d7d131c925b60aeaacb1595a3ec71be27b79afc4806d71a20
        • Instruction ID: 49fe4a66955e3e964b746bbd3273b9172ad97b7757378870f40c36c687756a6c
        • Opcode Fuzzy Hash: 83c6cd6e49ca538d7d131c925b60aeaacb1595a3ec71be27b79afc4806d71a20
        • Instruction Fuzzy Hash: CA519030115B09CEFB58BF58C98A7B977E0EF84360F344259D896CB2D7D676CC518682
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$CallTranslator_amsg_exit
        • String ID: MOC$RCC
        • API String ID: 1374396951-2084237596
        • Opcode ID: 471e037796de8d08be6d3bded12a618713ec4ce7d55a937e88732922ae4a25f6
        • Instruction ID: 8a046d6ebdff373bf6f39c350a03a85da7a0aca2709381bfcb1529ad27df91c1
        • Opcode Fuzzy Hash: 471e037796de8d08be6d3bded12a618713ec4ce7d55a937e88732922ae4a25f6
        • Instruction Fuzzy Hash: C161BD72205A80C6EF20EB45D0A87BDB3B0FB85B8CF64451ADB8A476D9DF79C155C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free
        • String ID:
        • API String ID: 1294909896-0
        • Opcode ID: ccd28d9b9f54d451765389d19c9094d133687f5c0172ac4b6804d316aded8f02
        • Instruction ID: fca03c67da7c338a4418f8b574bc1adf2d1636cbcee27d3b826a88f8764a475b
        • Opcode Fuzzy Hash: ccd28d9b9f54d451765389d19c9094d133687f5c0172ac4b6804d316aded8f02
        • Instruction Fuzzy Hash: B451D13A202B84C5EBA4AF59E59437873B5F719F84F689051DB8E17351CF7AD8A1C310
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
        • String ID:
        • API String ID: 3655708593-3916222277
        • Opcode ID: 7b09e1906ab3bdf61c4e12b63eeb87704bb182e1eae830b71b365cf9be8a9ed8
        • Instruction ID: ac6ff20ff3884c74be4e123b99afe136dac818fd3723e7cccdb5624a7da4705f
        • Opcode Fuzzy Hash: 7b09e1906ab3bdf61c4e12b63eeb87704bb182e1eae830b71b365cf9be8a9ed8
        • Instruction Fuzzy Hash: FF41D272602A10C5EB68BF29D58937D37F0E754BA4F344214DAE9073E7DA3AC891C782
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo
        • String ID: P
        • API String ID: 2819658684-3110715001
        • Opcode ID: 660092e53c6da9f128799a28dcf114ab0748dcf5e7a35d96d3771f801f2aadb1
        • Instruction ID: 89f05a822ca6ffb7d3dfe278d949240b5e6b633dcb714aeff1fd08e20454cef8
        • Opcode Fuzzy Hash: 660092e53c6da9f128799a28dcf114ab0748dcf5e7a35d96d3771f801f2aadb1
        • Instruction Fuzzy Hash: 8331B33061AF4ACAF7A4BA6CD54933D76E0FB58320F740659A8D5C32D3D922CC414683
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$FreeHeapTimerWaitable_errnomalloc
        • String ID: bad allocation
        • API String ID: 996728788-2104205924
        • Opcode ID: 3164918fe516b5a880c1d5ebc565a3863ef63c33cab6ecf522e00527834a8d48
        • Instruction ID: 356fd42165daad703288465426987cab01f364a7e66f5a9a6387083661181182
        • Opcode Fuzzy Hash: 3164918fe516b5a880c1d5ebc565a3863ef63c33cab6ecf522e00527834a8d48
        • Instruction Fuzzy Hash: 32413836612B84C9EB64AF20E9586BC33B4F748B8CFA84125EE8D0BB59DF75C451C314
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo
        • String ID: P
        • API String ID: 2819658684-3110715001
        • Opcode ID: fe5746ab5c6c9aa6f367b9778bf255be9a480a7c147ea7114c03037db45542f8
        • Instruction ID: a706fc975fa35ca40613c0795290582a84bc29da3f91bc93ffc70254d67fab91
        • Opcode Fuzzy Hash: fe5746ab5c6c9aa6f367b9778bf255be9a480a7c147ea7114c03037db45542f8
        • Instruction Fuzzy Hash: 1721913120B780C1FB596A55D70837DB2F4AB65BE0F284620AEE917BC7E67A8D408702
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 00007FF7F7342961
        • SetWindowsHookExW.USER32 ref: 00007FF7F7342978
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00007FF7F7341B41), ref: 00007FF7F734298E
          • Part of subcall function 00007FF7F7319F50: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F7319F89
          • Part of subcall function 00007FF7F7319F50: FormatMessageW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F7319FE7
          • Part of subcall function 00007FF7F7319F50: LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF7F731A03E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast$CurrentFormatFreeHookLocalMessageThreadWindows
        • String ID: Qt: INTERNAL ERROR: failed to install GetMessage hook: %d, %s$default
        • API String ID: 2698278626-1575284884
        • Opcode ID: 029406882346d2b61cdb6a24368e8540b4e24a0623796e7308a3d706647215fa
        • Instruction ID: 0d24328d96702e354b0055263f952214f184ef0345b14c884221f76043cd0d8d
        • Opcode Fuzzy Hash: 029406882346d2b61cdb6a24368e8540b4e24a0623796e7308a3d706647215fa
        • Instruction Fuzzy Hash: D631B43AA0874293EB10EF25D841269B360FF85774F944235D96D836E5DF3DD446C790
        APIs
        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7F73828CE
        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00000000), ref: 00007FF7F73828EA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressProc
        • String ID: NetApiBufferFree$NetShareEnum$Netapi32
        • API String ID: 190572456-1465082781
        • Opcode ID: 9bb911bc9721b275ddb24e47c19060044229378845a87b2b70f2b0579deb2b24
        • Instruction ID: 41007ee7864196744f8ae8c82f70313360255499cbf09801453509ec56fc304c
        • Opcode Fuzzy Hash: 9bb911bc9721b275ddb24e47c19060044229378845a87b2b70f2b0579deb2b24
        • Instruction Fuzzy Hash: D3315E29E0CB8666FB65BB2CA814375E2A0BF41364FD80338D57D462E1DF7DA452C2A0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$ExceptionRaise_amsg_exit
        • String ID: csm
        • API String ID: 4155239085-1018135373
        • Opcode ID: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
        • Instruction ID: 4247dfab92c13dfb6b70fb46f636642dd0d12ab3a732333d284b1c7516c07161
        • Opcode Fuzzy Hash: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
        • Instruction Fuzzy Hash: 9E310936205640C6EB70AF11E06877EB370F7897A9F654226DEDA07BD5DB3AD846CB00
        APIs
        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F73FDF32
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7F73FDEAF,?,?,?,00007FF7F7405656), ref: 00007FF7F73FDFF0
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF7F73FDEAF,?,?,?,00007FF7F7405656), ref: 00007FF7F73FE07A
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2210144848-0
        • Opcode ID: 4ef2423508507acd93b22b965fa9d9501701fcc0e2be0087648db0337b251196
        • Instruction ID: 6f04a50aeeee94d207eb52c90a1a95c2f7b2f21b4173d48b78415940ee1f056a
        • Opcode Fuzzy Hash: 4ef2423508507acd93b22b965fa9d9501701fcc0e2be0087648db0337b251196
        • Instruction Fuzzy Hash: 3481A22AE1869266FF18BF25C4506FCA661AF84BC4FC40139DA3E537D5DE38A447C3A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_amsg_exit_errno_getptd$FreeHeapSleepmalloc
        • String ID:
        • API String ID: 3974019375-0
        • Opcode ID: 9d71ec3d00ad548f00efd10b57eac8e9f1b01416729eb742b15b8c3336629385
        • Instruction ID: 8c9323134197aa317954eabecaba6c3a3738a0b73f822b7eaf874d4c9d87849f
        • Opcode Fuzzy Hash: 9d71ec3d00ad548f00efd10b57eac8e9f1b01416729eb742b15b8c3336629385
        • Instruction Fuzzy Hash: 0151E332A02A80C6E7A4BB25E44837DB7B5F795B88F384116DADE473E6CB7AC441C710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLast
        • String ID: Main
        • API String ID: 1452528299-521822810
        • Opcode ID: 1c761e1382f4f4e8e21a5771b2742fd4ded768315d8239df106d7014fd1f2ec6
        • Instruction ID: 511ffe274263ad0addaeadc806f31280753588d9858850b374439b0235c5f5d1
        • Opcode Fuzzy Hash: 1c761e1382f4f4e8e21a5771b2742fd4ded768315d8239df106d7014fd1f2ec6
        • Instruction Fuzzy Hash: CB417932A02A44CBEB14EF25E89837E77B0F748B88F644065DBC947799DB39D852CB40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLastRead$mallocrealloc
        • String ID:
        • API String ID: 3638135368-0
        • Opcode ID: 75ed8e998ff67cc508f611bcc8a92760ada60573c1da8e9bb44137df954cd51e
        • Instruction ID: 176114623514f452784ab62c43888ce1bc50a5c28465bfbb0b4c3ccc25ae2fa3
        • Opcode Fuzzy Hash: 75ed8e998ff67cc508f611bcc8a92760ada60573c1da8e9bb44137df954cd51e
        • Instruction Fuzzy Hash: 88415B32206B84C7EB20AF16E89877AB7B0F748B94F584425DF8A07B65DF39E555CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWide$StringTypefreemalloc
        • String ID:
        • API String ID: 307345228-0
        • Opcode ID: f3b033eb96f0b46acd52094bac7bcbe4840888fbf3d9e53257aca99f9f803477
        • Instruction ID: c745fb480d0005fa471fa959188f4d3ec5b8c35e2b54e54865914266b4fa4ff4
        • Opcode Fuzzy Hash: f3b033eb96f0b46acd52094bac7bcbe4840888fbf3d9e53257aca99f9f803477
        • Instruction Fuzzy Hash: A3418232642780C6EB50AF26D8086B977F5FB48BA8F684611EEE947BD5DB36C401C710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Timer$Init_thread_footerKillMessagePostQueueStatus
        • String ID:
        • API String ID: 1136730382-0
        • Opcode ID: 2a1125463b9bebcfd2710457b2660daa4214678dcf78bf51705dfbb01ba5d737
        • Instruction ID: d2b2b0768b097d55959510fe21b75a323f4a8910d1329729da309d16b30018c6
        • Opcode Fuzzy Hash: 2a1125463b9bebcfd2710457b2660daa4214678dcf78bf51705dfbb01ba5d737
        • Instruction Fuzzy Hash: 3141B339A0869293EB55AF25E8417B9B3A0FF44B90F944039DE2D577D4DE3CE4838760
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_errno$AllocCreateHeapObjectSection_callnewhmalloc
        • String ID:
        • API String ID: 2034203143-0
        • Opcode ID: d3222581a7554e5581b8cf39a13de11888295550bf7cb58ccf28f3286197a644
        • Instruction ID: 2314a4637dc850f23fdaae25ccf4c9c8eefc409cbd80c2ae751e690138d4e5b0
        • Opcode Fuzzy Hash: d3222581a7554e5581b8cf39a13de11888295550bf7cb58ccf28f3286197a644
        • Instruction Fuzzy Hash: 1231AB33216680C2EB25EF22D4543BAB6F4FB88B88F584465EFC967B95DF79C8118700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLastlstrlen
        • String ID:
        • API String ID: 3322701435-0
        • Opcode ID: db64cf0f651dc086ab79881f73d20ca8596acb5f99de422b62a97399abafdd11
        • Instruction ID: a411c3b3cdb027aa4196a1b6ddaae1cedf3b3be3e2974e2c7f0b8a33205e3644
        • Opcode Fuzzy Hash: db64cf0f651dc086ab79881f73d20ca8596acb5f99de422b62a97399abafdd11
        • Instruction Fuzzy Hash: 3F319E36605B81C2E710AF56F88866BB7E5FB98BC4F284125ABC943F64CF39C5458B00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
        • String ID:
        • API String ID: 3456427917-0
        • Opcode ID: 79c14e7db4d2e84cf453b14f21dc6eac39ded45f04e70965ea2fc96844330a76
        • Instruction ID: 2d6a669ecbfc53dc8c2ddf8805a10056cb501be8fa8c970c5615469a934d0f72
        • Opcode Fuzzy Hash: 79c14e7db4d2e84cf453b14f21dc6eac39ded45f04e70965ea2fc96844330a76
        • Instruction Fuzzy Hash: 1C319D36625A84CAEB50EF24E8457BFB7B0FB99388F100215FEC946A58DF39C441CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
        • String ID:
        • API String ID: 513674450-0
        • Opcode ID: 7dd9ea1c87e4549bff250d1b923e95236c2df90eb6d5819fd71ae98f73500695
        • Instruction ID: 44e5cce7fcaef033796eaa23207a8fb02cd381534658a2ae220ff9aea01719f3
        • Opcode Fuzzy Hash: 7dd9ea1c87e4549bff250d1b923e95236c2df90eb6d5819fd71ae98f73500695
        • Instruction Fuzzy Hash: 4F316F32311A81CAEB24DF31E8987F933A4F748B8CF584026DA8A87B44DF39D645C750
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$__doserrno
        • String ID:
        • API String ID: 2614100947-0
        • Opcode ID: 99b79441b117c2156b15fee70a411776e79b9b80606a67e6e6752f694ee3bad7
        • Instruction ID: 51b865339ec542d67865d6ede8d7f1ddd14ba28aaeb85b6d6b9e1f0e6d1373b9
        • Opcode Fuzzy Hash: 99b79441b117c2156b15fee70a411776e79b9b80606a67e6e6752f694ee3bad7
        • Instruction Fuzzy Hash: 3721F930606A40CEF719FF68D99D3BD76F0EB45330F24452CE995872D3D76688408B62
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno
        • String ID:
        • API String ID: 2918714741-0
        • Opcode ID: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
        • Instruction ID: 7905ec708c4b1f38a03449fe0c56dc0f1a68825094e37bd30347f08b86531d71
        • Opcode Fuzzy Hash: e0a6f99f23bc9ffbc8dd80dba2f8abd9560bbbb3885de2e40a26830c9027ae13
        • Instruction Fuzzy Hash: 29219030455A88CFEBA0BB58E04A37473F0FB59315F300199E9D9C72A6D772DC418B82
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
        • String ID:
        • API String ID: 1909145217-0
        • Opcode ID: 17991c27d76004656ba42ca55b295eb408c37ea0a9db000b327a412a6d1edf3e
        • Instruction ID: cc932114d03dba963f8223fbfb09beef6ce86759f99e6741ba76422b44c77adb
        • Opcode Fuzzy Hash: 17991c27d76004656ba42ca55b295eb408c37ea0a9db000b327a412a6d1edf3e
        • Instruction Fuzzy Hash: E4212832303A44C5EB14BB61E94D27AB3F1B749B88FA44825DACE47759EE7AC485C704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLastgetpeernamegetsocknamehtonslstrlen
        • String ID:
        • API String ID: 1560998626-0
        • Opcode ID: c734a573ce7dfaef318db430d04840a229c3ced714760d5c3b5a73f40af316d9
        • Instruction ID: 825695d876fa97b62cadb1d64a4505ca5a636e4959982f3c9aa7f80a76912837
        • Opcode Fuzzy Hash: c734a573ce7dfaef318db430d04840a229c3ced714760d5c3b5a73f40af316d9
        • Instruction Fuzzy Hash: 4A218B76605780C6EB20AF15E48827D77F0F798BC1FA40126EBC983BA4DB39C955CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
        • String ID:
        • API String ID: 2067211477-0
        • Opcode ID: 9f3bf3b611a25fd9af20a1efec53b308f414e593c4ce8467026b1375e3291df5
        • Instruction ID: 0dde5e8e853d8dc1761056686fa3be287b11bffcb330f1510aca0e6775eea013
        • Opcode Fuzzy Hash: 9f3bf3b611a25fd9af20a1efec53b308f414e593c4ce8467026b1375e3291df5
        • Instruction Fuzzy Hash: DF217F2AA0978296EF0DEF65A4101F9E391AF94BC0F940438DA7D03BD5DF3CE412D6A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: FreeVirtual
        • String ID:
        • API String ID: 1263568516-0
        • Opcode ID: 1aa11bdb4510720bd8ad46d36d805cf89cd9d24c8924a76da2260b9335f5542b
        • Instruction ID: c18e2dae1fc04ac31a75e8cf0cadc93b078900fd6025551dec6c53196ef28374
        • Opcode Fuzzy Hash: 1aa11bdb4510720bd8ad46d36d805cf89cd9d24c8924a76da2260b9335f5542b
        • Instruction Fuzzy Hash: D121EA36312B00C6EB98DF66E54463973F9FF88F88F2481158E8943A68CF36C455C710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _set_statfp
        • String ID:
        • API String ID: 1156100317-0
        • Opcode ID: b438fef95e9de4e192e54f68da003bfb06ab1a0320ce8f8e52a96597e9ab0918
        • Instruction ID: 745a2fea003c3bbad25830015107c9ffc3cc9861d5a41a02fc7f99367a53a6b8
        • Opcode Fuzzy Hash: b438fef95e9de4e192e54f68da003bfb06ab1a0320ce8f8e52a96597e9ab0918
        • Instruction Fuzzy Hash: D011423AE18A0385F7583129D855B7DD141FF95372F880634EA7E0A2DAEE6CA84345F0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: setsockopt$ErrorLast
        • String ID:
        • API String ID: 1564866530-0
        • Opcode ID: 3616964d9e68d5e10b4d5a33af7c41ce66c25ecf9a3d6ccf82dd9a2d54687743
        • Instruction ID: 76f58f5077a17f2983a905ac7090501edab4d1e746fa7444bd14cb3d32f4657d
        • Opcode Fuzzy Hash: 3616964d9e68d5e10b4d5a33af7c41ce66c25ecf9a3d6ccf82dd9a2d54687743
        • Instruction Fuzzy Hash: FD114D71604986C7E7209F64E44837AB7B1FB957A4FA00625EBD806ED8CB7EC5498B04
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ObjectSelect$ColorCompatibleCreateDeleteTable
        • String ID:
        • API String ID: 3899591553-0
        • Opcode ID: 8947a06e24e96cbb16fea5535f0303150291ac82d5cc01e71dd39e0745be825e
        • Instruction ID: ddbf29b06d4d9bc70686c5d869271caf0db01707f2874eb141b8118b5d1f56c1
        • Opcode Fuzzy Hash: 8947a06e24e96cbb16fea5535f0303150291ac82d5cc01e71dd39e0745be825e
        • Instruction Fuzzy Hash: A7215436202A10C9EB55EF65E89873933B4FB58B98F245025DACA53B58CF37C881C380
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$EnterLeave
        • String ID:
        • API String ID: 3168844106-0
        • Opcode ID: 1f6a9fb51c2b84da157e2e3cd1e1033ba792cdd02042b8f3db644f72fc9350c0
        • Instruction ID: aa928e4b57c88b265664390d631a6abb636b762b1aa4e951001967ff6db64495
        • Opcode Fuzzy Hash: 1f6a9fb51c2b84da157e2e3cd1e1033ba792cdd02042b8f3db644f72fc9350c0
        • Instruction Fuzzy Hash: 94110A36625A41C3EBA0AB21F4983BA73B0F748751F941161DBCB46A60DF3ED8CAC700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
        • Instruction ID: 9247d04c9c89bf833569ae0cfe48cde865d00567b15116e4133d2777dbb6eef2
        • Opcode Fuzzy Hash: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
        • Instruction Fuzzy Hash: 0301F470127888CEF359BB64C94D3F876B0FB01339FB54354E595872E3CB7A84508622
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
        • String ID:
        • API String ID: 1445889803-0
        • Opcode ID: 087ee9406ee3a35d804722b5ad4831615591c4c9cb0efb3c3ae35d0179c68e7c
        • Instruction ID: 948401a4afa2335e1963e75da46456e1f51b2ba215da78ddf30e76fce24c958d
        • Opcode Fuzzy Hash: 087ee9406ee3a35d804722b5ad4831615591c4c9cb0efb3c3ae35d0179c68e7c
        • Instruction Fuzzy Hash: 1501C031666A00C6EB40EF21F84837673B0F758B90FA42520EEDE07BA0CB3EC9948710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: __doserrno_errno
        • String ID:
        • API String ID: 921712934-0
        • Opcode ID: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
        • Instruction ID: 0e48dd4ba43591b69baad390295b41c610bc7d032304d47c0e09142d4cc7f6eb
        • Opcode Fuzzy Hash: 6757352e70f42596cca19de4ec5f347dbdabdcc3122fab71287a82e6dbf43f1a
        • Instruction Fuzzy Hash: D701DC72616604C4FF493B68C99A37C36B09B91BB6F704320C5ED023E3D6AE8400821A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: swprintf
        • String ID: :$@
        • API String ID: 233258989-1367939426
        • Opcode ID: aa3c12b0f75a9633f1606798e54ea64259bcbeae9b44ae6a6ec7170fd715e250
        • Instruction ID: d22a5f1c90a00c53ab219205a38c26ed5668a002a1892abfee1501241acfa59f
        • Opcode Fuzzy Hash: aa3c12b0f75a9633f1606798e54ea64259bcbeae9b44ae6a6ec7170fd715e250
        • Instruction Fuzzy Hash: 41414E7151CB488FD768EF18D485B6AB7E4FB9A300F50061EE98EC3252EB35D446CB86
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressCriticalEnterInit_thread_footerProcSection
        • String ID: SHGetKnownFolderPath$shell32
        • API String ID: 3050242151-1045111711
        • Opcode ID: 2781453f8c16aefac335e9e8166fe62accc3f6a5c6ed498f4cfd73c8d39d4c5b
        • Instruction ID: 926b8cf04ec2dfb205d155b1863c440a29f7a10d65634703dc05eb0dfd182d2e
        • Opcode Fuzzy Hash: 2781453f8c16aefac335e9e8166fe62accc3f6a5c6ed498f4cfd73c8d39d4c5b
        • Instruction Fuzzy Hash: 33517436A09A8196E750EB1CE840379B3A0FB85794F940239E6AD837D5DF3CD442CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: EnumErrorEventEventsLastNetworkReset
        • String ID:
        • API String ID: 1050048411-3916222277
        • Opcode ID: a43ef72c0ef5dea547670d24ae46d00b54fdd337623529927378a7758b4313cd
        • Instruction ID: 20309c7d6235b9519d2889a37a433dca425384376288c244be262807a81d46d5
        • Opcode Fuzzy Hash: a43ef72c0ef5dea547670d24ae46d00b54fdd337623529927378a7758b4313cd
        • Instruction Fuzzy Hash: AA519A72901600C6F368EF26D40837E77F1E788B8CF250115DAC94339ACB7AC9558B81
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd
        • String ID: csm
        • API String ID: 3186804695-1018135373
        • Opcode ID: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
        • Instruction ID: b13d31674361ccad8af39f02553cf2fed0e0189dcd685813b7163c562cb93f61
        • Opcode Fuzzy Hash: cc0bd05e74b97bf011ab24d669f4709e412a339efcd8783e4d18e3893dc3c893
        • Instruction Fuzzy Hash: 90315A30109B44CBEB68EF08C495BB9B3F0FB58311F24062DD4CA83682D772E946CB86
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_fltout2_invalid_parameter_noinfo
        • String ID: -
        • API String ID: 485257318-2547889144
        • Opcode ID: 3ee52a3a24785a7fc091806b0d958f2a81b7a6cfbcf0ce8e670c4bd10c065dff
        • Instruction ID: 63e4014429150872253b3bcc768a73cde988deca152896db66e3b7f3c8143ea9
        • Opcode Fuzzy Hash: 3ee52a3a24785a7fc091806b0d958f2a81b7a6cfbcf0ce8e670c4bd10c065dff
        • Instruction Fuzzy Hash: DB31D832305A84C5EB20AF66E4487BAB7B0A755BD8F344112EED947BD6DB2AC445C710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfo
        • String ID: 1
        • API String ID: 2819658684-2212294583
        • Opcode ID: e42cd22b66c2c710ae5e79c5bbbebf2e77b3ed4b785cd6836f41a57508a0d04c
        • Instruction ID: 5e3e1a2d12a941fd896e606cf8b67d51513aa8caa23425820d7c740c0bbbd0c1
        • Opcode Fuzzy Hash: e42cd22b66c2c710ae5e79c5bbbebf2e77b3ed4b785cd6836f41a57508a0d04c
        • Instruction Fuzzy Hash: 52216F3221B6E0D5FBE6AB28C45837C7AF4AB45B84FB9C451D6D6062D3E62B8940C711
        APIs
        Strings
        • struct HWND__ *__cdecl qt_create_internal_window(const class QEventDispatcherWin32 *), xrefs: 00007FF7F7343532
        • %s: CreateWindow() for QEventDispatcherWin32 internal window failed, xrefs: 00007FF7F7343539
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Window$CreateInit_thread_footerLong
        • String ID: %s: CreateWindow() for QEventDispatcherWin32 internal window failed$struct HWND__ *__cdecl qt_create_internal_window(const class QEventDispatcherWin32 *)
        • API String ID: 2938593978-1541743766
        • Opcode ID: eda67fbf92e630d0c72160588c332b7d3a44e1f2591f00d15a80d56d91615364
        • Instruction ID: cf2fff60cb4f6f5fe51fadc4e3b10f71cdb57a7e79e8eb1071ffd855d8daf09d
        • Opcode Fuzzy Hash: eda67fbf92e630d0c72160588c332b7d3a44e1f2591f00d15a80d56d91615364
        • Instruction Fuzzy Hash: 63116B35A1C69183E7519F29F84106AA6A0FB44BE0F940239EBBD537D9DF7CD4428B90
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID: QT_FATAL_CRITICALS$QT_FATAL_WARNINGS
        • API String ID: 0-1785144594
        • Opcode ID: 31495e7dcf0985454016301e3335c3f448df0f4c99aa0aa242f01e66ea667f80
        • Instruction ID: 496a15871d31d103b5ca9c5f711b795634245eebb7bb400a2a2e909b981d1af9
        • Opcode Fuzzy Hash: 31495e7dcf0985454016301e3335c3f448df0f4c99aa0aa242f01e66ea667f80
        • Instruction Fuzzy Hash: F1214B68D095C2A6FB50BB1CAC800B4A350AF69361FE0027AC13D472F1DE6CB56787E0
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
        • String ID: bad allocation
        • API String ID: 2837191506-2104205924
        • Opcode ID: 15ab1da4c976b5a443b990e10891d2bdf45618e1db579182d28fa9cee56dbbac
        • Instruction ID: 48a7515c7c93b3f42227225773168b1c81c6106fb0d168571401fc3b47f2360a
        • Opcode Fuzzy Hash: 15ab1da4c976b5a443b990e10891d2bdf45618e1db579182d28fa9cee56dbbac
        • Instruction Fuzzy Hash: 6C0129B5643B05D1FB11FB20F8597B573B0B759388FA41425DACE466A2EB3BC249CB10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: 37056db6683098725aff1277900d26c7f0a8d787be9077936edb7e7a0fbe72ea
        • Instruction ID: 2639efe35a299ba719d3a84e67eac0883d878bfe7c2a6c0eeaf38cac13e0eebe
        • Opcode Fuzzy Hash: 37056db6683098725aff1277900d26c7f0a8d787be9077936edb7e7a0fbe72ea
        • Instruction Fuzzy Hash: 7FF04F19F0C58292E754BB35EC112B893506F807B0FA50335D93E421E2DE6CE84796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: 1c009da80423eb9776ad27b4896bc7a3d78086aba397a6fdea3ffa2447fc16ef
        • Instruction ID: 3c465c06b08433ea833bdd46609d3cc2d7f94bc434e412abf03afd9282e62a72
        • Opcode Fuzzy Hash: 1c009da80423eb9776ad27b4896bc7a3d78086aba397a6fdea3ffa2447fc16ef
        • Instruction Fuzzy Hash: E0F04F19F0C58292E754BB35EC112B893506F807B0FA50335D93E421E2DE6CE84796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: 738b75d211e5ce6c5a6eb55f8bdd90dc21dfe2866fd69c22f6834b402a36fb24
        • Instruction ID: 2c2cd7caed0127bb1bf7d69258368d93a2a7734e7b6ca28da782deac4a493a54
        • Opcode Fuzzy Hash: 738b75d211e5ce6c5a6eb55f8bdd90dc21dfe2866fd69c22f6834b402a36fb24
        • Instruction Fuzzy Hash: B8F06229F0C58292E754BF35EC112B893507F807B0FA50335DD3E421E2DE6CE84796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: ba23d353b47921fc19f649bdb096968185609f198af8a22fc68cd0ba66401e9a
        • Instruction ID: 96686c58c1aaaf9a5dcd820a2088d6faf4885ef4ccfb60fcca458b3a7230e86a
        • Opcode Fuzzy Hash: ba23d353b47921fc19f649bdb096968185609f198af8a22fc68cd0ba66401e9a
        • Instruction Fuzzy Hash: 02F06229F0C58292E754BF35EC112B893506F807B0F950335D93E421E2DE6CEC8796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: 98667de634df17e3002f528c503baf9fd399360d270cee6032a1187459161a2c
        • Instruction ID: 85998d3c59f026e6c52becca854c88d7d77cad80e473fe06191b43565abed2bf
        • Opcode Fuzzy Hash: 98667de634df17e3002f528c503baf9fd399360d270cee6032a1187459161a2c
        • Instruction Fuzzy Hash: E9F06219F0C58292E754BF35EC112B99350AF807B0F950335D93E421E2DE6CEC8796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$Init_thread_footerPriorityResume
        • String ID: QThread::start: Failed to resume new thread$QThread::start: Failed to set thread priority
        • API String ID: 3594913340-1828396829
        • Opcode ID: 68c966794d45a26bc0ce352807e4506a2a3e803fc2058c9121001f91d073ba25
        • Instruction ID: 5a58fc87679fa3b2f94f15bc783f26ac40a22e533c99dd55b3c408793a3f237b
        • Opcode Fuzzy Hash: 68c966794d45a26bc0ce352807e4506a2a3e803fc2058c9121001f91d073ba25
        • Instruction Fuzzy Hash: 6EF06219F0C58292E754BF35EC112B893506F807B0F950335D93E421E2DE6CEC8796A1
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 1646373207-1276376045
        • Opcode ID: 616ddb4d295f18e0d5ebf620ba6ad7aac28a66247e066f97f832725591873133
        • Instruction ID: 07bab7ee3f8e71c460b5896b841f17aa7d5b60f4d31ebaa9c42ea613d8c37b36
        • Opcode Fuzzy Hash: 616ddb4d295f18e0d5ebf620ba6ad7aac28a66247e066f97f832725591873133
        • Instruction Fuzzy Hash: 41E01231B13604C2FF597B91E8AC73533F1AB48700FA8142885DE06390EE3AC959C310
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: swprintf$_errno_invalid_parameter_noinfomalloc
        • String ID:
        • API String ID: 3059695456-0
        • Opcode ID: 83e036968b326672d0b92e37a96612a69de521473cdec3eb1b53c30150c31c59
        • Instruction ID: 2baa3f194b860810099ae560b4e449a7e4cdb0089096ef0c063c1194f7358fd9
        • Opcode Fuzzy Hash: 83e036968b326672d0b92e37a96612a69de521473cdec3eb1b53c30150c31c59
        • Instruction Fuzzy Hash: 82C18631218A48CFEB98FB1CD4997B573E2FB98311F204569A49EC7393DA39D906C781
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4dffe288ca264538c5c7c083a689d4f4f3ccceafdf2d5e5b341118a0687c4bba
        • Instruction ID: 77c68a036669a2c612b9dee76d97f064f418ab942190d38b4a7eb317dda26235
        • Opcode Fuzzy Hash: 4dffe288ca264538c5c7c083a689d4f4f3ccceafdf2d5e5b341118a0687c4bba
        • Instruction Fuzzy Hash: 20A1B330619F8DCBE768FF59D4897BAB3E1FB99301F64052ED48AC3251DA32D8458782
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWide$ErrorLastlstrlen
        • String ID:
        • API String ID: 3322701435-0
        • Opcode ID: 0f019e937948a6d47832e34f67adf2063f94cc7fb04caa044bbf51efa6f953eb
        • Instruction ID: 47b8e28ea05ad26ea0f273ab0b1d4607c097f1e83bee6adb7354c35f38695a23
        • Opcode Fuzzy Hash: 0f019e937948a6d47832e34f67adf2063f94cc7fb04caa044bbf51efa6f953eb
        • Instruction Fuzzy Hash: 3C218D36705B81C2E724ABA6F44876BB7A1F788BD8F948025AEC843B64DF7DC5498700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$Heap$FreeProcess
        • String ID:
        • API String ID: 3493288988-0
        • Opcode ID: e74aae544f5a46ba22eee78589248f0f87bde554db02cbcf63cd116665f5f2e6
        • Instruction ID: 9f364c041fe2b0887a09b836d9776d9505ef98dd9bf68bfd5b09f357b07b972c
        • Opcode Fuzzy Hash: e74aae544f5a46ba22eee78589248f0f87bde554db02cbcf63cd116665f5f2e6
        • Instruction Fuzzy Hash: 57311836712A50D2EB58AB66E59477E73B0FB89F80F184061EF8A13B95CF36D4A18700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalErrorLastSection$EnterLeave
        • String ID:
        • API String ID: 2124651672-0
        • Opcode ID: e5f5a7a0dc5c8876328b0cc5bc067911a8c5247e3853157b53872c7db5139999
        • Instruction ID: 2d35f52f5a5b7be902270771a7414116982bfb10f5e2d764650ec88c3bffa0f2
        • Opcode Fuzzy Hash: e5f5a7a0dc5c8876328b0cc5bc067911a8c5247e3853157b53872c7db5139999
        • Instruction Fuzzy Hash: 26011231B15A44C3EB546B65F45937C32B1F789B64FA81220DABA47BD1DF3AC4A58700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: std::bad_exception::bad_exception$Concurrency::cancel_current_task
        • String ID:
        • API String ID: 208461638-0
        • Opcode ID: 73a7ac148250d6fe23e634dcb3216ee3d6b184c37dc2c70ddf0f85e991ab9da2
        • Instruction ID: f3be1bd9299734169725f004791db92c433addf70d577e1a3592e4ad62f53066
        • Opcode Fuzzy Hash: 73a7ac148250d6fe23e634dcb3216ee3d6b184c37dc2c70ddf0f85e991ab9da2
        • Instruction Fuzzy Hash: 28A10F3990AB8297EF59BB55A4117B9A2D4BF46740FC5403CD6AD0B3C6EF3CE40687A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfoiswctype
        • String ID:
        • API String ID: 248606491-0
        • Opcode ID: aad8be474cf42d8bda1240b94c4801284bb18eb27a84c17ce0c255e9d8952077
        • Instruction ID: 5e6f61b130f12ecb0113073d0082967257e2d0025c65fe9d61678c5210833761
        • Opcode Fuzzy Hash: aad8be474cf42d8bda1240b94c4801284bb18eb27a84c17ce0c255e9d8952077
        • Instruction Fuzzy Hash: FF51393280E699C5FB783A99D88E3BA31F5E791350F341219EDE6C71C1E663C8464DA2
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_invalid_parameter_noinfoiswctype
        • String ID:
        • API String ID: 248606491-0
        • Opcode ID: 8990e4657c5db3c90a51578a81b61c88cef929f9a05e6dfaeb4bfedc03f5f406
        • Instruction ID: 6e6ed060f9fea60f6941b11ac8c99854b78f2f849b92cbf20ac9b11d68378af6
        • Opcode Fuzzy Hash: 8990e4657c5db3c90a51578a81b61c88cef929f9a05e6dfaeb4bfedc03f5f406
        • Instruction Fuzzy Hash: B351E3729C2131C5FBB43A2AD80E3BE31F5A74175CF354712DED2421C5E67B898D8252
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$BaseImage
        • String ID:
        • API String ID: 2482573191-0
        • Opcode ID: 825492a4e877475194c45bc95f10e965864965674adb443cf1176bdd3bc0c523
        • Instruction ID: b7d4bc890bc482e8741d18af41ffc2f8ea1df463231de22d4c3af87dd7901e15
        • Opcode Fuzzy Hash: 825492a4e877475194c45bc95f10e965864965674adb443cf1176bdd3bc0c523
        • Instruction Fuzzy Hash: 9541F53511AA84CAF3187768D40E3F932F0FB84716F34466EE0C6D71E7E676E9468291
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
        • String ID:
        • API String ID: 3655708593-0
        • Opcode ID: b349563767bf30984f60fe2376425b3a494ca1bdbea446b70009405771458297
        • Instruction ID: caaceae12ecd9b61c3dffd26591ed8a2360398d16450b2c89f16c57e4e173d76
        • Opcode Fuzzy Hash: b349563767bf30984f60fe2376425b3a494ca1bdbea446b70009405771458297
        • Instruction Fuzzy Hash: 3D519070115A88CFEB98BF2CC4897BA77F0EB59310F240259E896CB3D6D676CC418781
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ByteCharMultiWide
        • String ID: Network$X64
        • API String ID: 626452242-3809260122
        • Opcode ID: 23ae036aa3b1d2709e1c4a854c1d6364a8d361c4d22c79d840b97e812a5fc968
        • Instruction ID: 70825e18ca36ba9d77127d8a366d3e603a72fb83f6a14ec503f3d981c7f63b18
        • Opcode Fuzzy Hash: 23ae036aa3b1d2709e1c4a854c1d6364a8d361c4d22c79d840b97e812a5fc968
        • Instruction Fuzzy Hash: 73518E32214A84D5E750EB65E8452EEB7B1F7847B4FA00317FABA56AE9CF39C145CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateInstance$InitializeUninitialize
        • String ID:
        • API String ID: 1701838895-0
        • Opcode ID: cd67ddf5dae77c640e0d9ee24c34f1a23b683f0c5909ce805016218ca2d8fa47
        • Instruction ID: 65d37ac4251c774883fadbcdcdca4a0a63353bfd0585bb2b87509ae3234b3dee
        • Opcode Fuzzy Hash: cd67ddf5dae77c640e0d9ee24c34f1a23b683f0c5909ce805016218ca2d8fa47
        • Instruction Fuzzy Hash: B751847A618A8193EB10EF15E84026AB361FF88B94F904139DB6D437D4DF7DD446CB90
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo$_getptd
        • String ID:
        • API String ID: 1297830140-0
        • Opcode ID: 5c3f2eb0de4ecc964b19cd037dcff679cc0c5f13b20e04879b55f5937233c062
        • Instruction ID: ba053c2fb8a42552e6512da084294b65b9cb0fb8f7967248688711fc4d741c0d
        • Opcode Fuzzy Hash: 5c3f2eb0de4ecc964b19cd037dcff679cc0c5f13b20e04879b55f5937233c062
        • Instruction Fuzzy Hash: 1B41BF32216790C6EB61EF29D1883BD7BB0E785BD8F644121DBCA43BA6DB39C845C740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
        • String ID:
        • API String ID: 3655708593-0
        • Opcode ID: b349563767bf30984f60fe2376425b3a494ca1bdbea446b70009405771458297
        • Instruction ID: 804a139027b7999ef8025f2b40f13ba7d6fc8083fb5dd6ab1ee29171ec094578
        • Opcode Fuzzy Hash: b349563767bf30984f60fe2376425b3a494ca1bdbea446b70009405771458297
        • Instruction Fuzzy Hash: 7641A272612B00C6EB98AF28D49937D37B0E785BE8F344216DAE5473D5DA3AC851C780
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd$BaseImage_amsg_exit
        • String ID:
        • API String ID: 2306399499-0
        • Opcode ID: 35e29d8fd6bc9845a79005a57f687935efa70cb60b342af0ce20e08c547ff475
        • Instruction ID: 2d8cf89c0c40c248ac6b37f9645482463dd71812c076a2d077fbb876301ff161
        • Opcode Fuzzy Hash: 35e29d8fd6bc9845a79005a57f687935efa70cb60b342af0ce20e08c547ff475
        • Instruction Fuzzy Hash: DD419232602A45C2EB34BB55D4993BD7BB1EB81BACF758221DED9437E2DB36C4468301
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_getptd_invalid_parameter_noinfofree
        • String ID:
        • API String ID: 4053972703-0
        • Opcode ID: eb459f4d2d885252ac1ae88e9d454fcfe944fcaddc80240c982663ec9209a165
        • Instruction ID: 28aba19a00593ea13b9db4ade70bf0e4a4976a55933a6a34031ca2f782326332
        • Opcode Fuzzy Hash: eb459f4d2d885252ac1ae88e9d454fcfe944fcaddc80240c982663ec9209a165
        • Instruction Fuzzy Hash: 31218B30609F49CFE754FBA9D45E77A77E0EB98311F10062EA499C33A2DA61D8418B82
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalSection$Leave$EnterEvent
        • String ID:
        • API String ID: 3394196147-0
        • Opcode ID: feb78f70b4df6414eb21c9ecdb35b5c2724385254891411f69aab51776cc5172
        • Instruction ID: 6db505c5169a07347fbab80114fc1e29b6ba02af25f6a06233b4f3c37aee5604
        • Opcode Fuzzy Hash: feb78f70b4df6414eb21c9ecdb35b5c2724385254891411f69aab51776cc5172
        • Instruction Fuzzy Hash: D0210732201B80C3D718DF29E5882BDB3B4F788BA4F644225DBAA87774DF35D8A18700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CriticalDeleteSection$Freefree
        • String ID:
        • API String ID: 1250194111-0
        • Opcode ID: 895ab2ec1fe574897f2a59e2529e51965fc67142c4c41bc2158851cfbd195e4a
        • Instruction ID: 3384dd2b6155041ed5de81373a2dac2112a768fb6e889691bbadbb7343e1e640
        • Opcode Fuzzy Hash: 895ab2ec1fe574897f2a59e2529e51965fc67142c4c41bc2158851cfbd195e4a
        • Instruction Fuzzy Hash: 03117032A03A80CAFB55AF51F84C37873B0F754BA9FB84110DAE5066A5CF3AC891CB50
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Heap$Destroyfree$Create
        • String ID:
        • API String ID: 2478812866-0
        • Opcode ID: 0a4b86de96d23adba954d842b9e5b68399cc0f510354a5343c41260661051d6d
        • Instruction ID: 26c8cec5914ef15214fd36a80e9440ebe63f6718cae230cc48fd69a03820d60d
        • Opcode Fuzzy Hash: 0a4b86de96d23adba954d842b9e5b68399cc0f510354a5343c41260661051d6d
        • Instruction Fuzzy Hash: D3017176212B40CAEB44EF71E49423973B4FB44FA8F248614DE9A076A8CF39C890C750
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Thread$CurrentErrorExitLast_freefls
        • String ID:
        • API String ID: 217443660-0
        • Opcode ID: 5f66bd7f545b5964a83d9e571df25c32621f8b99ae5f15c0ae7904e1522f0d0e
        • Instruction ID: 5b1eec61787c5e8c17f7c60570cd55c5b30e63da1656a0b65759cd277f47a1f0
        • Opcode Fuzzy Hash: 5f66bd7f545b5964a83d9e571df25c32621f8b99ae5f15c0ae7904e1522f0d0e
        • Instruction Fuzzy Hash: 3301C431602B46C6EF84BB71D45D7BD32F5AB18BC8F74443499DE47386EE2B88448311
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateThread$ObjectSingleSleepWait
        • String ID:
        • API String ID: 1183137808-0
        • Opcode ID: 2b652301547513394443e9f97cfd61dfc27d7781a9a24f35fd08fa08d1a6b0cc
        • Instruction ID: d5ebffae3fb02ac8dd5f4708fccd28309fb0657a8231c9f01b03ec41babb4e49
        • Opcode Fuzzy Hash: 2b652301547513394443e9f97cfd61dfc27d7781a9a24f35fd08fa08d1a6b0cc
        • Instruction Fuzzy Hash: 66F06D32A05A40C2EB24AF31F85967A77F1F7C8748FA44216EADA06AB4CF3DC1558A04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd
        • String ID: csm$csm
        • API String ID: 3186804695-3733052814
        • Opcode ID: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
        • Instruction ID: 98c3d0b4481e6d63c945f7ec9473929c6f720aaf4de4fe105ec9912eeec6a6a3
        • Opcode Fuzzy Hash: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
        • Instruction Fuzzy Hash: D4615E3060AA98CBEBA4AF58C0A977973E1FB58311F74416DD4CAC72D5DB31D881C786
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Path$LongNameTemp
        • String ID: C:/tmp
        • API String ID: 730912879-4167066228
        • Opcode ID: 83439be4317a1c61e43b9cbe7d8e863dedc4cfdc833063ea0791e58a1257d570
        • Instruction ID: 7710904380910febc8419dba7c044c5421d7ad9a0fd57ce8ff8bc30a129c4912
        • Opcode Fuzzy Hash: 83439be4317a1c61e43b9cbe7d8e863dedc4cfdc833063ea0791e58a1257d570
        • Instruction Fuzzy Hash: C6919277A08A8197E720AF15D450269B3A0FF84BA4F944235DAAD877E4DF3CD847CB90
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ClassRegister
        • String ID: %s: RegisterClass() failed$__cdecl QWindowsMessageWindowClassContext::QWindowsMessageWindowClassContext(void)
        • API String ID: 2764894006-1290848616
        • Opcode ID: 70229b2911cac80b679d5468395164f5b932432c6456549db484ff30615120df
        • Instruction ID: 1f1583ea119db73e07e8522dd3241ae3b97e04495d08b4cb5808b2c480e09b43
        • Opcode Fuzzy Hash: 70229b2911cac80b679d5468395164f5b932432c6456549db484ff30615120df
        • Instruction Fuzzy Hash: 3B71B536B09A819BEB14EF39D8911ACB3B0EF447A4B504239DA2D87AD5DE38D413C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _amsg_exit_getptd
        • String ID: csm$csm
        • API String ID: 4217099735-3733052814
        • Opcode ID: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
        • Instruction ID: 5f8a3dab1de8249a8301e20d94a327e47f8957ca7fd922c92d1fa98adcf29276
        • Opcode Fuzzy Hash: 7e8e174ab0f273131100006893f629f4bc2b8ef3f7f9a6985eb2b96e491aa145
        • Instruction Fuzzy Hash: FE51DF32206290C6EB74AF65D14837D77B0F349B8CF648125DED957B86CB3AC891CB06
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID: -
        • API String ID: 2959964966-2547889144
        • Opcode ID: 8a07b590ae617312092e8962cd440cdcb98ac0e38d795e7c313dfeba10ba302d
        • Instruction ID: f40695d04994f8c11087b35f8de885841b8b25a60610eba3a3a65d78a3d40738
        • Opcode Fuzzy Hash: 8a07b590ae617312092e8962cd440cdcb98ac0e38d795e7c313dfeba10ba302d
        • Instruction Fuzzy Hash: 3541D831219A88CFE755FB2CD4897BA77F1EB99354F20462EE8CAC32C1DA22C8454743
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo
        • String ID: e+000$gfff
        • API String ID: 3215553584-3030954782
        • Opcode ID: 0f2dbf502fb50cc3c9119360ffe868a7f7c1b9d889f18b21b2ea719df869edc6
        • Instruction ID: 43241d79b947655aeced519c339ee083ae991cb22210287cdffacebc7796454c
        • Opcode Fuzzy Hash: 0f2dbf502fb50cc3c9119360ffe868a7f7c1b9d889f18b21b2ea719df869edc6
        • Instruction Fuzzy Hash: FD513866B186C286EB259F3598403A9EB91EB41BD0F889235D7BC47BD5CE2CE046C750
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Init_thread_footer
        • String ID: QCoreApplication::applicationFilePath: Please instantiate the QApplication object first$default
        • API String ID: 1385522511-1195541078
        • Opcode ID: 06e3373bd0cf0de3971f7f336e6d5dd1eaadc2dca8628431f20a1437d26f4a2b
        • Instruction ID: 9e00e10bc899efe732e0aa1e81244fcaa6126db8bd61ae5aaf3acf4a1730e6f2
        • Opcode Fuzzy Hash: 06e3373bd0cf0de3971f7f336e6d5dd1eaadc2dca8628431f20a1437d26f4a2b
        • Instruction Fuzzy Hash: DA514239E09A91D2EB50EB29D480279B361FF847A0F905135DA6D873E5DF3CE452C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CloseHandlemallocwsprintf
        • String ID: %s_bin
        • API String ID: 2399101171-2665034546
        • Opcode ID: 0a69d819fd656596b93c855f7e1b851c5acc7014e10a6c2c838e2f35afa1a01a
        • Instruction ID: 18452daf1887b566c7872ec9766217cb1fff2c0d81b99d17c52a6f8e71ada500
        • Opcode Fuzzy Hash: 0a69d819fd656596b93c855f7e1b851c5acc7014e10a6c2c838e2f35afa1a01a
        • Instruction Fuzzy Hash: 9341BE76702684C2EB64FB26D4587BA77B1EB89BC8F648115DE9E037D2DA3BC544C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: fd5550cb344639488e59e975bf7c83b31fce18860d2481271e35627b1b3623d5
        • Instruction ID: 392a3a6f515631c79b5191b00857129c64455840c88be1af2f8c0bf8130059eb
        • Opcode Fuzzy Hash: fd5550cb344639488e59e975bf7c83b31fce18860d2481271e35627b1b3623d5
        • Instruction Fuzzy Hash: C241A327628A8592DB10AF25E4583E9A7A1FF887D4F804135EE5D87798DF3CD402C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID: -
        • API String ID: 2959964966-2547889144
        • Opcode ID: c509db6e2127a862873f146b9b3d7d83ca6d8aba37a91d2db03c05197ceee07f
        • Instruction ID: 627fbd8cbc8f04bb2b93f15da080b91e039a31445fe3e812fc6ea6d1c346a067
        • Opcode Fuzzy Hash: c509db6e2127a862873f146b9b3d7d83ca6d8aba37a91d2db03c05197ceee07f
        • Instruction Fuzzy Hash: B821D831218A88CBD754FB68D8857BA73F1FB98310F64452EA4CAC32C1DE26C8454742
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID: B
        • API String ID: 2959964966-1255198513
        • Opcode ID: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
        • Instruction ID: 038b156b028fc37ba65d0da1aecc128f9dee65aa4d28b2cad3dea2fddec66074
        • Opcode Fuzzy Hash: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
        • Instruction Fuzzy Hash: ED21D43021DB88CFD754FF58C48977977E1FB98321F60066EA499C32D2CA75C8448782
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID: I
        • API String ID: 2959964966-3707901625
        • Opcode ID: a2e5181514195cdc91507144e00db8c737aca040fdae64f2d7fa568e57d83979
        • Instruction ID: 9ae99d4d724bd9fcc026a6d0a3e501372e1031b61c8d8a269f41dba4bb15c3f4
        • Opcode Fuzzy Hash: a2e5181514195cdc91507144e00db8c737aca040fdae64f2d7fa568e57d83979
        • Instruction Fuzzy Hash: 55117C70519B4CCFD794FF58D48977A76E1FB98325F20076EA499C32E1DA35C8448B82
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: swscanf
        • String ID: %d.%d.%d.%d%c
        • API String ID: 3616590096-2398565245
        • Opcode ID: c43af12d048c2140f8e3e2782bbf25f93f865edb1df4d58d990b40a747d97f95
        • Instruction ID: f2aecec56f175e3f031fcb67fb6e51a787701b42b6da8a7e365af378ee13d63c
        • Opcode Fuzzy Hash: c43af12d048c2140f8e3e2782bbf25f93f865edb1df4d58d990b40a747d97f95
        • Instruction Fuzzy Hash: 28116372706A41C6FF14EB24E4953BAB3B0EB95758FA40022EACE46695DB7EC481CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd
        • String ID: csm$csm
        • API String ID: 3186804695-3733052814
        • Opcode ID: 48bc1373a0cf7fa20b60edcf05be31b4cb9f1640bae482645bfd625d32f457a4
        • Instruction ID: 24b4299f7b15daf685d43069d1a8f727d701ad4d4d22d25d76c43ac5bed2f300
        • Opcode Fuzzy Hash: 48bc1373a0cf7fa20b60edcf05be31b4cb9f1640bae482645bfd625d32f457a4
        • Instruction Fuzzy Hash: DF31AA73105704CAEB609F65C0943AC3BB5F359BADF961215EA8D1BB58CB76C8C1C784
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ObjectSingleWait
        • String ID: QWaitCondition::wait: Cannot wait on recursive mutexes$default
        • API String ID: 24740636-2009005735
        • Opcode ID: 146604afdf875c87d0d0e0ef66d7f3da82025842baf9707a1a8bbcafb69421db
        • Instruction ID: 8c74be762abea21b7accda55ff6224a6f70913fea4c6a1fc32f350ed2c28cddd
        • Opcode Fuzzy Hash: 146604afdf875c87d0d0e0ef66d7f3da82025842baf9707a1a8bbcafb69421db
        • Instruction Fuzzy Hash: B411A426A08B9182EB50EB12A04017AE361FF88BD0F844135EE9D03B9ADF7CD056C790
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo
        • String ID: B
        • API String ID: 2959964966-1255198513
        • Opcode ID: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
        • Instruction ID: b54732abee6526f5165ecc9cfa12d0f50143b004439c33da2d4b4f0dd5b8c020
        • Opcode Fuzzy Hash: 0393436462657110cb73ce37d4357934f28618228331e8602f4d03b9a811f737
        • Instruction Fuzzy Hash: 49118132219780C6EB60AF15D44437EB6B1F798BD8FA84221ABC947B96CB3AC544CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLastsend
        • String ID: <C-CNNID: %Iu> send 0 bytes (detect package)
        • API String ID: 1802528911-4236689219
        • Opcode ID: 26024b8f4a6b1fc62b5e85987d6cbbeeaefd2807c977c47cb76afe576a9464f7
        • Instruction ID: 47b0474f7a5bfaaf464103132b49c170c9e80ffc9cfc00343a9ea5462ddd810a
        • Opcode Fuzzy Hash: 26024b8f4a6b1fc62b5e85987d6cbbeeaefd2807c977c47cb76afe576a9464f7
        • Instruction Fuzzy Hash: 6811AC72601500C6EB548F2AF48877E73F0E798B4CF790121DB998B6A5CB76C8D38B40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: _getptd
        • String ID: csm
        • API String ID: 3186804695-1018135373
        • Opcode ID: 110644245a712163c931d5ba1d41ab16cc3e499cf3e1aabacc1b7c0560f8ec51
        • Instruction ID: bd363303470f230a55856031fadec92bb8cd170373d7b31c69cb75a286644da7
        • Opcode Fuzzy Hash: 110644245a712163c931d5ba1d41ab16cc3e499cf3e1aabacc1b7c0560f8ec51
        • Instruction Fuzzy Hash: D8014C33142640CAEB70BF22C8687BD33F4E754B59FAA0225DED95A696DB32C8C1C301
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: CreateEvent
        • String ID: QMutexData::QMutexData: Cannot create event$default
        • API String ID: 2692171526-3883557714
        • Opcode ID: 7e7d644c09d99a5a6c3be016508522d6b6355ef5b7fdc0e416c337ea6e263274
        • Instruction ID: 1960c33bf2e09a6c5a547c97576ee7f1db199b94557c964d8810ed2a77add116
        • Opcode Fuzzy Hash: 7e7d644c09d99a5a6c3be016508522d6b6355ef5b7fdc0e416c337ea6e263274
        • Instruction Fuzzy Hash: FBF0C236A09B8181EB119F29F44172AF7A0FF98758FA4C135EA9D02795EF7CD152CB80
        APIs
        • try_get_function.LIBVCRUNTIME ref: 00007FF7F740159D
        • TlsSetValue.KERNEL32(?,?,?,00007FF7F74027EA,?,?,?,00007FF7F73F8CFD,?,?,?,?,00007FF7F73484A7), ref: 00007FF7F74015B4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Valuetry_get_function
        • String ID: FlsSetValue
        • API String ID: 738293619-3750699315
        • Opcode ID: 0ba6b372cb4a2b199900795e9c6c51c8a2dfea35c9e952b3c7edfe421b932056
        • Instruction ID: a402cec6964a312034d2411ba2f2748c714522d7ac5d2ed865eca4c9be5f3a51
        • Opcode Fuzzy Hash: 0ba6b372cb4a2b199900795e9c6c51c8a2dfea35c9e952b3c7edfe421b932056
        • Instruction Fuzzy Hash: E2E065A9A08603C1EB057B54F4405B8A222AF48795FD95131E93E0B2D5CE3CE486C7A0
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236546037.0000026C9CB40000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB40000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb40000_quHmbPnLFV.jbxd
        Similarity
        • API ID: free$_errno$_callnewhmalloc
        • String ID:
        • API String ID: 2761444284-0
        • Opcode ID: cc656971716715345f2a5dcc39fcc7d40fdafd1851604fdf7a17465b1541438a
        • Instruction ID: 5bd0006ff12c0090f31b2258b04ad721dab631cc5431728fe179ba0aac6116c9
        • Opcode Fuzzy Hash: cc656971716715345f2a5dcc39fcc7d40fdafd1851604fdf7a17465b1541438a
        • Instruction Fuzzy Hash: BE41EE7161EB0ACFE764FF1CC499736B6E5FB98311F20452DA9CAC3252DA61D802C782
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocFreesend
        • String ID:
        • API String ID: 2354595252-0
        • Opcode ID: 42f920e62df292d262b0744aa4ce6eb943c302377280a50c8d6856371cde3bb9
        • Instruction ID: af259c3711d7d5dbe7f80ab881b0acc5c7c52b30056fdc213cc696141cc26f2f
        • Opcode Fuzzy Hash: 42f920e62df292d262b0744aa4ce6eb943c302377280a50c8d6856371cde3bb9
        • Instruction Fuzzy Hash: 1F514C72202B40CBE714EB2AE44467EB7B5F784B84F248125DBCA97B64DF79E446CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236569762.0000026C9CB80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026C9CB80000, based on PE: true
        • Associated: 00000000.00000002.2236569762.0000026C9CBBE000.00000040.00001000.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_26c9cb80000_quHmbPnLFV.jbxd
        Similarity
        • API ID: Virtual$AllocFree
        • String ID:
        • API String ID: 2087232378-0
        • Opcode ID: c644452f85baab6451ec69b31673ecdda31e611098b1083b8dabd6bbc09c8c61
        • Instruction ID: 5a1f38b90ecebd0351bcf8fb87da9ef5f5f97ec9f080ea01e12b5951f78f1553
        • Opcode Fuzzy Hash: c644452f85baab6451ec69b31673ecdda31e611098b1083b8dabd6bbc09c8c61
        • Instruction Fuzzy Hash: 75514D72201B40CBE715EB2AE45427EB7B5F744B84F208125DBCA87B65DB79E445CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2236681540.00007FF7F7311000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F7310000, based on PE: true
        • Associated: 00000000.00000002.2236670004.00007FF7F7310000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F7416000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236744697.00007FF7F754B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F7588000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236847933.00007FF7F75BB000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75BD000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2236881548.00007FF7F75CA000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff7f7310000_quHmbPnLFV.jbxd
        Similarity
        • API ID: ErrorLastRead
        • String ID:
        • API String ID: 4100373531-0
        • Opcode ID: 6a69c7bdf01cc1d2336885ad907c5f05680f579d0beabb65993b657d56b6f43c
        • Instruction ID: d2041baf1b7113c36351eb67d2d82c8cbfbdec9456211fd6513893991b98a408
        • Opcode Fuzzy Hash: 6a69c7bdf01cc1d2336885ad907c5f05680f579d0beabb65993b657d56b6f43c
        • Instruction Fuzzy Hash: 74417C7AA0568287EB149F15E010639A3A5FF44FA8F460439DE6E433D4DE7CE846C3A0