Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f3fBEUL66b.exe

Overview

General Information

Sample name:f3fBEUL66b.exe
renamed because original name is a hash value
Original sample name:77dd16d7ed3758bd83e04514f6e84f58.exe
Analysis ID:1583153
MD5:77dd16d7ed3758bd83e04514f6e84f58
SHA1:d1a4c38fe1626e8c66ff3d30e89c65610d49bc0e
SHA256:7a668e696fe58365c3dff7e74162976e07deb2c766dd173ec4db09ff40eac47f
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry

Classification

  • System is w10x64
  • f3fBEUL66b.exe (PID: 7340 cmdline: "C:\Users\user\Desktop\f3fBEUL66b.exe" MD5: 77DD16D7ED3758BD83E04514F6E84F58)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: f3fBEUL66b.exe PID: 7340JoeSecurity_GhostRatYara detected GhostRatJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 192.238.134.113, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\f3fBEUL66b.exe, Initiated: true, ProcessId: 7340, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-02T05:02:04.835711+010020528751A Network Trojan was detected192.168.2.449730192.238.134.1134433TCP
    2025-01-02T05:03:10.595580+010020528751A Network Trojan was detected192.168.2.449730192.238.134.1134433TCP
    2025-01-02T05:04:23.048842+010020528751A Network Trojan was detected192.168.2.450004192.238.134.11310443TCP
    2025-01-02T05:05:24.189552+010020528751A Network Trojan was detected192.168.2.450006192.238.134.11310443TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: f3fBEUL66b.exeReversingLabs: Detection: 52%
    Source: f3fBEUL66b.exeVirustotal: Detection: 67%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: f3fBEUL66b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: z:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: x:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: v:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: t:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: r:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: p:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: n:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: l:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: j:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: h:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: f:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: b:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: y:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: w:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: u:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: s:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: q:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: o:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: m:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: k:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: i:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: g:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: e:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: [:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EF410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6C20EF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2114190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6C2114190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 192.238.134.113:4433
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50004 -> 192.238.134.113:10443
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50006 -> 192.238.134.113:10443
    Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-LAX-11US LEASEWEB-USA-LAX-11US
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E3B00 select,recv,timeGetTime,0_2_00007FF6C20E3B00

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: [esc]0_2_00007FF6C20EADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EADB0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GlobalUnlock,CloseClipboard,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_00007FF6C20EADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20F0DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6C20F0DA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EADB0 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,WaitForSingleObject,CreateFileW,SetFilePointer,lstrlenW,WriteFile,CloseHandle,ReleaseMutex,GlobalUnlock,CloseClipboard,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_00007FF6C20EADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EFD10 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF6C20EFD10
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E72D0 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF6C20E72D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FC400: wsprintfW,CreateFileW,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,0_2_00007FF6C20FC400
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6C20EE3E9
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6C20EE46D
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6C20EE4EE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E63700_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EB4100_2_00007FF6C20EB410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EF4100_2_00007FF6C20EF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EFD100_2_00007FF6C20EFD10
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E15000_2_00007FF6C20E1500
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E7A600_2_00007FF6C20E7A60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E72D00_2_00007FF6C20E72D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21120480_2_00007FF6C2112048
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E80C00_2_00007FF6C20E80C0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FB5E00_2_00007FF6C20FB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FAE600_2_00007FF6C20FAE60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2108EB00_2_00007FF6C2108EB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21173EC0_2_00007FF6C21173EC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20ED4100_2_00007FF6C20ED410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21054080_2_00007FF6C2105408
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E94800_2_00007FF6C20E9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21064C80_2_00007FF6C21064C8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210F4BC0_2_00007FF6C210F4BC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210F9500_2_00007FF6C210F950
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21141900_2_00007FF6C2114190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20F79D00_2_00007FF6C20F79D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21129E40_2_00007FF6C21129E4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21071DC0_2_00007FF6C21071DC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21051FC0_2_00007FF6C21051FC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2113A000_2_00007FF6C2113A00
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2105A1C0_2_00007FF6C2105A1C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21122C40_2_00007FF6C21122C4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20F93300_2_00007FF6C20F9330
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210A7980_2_00007FF6C210A798
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20F2FA00_2_00007FF6C20F2FA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210C7BC0_2_00007FF6C210C7BC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210FFD00_2_00007FF6C210FFD0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2115FD40_2_00007FF6C2115FD4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21188240_2_00007FF6C2118824
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2104FF80_2_00007FF6C2104FF8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21058180_2_00007FF6C2105818
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210684C0_2_00007FF6C210684C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20F08800_2_00007FF6C20F0880
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E99000_2_00007FF6C20E9900
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20ECD400_2_00007FF6C20ECD40
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EADB00_2_00007FF6C20EADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210B5F00_2_00007FF6C210B5F0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210D5C00_2_00007FF6C210D5C0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C21075E00_2_00007FF6C21075E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210560C0_2_00007FF6C210560C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E2E500_2_00007FF6C20E2E50
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FA6800_2_00007FF6C20FA680
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C210AF200_2_00007FF6C210AF20
    Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@1/1@0/1
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6C20FB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6C20EE3E9
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6C20EE46D
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6C20E9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6C20EE4EE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeMutant created: \Sessions\1\BaseNamedObjects\????
    Source: f3fBEUL66b.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: f3fBEUL66b.exeReversingLabs: Detection: 52%
    Source: f3fBEUL66b.exeVirustotal: Detection: 67%
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
    Source: f3fBEUL66b.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: f3fBEUL66b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: f3fBEUL66b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EE36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF6C20EE36A
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeStalling execution: Execution stalls by calling Sleepgraph_0-21668
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeWindow / User API: threadDelayed 3327Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeWindow / User API: threadDelayed 6070Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-22081
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7408Thread sleep count: 58 > 30Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7408Thread sleep time: -58000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7432Thread sleep count: 3327 > 30Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7432Thread sleep time: -33270s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7408Thread sleep count: 6070 > 30Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 7408Thread sleep time: -6070000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20EF410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6C20EF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2114190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6C2114190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: f3fBEUL66b.exe, 00000000.00000002.4116954354.000002AB494CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6C20FB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FC82C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6C20FC82C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E8710 SysAllocString,SysAllocString,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,SysAllocString,SysAllocString,GetProcessHeap,HeapFree,GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,0_2_00007FF6C20E8710
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FBDF0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF6C20FBDF0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6C20FB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2103D0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6C2103D0C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FEA00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6C20FEA00
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FE814 SetUnhandledExceptionFilter,0_2_00007FF6C20FE814
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FE66C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6C20FE66C

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6C20E9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6C20E9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF6C20E9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20FB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6C20FB5E0
    Source: f3fBEUL66b.exe, 00000000.00000002.4116954354.000002AB49555000.00000004.00000020.00020000.00000000.sdmp, f3fBEUL66b.exe, 00000000.00000003.3395235193.000002AB4958A000.00000004.00000020.00020000.00000000.sdmp, f3fBEUL66b.exe, 00000000.00000002.4116954354.000002AB494CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
    Source: f3fBEUL66b.exe, 00000000.00000002.4116954354.000002AB4959F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: f3fBEUL66b.exe, 00000000.00000003.1719210194.000002AB49575000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram ManagerM91
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C211CB60 cpuid 0_2_00007FF6C211CB60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6C21183C4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6C2117CD8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6C211797C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6C21181E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6C2118290
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6C2110AD8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6C2110FB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6C2118088
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6C2117DA8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6C2117E40
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6C20E6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C2112048 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6C2112048
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6C20E8A40 GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,SysStringLen,SysStringLen,CloseHandle,CloseHandle,SysFreeString,SysFreeString,GetCurrentProcessId,wsprintfW,GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,wsprintfW,0_2_00007FF6C20E8A40
    Source: f3fBEUL66b.exe, 00000000.00000000.1644091595.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmp, f3fBEUL66b.exe, 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: f3fBEUL66b.exe PID: 7340, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: f3fBEUL66b.exe PID: 7340, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    2
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Modify Registry
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Windows Service
    1
    Virtualization/Sandbox Evasion
    LSASS Memory151
    Security Software Discovery
    Remote Desktop Protocol121
    Input Capture
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
    Process Injection
    1
    Access Token Manipulation
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares1
    Archive Collected Data
    SteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Side-Loading
    211
    Process Injection
    NTDS3
    Process Discovery
    Distributed Component Object Model3
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Indicator Removal
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials11
    Peripheral Device Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
    File and Directory Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
    System Information Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    f3fBEUL66b.exe53%ReversingLabsWin64.Trojan.SpywareX
    f3fBEUL66b.exe67%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    192.238.134.113
    unknownUnited States
    395954LEASEWEB-USA-LAX-11UStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1583153
    Start date and time:2025-01-02 05:01:08 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 36s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:f3fBEUL66b.exe
    renamed because original name is a hash value
    Original Sample Name:77dd16d7ed3758bd83e04514f6e84f58.exe
    Detection:MAL
    Classification:mal96.troj.spyw.evad.winEXE@1/1@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 45
    • Number of non-executed functions: 117
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    TimeTypeDescription
    23:02:31API Interceptor5806977x Sleep call for process: f3fBEUL66b.exe modified
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    LEASEWEB-USA-LAX-11USnabarm7.elfGet hashmaliciousUnknownBrowse
    • 23.84.102.105
    52C660192933BE09807FC4895F376764A2BE35AA68567819BB854E83CF5F9E5C.dllGet hashmaliciousUnknownBrowse
    • 192.238.132.206
    mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 23.87.203.7
    la.bot.arm6.elfGet hashmaliciousMiraiBrowse
    • 108.187.71.205
    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
    • 23.87.103.174
    arm5.nn-20241218-1651.elfGet hashmaliciousMirai, OkiruBrowse
    • 23.86.199.44
    loligang.arm7.elfGet hashmaliciousMiraiBrowse
    • 23.86.161.151
    jew.sh4.elfGet hashmaliciousUnknownBrowse
    • 23.104.13.203
    ppc.elfGet hashmaliciousMirai, MoobotBrowse
    • 172.255.161.127
    1.elfGet hashmaliciousUnknownBrowse
    • 23.84.57.61
    No context
    No context
    Process:C:\Users\user\Desktop\f3fBEUL66b.exe
    File Type:data
    Category:dropped
    Size (bytes):30
    Entropy (8bit):2.6616157143988106
    Encrypted:false
    SSDEEP:3:tblM6lEjln:tbhEZn
    MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
    SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
    SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
    SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
    Malicious:true
    Reputation:low
    Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.060311148694131
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:f3fBEUL66b.exe
    File size:390'656 bytes
    MD5:77dd16d7ed3758bd83e04514f6e84f58
    SHA1:d1a4c38fe1626e8c66ff3d30e89c65610d49bc0e
    SHA256:7a668e696fe58365c3dff7e74162976e07deb2c766dd173ec4db09ff40eac47f
    SHA512:9496abdd711b43e88d36c5c2aad0c7338296239e3486eebb6b2715395ffaf452b7ab737417e3cb784fdf9c0c14028602ced9fa4fff665abf16cb75d9f47f06bf
    SSDEEP:6144:Qvy/g/Oe2CZNHfXmv9m7tvT7DYewsPJimwi9vrBP2k1u0ZLjNy:1/KlpTXmv9mpvv0iPJPtr99Ny
    TLSH:C1847E49FB9409F8E467C138C9A34916EBB27C5913A09BDF33A4466A2F237D05D3EB11
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..R............M.......M.......M.......M........O.......O.......O..S...M.......M...........3...MN......MN......Rich...........
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x14001e25c
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x676FAD5C [Sat Dec 28 07:48:44 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:1db3bac59c066f9b53b8b3b6b99b874b
    Instruction
    dec eax
    sub esp, 28h
    call 00007FEB94C8B6E0h
    dec eax
    add esp, 28h
    jmp 00007FEB94C8AF37h
    int3
    int3
    dec eax
    sub esp, 28h
    dec ebp
    mov eax, dword ptr [ecx+38h]
    dec eax
    mov ecx, edx
    dec ecx
    mov edx, ecx
    call 00007FEB94C8B0D2h
    mov eax, 00000001h
    dec eax
    add esp, 28h
    ret
    int3
    int3
    int3
    inc eax
    push ebx
    inc ebp
    mov ebx, dword ptr [eax]
    dec eax
    mov ebx, edx
    inc ecx
    and ebx, FFFFFFF8h
    dec esp
    mov ecx, ecx
    inc ecx
    test byte ptr [eax], 00000004h
    dec esp
    mov edx, ecx
    je 00007FEB94C8B0D5h
    inc ecx
    mov eax, dword ptr [eax+08h]
    dec ebp
    arpl word ptr [eax+04h], dx
    neg eax
    dec esp
    add edx, ecx
    dec eax
    arpl ax, cx
    dec esp
    and edx, ecx
    dec ecx
    arpl bx, ax
    dec edx
    mov edx, dword ptr [eax+edx]
    dec eax
    mov eax, dword ptr [ebx+10h]
    mov ecx, dword ptr [eax+08h]
    dec eax
    mov eax, dword ptr [ebx+08h]
    test byte ptr [ecx+eax+03h], 0000000Fh
    je 00007FEB94C8B0CDh
    movzx eax, byte ptr [ecx+eax+03h]
    and eax, FFFFFFF0h
    dec esp
    add ecx, eax
    dec esp
    xor ecx, edx
    dec ecx
    mov ecx, ecx
    pop ebx
    jmp 00007FEB94C8B0DAh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    nop word ptr [eax+eax+00000000h]
    dec eax
    cmp ecx, dword ptr [00036D39h]
    jne 00007FEB94C8B0D2h
    dec eax
    rol ecx, 10h
    test cx, FFFFh
    jne 00007FEB94C8B0C3h
    ret
    dec eax
    ror ecx, 10h
    jmp 00007FEB94C8B7DBh
    int3
    int3
    dec eax
    mov dword ptr [esp+00h], ebx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x524000x104.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3450.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc8c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7c00x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6800x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x920.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x3df700x3e0002b6c6c8b93239d65e2449c4cc33eda20False0.5452683971774194data6.461526088950339IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x3f0000x151e80x15200530663d6c229cb4dbaf0a1dc62a8561dFalse0.4157151442307692data4.936178076870312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x550000xaa9c0x7c009ce9d6ecd277af9d66cef31780bbf5efFalse0.10660282258064516DOS executable (block device driver \377\3)1.588705678471102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x600000x34500x3600b6a68cd5b1e86136baf9e34e01cfad8bFalse0.4622395833333333data5.530289196450094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x640000xc8c0xe00a952b87812e4781581800f8699e0d5a4False0.49302455357142855data5.228153224182403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, HeapFree, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
    USER32.dllGetForegroundWindow, GetLastInputInfo, GetClipboardData, GetWindowTextW, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, CloseClipboard, wsprintfW, ExitWindowsEx, ShowWindow, PostThreadMessageA, GetInputState, GetDC, GetSystemMetrics, EmptyClipboard, MsgWaitForMultipleObjects, DispatchMessageW, PeekMessageW, TranslateMessage, OpenClipboard
    GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
    ADVAPI32.dllRegQueryInfoKeyW, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
    SHELL32.dllSHGetFolderPathW
    ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoCreateInstance, CoUninitialize, CoInitialize
    OLEAUT32.dllSysFreeString, SysAllocString, SysStringLen
    WS2_32.dllselect, WSAStartup, send, socket, connect, recv, htons, setsockopt, WSAIoctl, gethostbyname, WSAGetLastError, WSAEnumNetworkEvents, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSASetLastError, WSACloseEvent, shutdown, gethostname, inet_ntoa, WSACleanup, closesocket, WSACreateEvent
    WINMM.dlltimeGetTime
    gdiplus.dllGdipDisposeImage, GdipCreateBitmapFromHBITMAP, GdipGetImagePixelFormat, GdiplusShutdown, GdipDrawImageI, GdipFree, GdipSaveImageToStream, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipAlloc, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders, GdipGetImagePaletteSize, GdipCloneImage, GdipBitmapUnlockBits, GdipCreateBitmapFromStream
    dxgi.dllCreateDXGIFactory
    DINPUT8.dllDirectInput8Create
    TimestampSource PortDest PortSource IPDest IP
    Jan 2, 2025 05:02:03.376938105 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:03.381911993 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:03.381993055 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:04.183337927 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:04.188291073 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.188303947 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.188319921 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.188447952 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.722479105 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.767036915 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:04.830801964 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:04.835634947 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.835645914 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.835653067 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.835663080 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:04.835711002 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:04.840442896 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:19.564090014 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:19.568985939 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:19.876605034 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:19.923454046 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:36.689302921 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:36.694272041 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:37.001828909 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:37.048477888 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:53.532918930 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:02:53.537831068 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:53.845304966 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:02:53.892199993 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:10.595580101 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:10.600349903 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:10.907946110 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:10.985980034 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:27.939212084 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:27.944365978 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:28.251787901 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:28.470406055 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:43.564315081 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:43.564372063 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:43.569267988 CET443349730192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:43.569372892 CET497304433192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:48.517891884 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:48.522821903 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:48.522905111 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:49.468806982 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:49.473747969 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:49.473761082 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:49.473771095 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:49.473891973 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:50.853332043 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:50.853348017 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:50.853404999 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:50.853457928 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:50.853494883 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:50.853498936 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:50.853537083 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:51.222213984 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:51.227236032 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:51.227251053 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:51.227272034 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:51.227281094 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:03:51.227303982 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:03:51.232090950 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:06.165435076 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:06.170305967 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:06.485790968 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:06.619050980 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:23.048841953 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:23.048887968 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:23.053757906 CET1044350004192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:23.053813934 CET5000410443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:28.002249002 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:28.007092953 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:28.007160902 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:29.123802900 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:29.128777027 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.128788948 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.128797054 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.128808022 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.490169048 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.533090115 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:29.599318981 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:29.604183912 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.604195118 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.604222059 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.604232073 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:29.604252100 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:29.608961105 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:45.064603090 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:45.064661980 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:45.069474936 CET443350005192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:45.069530964 CET500054433192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:50.152935982 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:50.157892942 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:50.157957077 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:51.734955072 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:51.739873886 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:51.739890099 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:51.739902973 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:51.740164042 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.322285891 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.414297104 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:52.420104980 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.420115948 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.420125961 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.420137882 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:04:52.420973063 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:04:52.426590919 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:07.142625093 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:07.148457050 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:07.460359097 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:07.683345079 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:07.683518887 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:24.189552069 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:24.194520950 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:24.506412029 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:24.548841000 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:39.955187082 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:39.960654974 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:40.272653103 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:40.330135107 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:56.145700932 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:56.145700932 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:05:56.150602102 CET1044350006192.238.134.113192.168.2.4
    Jan 2, 2025 05:05:56.150664091 CET5000610443192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:01.096538067 CET500074433192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:01.101458073 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:01.101541996 CET500074433192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:02.543073893 CET500074433192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:02.547993898 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:02.548006058 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:02.548013926 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:02.548063040 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.131248951 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.223927021 CET500074433192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:03.228796959 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.228807926 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.228822947 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.228840113 CET500074433192.168.2.4192.238.134.113
    Jan 2, 2025 05:06:03.228909016 CET443350007192.238.134.113192.168.2.4
    Jan 2, 2025 05:06:03.233637094 CET443350007192.238.134.113192.168.2.4

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:23:01:56
    Start date:01/01/2025
    Path:C:\Users\user\Desktop\f3fBEUL66b.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\f3fBEUL66b.exe"
    Imagebase:0x7ff6c20e0000
    File size:390'656 bytes
    MD5 hash:77DD16D7ED3758BD83E04514F6E84F58
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:46%
      Total number of Nodes:1164
      Total number of Limit Nodes:47
      execution_graph 22355 7ff6c20e9f50 49 API calls 22440 7ff6c20fed50 LocalFree 22396 7ff6c20edc4d 56 API calls 4 library calls 22397 7ff6c210284a 57 API calls __CxxCallCatchBlock 22357 7ff6c20f0b40 7 API calls 22444 7ff6c20ecd40 88 API calls 3 library calls 22399 7ff6c20e1040 GetTickCount 22445 7ff6c20e1140 HeapFree 22490 7ff6c20e5640 40 API calls 22491 7ff6c20ede3f 55 API calls 4 library calls 22358 7ff6c211573c GetProcessHeap 22402 7ff6c20e1470 VirtualFree 22403 7ff6c20e4470 164 API calls std::_Locinfo::_Locinfo_ctor 22405 7ff6c210206c 61 API calls 5 library calls 22360 7ff6c20ee36a OpenEventLogW ClearEventLogW CloseEventLog 22493 7ff6c2117e40 57 API calls 4 library calls 22450 7ff6c20ef160 52 API calls 5 library calls 22451 7ff6c20e1160 HeapReAlloc 22495 7ff6c20fe25c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22407 7ff6c20e1058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22361 7ff6c210a798 60 API calls 5 library calls 22453 7ff6c20ebd90 13 API calls 21037 7ff6c2108aa8 21038 7ff6c2108ab6 GetLastError ExitThread 21037->21038 21039 7ff6c2108ac5 21037->21039 21052 7ff6c210ed10 GetLastError 21039->21052 21044 7ff6c2108ae3 21078 7ff6c20e72d0 21044->21078 21118 7ff6c20e3da0 21044->21118 21126 7ff6c20e3b00 21044->21126 21046 7ff6c2108b02 21140 7ff6c2108cbc 21046->21140 21053 7ff6c210ed51 FlsSetValue 21052->21053 21054 7ff6c210ed34 FlsGetValue 21052->21054 21056 7ff6c210ed63 21053->21056 21071 7ff6c210ed41 21053->21071 21055 7ff6c210ed4b 21054->21055 21054->21071 21055->21053 21144 7ff6c2110a28 21056->21144 21057 7ff6c210edbd SetLastError 21059 7ff6c2108aca 21057->21059 21060 7ff6c210eddd 21057->21060 21074 7ff6c211161c 21059->21074 21160 7ff6c2104078 47 API calls BuildCatchObjectHelperInternal 21060->21160 21063 7ff6c210ed90 FlsSetValue 21065 7ff6c210ed9c FlsSetValue 21063->21065 21066 7ff6c210edae 21063->21066 21064 7ff6c210ed80 FlsSetValue 21068 7ff6c210ed89 21064->21068 21065->21068 21159 7ff6c210eac0 11 API calls _get_daylight 21066->21159 21153 7ff6c210e95c 21068->21153 21071->21057 21072 7ff6c210edb6 21073 7ff6c210e95c __free_lconv_mon 11 API calls 21072->21073 21073->21057 21075 7ff6c2108ad6 21074->21075 21076 7ff6c211162b 21074->21076 21075->21044 21143 7ff6c2111350 5 API calls std::_Locinfo::_Locinfo_ctor 21075->21143 21076->21075 21164 7ff6c2110d68 5 API calls std::_Locinfo::_Locinfo_ctor 21076->21164 21079 7ff6c20e7330 21078->21079 21079->21079 21081 7ff6c20e7346 _Yarn 21079->21081 21176 7ff6c20ea300 49 API calls 4 library calls 21079->21176 21083 7ff6c20e7392 _Yarn 21081->21083 21177 7ff6c20ea300 49 API calls 4 library calls 21081->21177 21085 7ff6c20e7401 _Yarn 21083->21085 21178 7ff6c20ea300 49 API calls 4 library calls 21083->21178 21087 7ff6c20e7474 _Yarn 21085->21087 21179 7ff6c20ea300 49 API calls 4 library calls 21085->21179 21089 7ff6c20e74cf _Yarn 21087->21089 21180 7ff6c20ea300 49 API calls 4 library calls 21087->21180 21091 7ff6c20e7550 _Yarn 21089->21091 21181 7ff6c20ea300 49 API calls 4 library calls 21089->21181 21093 7ff6c20e75c0 _Yarn 21091->21093 21182 7ff6c20ea300 49 API calls 4 library calls 21091->21182 21165 7ff6c20f9be0 21093->21165 21096 7ff6c20e772d 21096->21046 21097 7ff6c20e76b6 21097->21096 21099 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21097->21099 21101 7ff6c20e7758 21097->21101 21099->21101 21100 7ff6c20e775e CreateMutexExW GetLastError 21102 7ff6c20e77c9 21100->21102 21103 7ff6c20e7799 21100->21103 21171 7ff6c2103ff8 21101->21171 21105 7ff6c20e7870 9 API calls 21102->21105 21106 7ff6c20e77e0 lstrlenW 21102->21106 21104 7ff6c20e77a0 Sleep CreateMutexW GetLastError 21103->21104 21104->21102 21104->21104 21107 7ff6c20e7924 DeleteFileW 21105->21107 21108 7ff6c20e792d ReleaseMutex DirectInput8Create 21105->21108 21110 7ff6c20e8e30 6 API calls 21106->21110 21107->21108 21109 7ff6c20e7a00 21108->21109 21114 7ff6c20e7963 21108->21114 21109->21046 21111 7ff6c20e783e 21110->21111 21112 7ff6c20e7842 lstrcmpW 21111->21112 21113 7ff6c20e7858 SleepEx 21111->21113 21112->21105 21112->21113 21113->21105 21113->21106 21114->21109 21115 7ff6c20e7a1f GetTickCount GetKeyState 21114->21115 21116 7ff6c20eadb0 37 API calls 21115->21116 21117 7ff6c20e7a51 21116->21117 21119 7ff6c20e3e22 21118->21119 21123 7ff6c20e3db4 21118->21123 21119->21046 21120 7ff6c20e3e15 21120->21046 21121 7ff6c20e3dc8 SleepEx 21121->21123 21123->21120 21123->21121 21214 7ff6c20e3e30 GetCurrentThreadId 21123->21214 21230 7ff6c20e37a0 21123->21230 21135 7ff6c20e3b18 21126->21135 21127 7ff6c20e3c54 21127->21046 21128 7ff6c20e3be0 select 21128->21127 21128->21135 21129 7ff6c20e3c08 recv 21129->21135 21130 7ff6c20e1500 VirtualAlloc VirtualFree 21130->21135 21131 7ff6c20e1730 2 API calls 21131->21135 21132 7ff6c2108d9c 11 API calls _get_daylight 21132->21135 21133 7ff6c20e3d04 timeGetTime 21134 7ff6c20e1730 2 API calls 21133->21134 21134->21135 21135->21127 21135->21128 21135->21129 21135->21130 21135->21131 21135->21132 21135->21133 21252 7ff6c20edbef 21135->21252 21260 7ff6c20ee29b 21135->21260 21264 7ff6c20ed9c0 21135->21264 21279 7ff6c20e1810 VirtualAlloc VirtualFree _Yarn 21135->21279 21601 7ff6c2108b18 21140->21601 21143->21044 21145 7ff6c2110a39 21144->21145 21151 7ff6c2110a47 _get_daylight 21144->21151 21146 7ff6c2110a8a 21145->21146 21145->21151 21162 7ff6c2108d9c 11 API calls _get_daylight 21146->21162 21147 7ff6c2110a6e HeapAlloc 21148 7ff6c2110a88 21147->21148 21147->21151 21150 7ff6c210ed72 21148->21150 21150->21063 21150->21064 21151->21146 21151->21147 21161 7ff6c210ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21151->21161 21154 7ff6c210e990 21153->21154 21155 7ff6c210e961 RtlFreeHeap 21153->21155 21154->21071 21155->21154 21156 7ff6c210e97c GetLastError 21155->21156 21157 7ff6c210e989 __free_lconv_mon 21156->21157 21163 7ff6c2108d9c 11 API calls _get_daylight 21157->21163 21159->21072 21161->21151 21162->21150 21163->21154 21164->21075 21166 7ff6c20f9c0d 21165->21166 21183 7ff6c20f9e00 21166->21183 21168 7ff6c20f9f50 49 API calls 21169 7ff6c20f9d0f 21168->21169 21169->21168 21170 7ff6c20e765d MultiByteToWideChar MultiByteToWideChar 21169->21170 21170->21097 21208 7ff6c2103e70 47 API calls 2 library calls 21171->21208 21173 7ff6c2104011 21209 7ff6c2104028 IsProcessorFeaturePresent 21173->21209 21176->21081 21177->21083 21178->21085 21179->21087 21180->21089 21181->21091 21182->21093 21188 7ff6c20f9e29 21183->21188 21194 7ff6c20f9f45 21183->21194 21186 7ff6c20f9e81 21191 7ff6c20f9f3f 21186->21191 21197 7ff6c20fdfb8 21186->21197 21188->21186 21189 7ff6c20f9ebd 21188->21189 21195 7ff6c20f9e74 _Yarn 21188->21195 21190 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21189->21190 21190->21195 21203 7ff6c20e19d0 49 API calls 2 library calls 21191->21203 21192 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21192->21191 21204 7ff6c20e61c0 49 API calls 21194->21204 21195->21192 21196 7ff6c20f9f07 _Yarn 21195->21196 21196->21169 21200 7ff6c20fdfc3 21197->21200 21198 7ff6c20fdfdc 21198->21195 21200->21197 21200->21198 21205 7ff6c210ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21200->21205 21206 7ff6c20fccb0 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21200->21206 21207 7ff6c20e19d0 49 API calls 2 library calls 21200->21207 21203->21194 21205->21200 21207->21200 21208->21173 21210 7ff6c210403b 21209->21210 21213 7ff6c2103d0c 14 API calls 2 library calls 21210->21213 21212 7ff6c2104056 GetCurrentProcess TerminateProcess 21213->21212 21215 7ff6c20e3e5c 21214->21215 21233 7ff6c20e1670 21215->21233 21217 7ff6c20e3e9b 21218 7ff6c20e1670 2 API calls 21217->21218 21219 7ff6c20e3ec4 21218->21219 21240 7ff6c20e1500 21219->21240 21221 7ff6c20e3efa 21226 7ff6c20e3f1a 21221->21226 21227 7ff6c20e3f06 21221->21227 21222 7ff6c20e3fa1 21246 7ff6c20e1730 21222->21246 21223 7ff6c20e3f30 send 21223->21226 21224 7ff6c20e3f80 send 21224->21222 21224->21227 21226->21222 21226->21223 21226->21227 21227->21222 21227->21224 21228 7ff6c20e3fba GetCurrentThreadId 21229 7ff6c20e3df1 timeGetTime 21228->21229 21229->21123 21231 7ff6c20e37af setsockopt CancelIo closesocket SetEvent 21230->21231 21232 7ff6c20e381a 21230->21232 21231->21232 21232->21123 21234 7ff6c20e167e 21233->21234 21235 7ff6c20e1686 21233->21235 21234->21217 21236 7ff6c20e16ac VirtualAlloc 21235->21236 21237 7ff6c20e16d6 _Yarn 21236->21237 21238 7ff6c20e1704 21237->21238 21239 7ff6c20e16f6 VirtualFree 21237->21239 21238->21217 21239->21238 21241 7ff6c20e152a 21240->21241 21242 7ff6c20e155b VirtualAlloc 21241->21242 21243 7ff6c20e15b5 _Yarn 21241->21243 21244 7ff6c20e1587 _Yarn 21242->21244 21243->21221 21244->21243 21245 7ff6c20e15a7 VirtualFree 21244->21245 21245->21243 21247 7ff6c20e174b 21246->21247 21248 7ff6c20e17fb 21247->21248 21249 7ff6c20e177c VirtualAlloc 21247->21249 21248->21228 21250 7ff6c20e17a8 _Yarn 21249->21250 21251 7ff6c20e17be VirtualFree 21250->21251 21251->21228 21253 7ff6c20edbfb 21252->21253 21256 7ff6c20ee2c3 21252->21256 21254 7ff6c20edc19 21253->21254 21334 7ff6c2108a40 21253->21334 21254->21256 21280 7ff6c20ef410 21254->21280 21256->21135 21258 7ff6c20edc41 21258->21256 21259 7ff6c20e3e30 10 API calls 21258->21259 21259->21256 21261 7ff6c20ee2a2 21260->21261 21262 7ff6c20ee2c3 21261->21262 21263 7ff6c20e3e30 10 API calls 21261->21263 21262->21135 21263->21262 21265 7ff6c20ed9df 21264->21265 21266 7ff6c20eda2a CloseHandle 21264->21266 21267 7ff6c20eda44 21265->21267 21268 7ff6c20eda0b 21265->21268 21266->21267 21269 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21267->21269 21268->21266 21270 7ff6c20eda49 21269->21270 21271 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21270->21271 21278 7ff6c20edaf7 21270->21278 21274 7ff6c20eda83 memcpy_s 21271->21274 21272 7ff6c20edb41 RegOpenKeyExW 21273 7ff6c20edbb0 21272->21273 21275 7ff6c20edb7c RegQueryValueExW 21272->21275 21273->21135 21276 7ff6c20eda97 GetLastInputInfo GetTickCount wsprintfW 21274->21276 21275->21273 21510 7ff6c20e80c0 21276->21510 21278->21272 21278->21273 21279->21135 21281 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21280->21281 21282 7ff6c20ef437 memcpy_s 21281->21282 21283 7ff6c20ef44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 21282->21283 21284 7ff6c20ef4b4 CreateToolhelp32Snapshot 21283->21284 21285 7ff6c20ef4a1 GetWindowTextW 21283->21285 21286 7ff6c20ef555 CreateToolhelp32Snapshot 21284->21286 21287 7ff6c20ef4d8 memcpy_s 21284->21287 21285->21284 21289 7ff6c20ef5f8 CreateToolhelp32Snapshot 21286->21289 21290 7ff6c20ef577 memcpy_s 21286->21290 21291 7ff6c20ef4e9 Process32FirstW 21287->21291 21294 7ff6c20ef61a memcpy_s 21289->21294 21295 7ff6c20ef6a8 RegOpenKeyExW 21289->21295 21293 7ff6c20ef58b Process32FirstW 21290->21293 21291->21286 21300 7ff6c20ef501 21291->21300 21293->21289 21307 7ff6c20ef5a9 21293->21307 21301 7ff6c20ef62e Process32FirstW 21294->21301 21297 7ff6c20ef913 RegOpenKeyExW 21295->21297 21298 7ff6c20ef6fa RegQueryValueExW 21295->21298 21302 7ff6c20ef9f2 RegOpenKeyExW 21297->21302 21303 7ff6c20ef951 RegQueryValueExW 21297->21303 21304 7ff6c20ef908 RegCloseKey 21298->21304 21316 7ff6c20ef734 memcpy_s 21298->21316 21299 7ff6c20ef544 Process32NextW 21299->21286 21299->21300 21300->21286 21300->21299 21301->21295 21314 7ff6c20ef64c 21301->21314 21308 7ff6c20efa30 RegQueryValueExW 21302->21308 21309 7ff6c20efad1 7 API calls 21302->21309 21305 7ff6c20ef9e7 RegCloseKey 21303->21305 21317 7ff6c20ef986 memcpy_s 21303->21317 21304->21297 21305->21302 21306 7ff6c20ef5e4 Process32NextW 21306->21289 21306->21307 21307->21289 21307->21306 21312 7ff6c20efac6 RegCloseKey 21308->21312 21321 7ff6c20efa65 memcpy_s 21308->21321 21310 7ff6c20efb91 FindClose 21309->21310 21311 7ff6c20efb89 21309->21311 21343 7ff6c20efd10 7 API calls 21310->21343 21311->21310 21312->21309 21313 7ff6c20ef694 Process32NextW 21313->21295 21313->21314 21314->21295 21314->21313 21318 7ff6c20ef75e RegQueryValueExW 21316->21318 21319 7ff6c20ef9b0 RegQueryValueExW 21317->21319 21318->21304 21320 7ff6c20ef791 21318->21320 21319->21305 21323 7ff6c20ef9df 21319->21323 21363 7ff6c20f1310 49 API calls 4 library calls 21320->21363 21322 7ff6c20efa8f RegQueryValueExW 21321->21322 21322->21312 21325 7ff6c20efabe 21322->21325 21323->21305 21325->21312 21326 7ff6c20efbd1 _Yarn 21332 7ff6c20efcbe 21326->21332 21333 7ff6c20e3e30 10 API calls 21326->21333 21327 7ff6c20ef79d 21327->21304 21328 7ff6c20ef900 21327->21328 21329 7ff6c20efcfe 21327->21329 21328->21304 21330 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21329->21330 21331 7ff6c20efd03 21330->21331 21332->21258 21333->21332 21336 7ff6c2108a4d 21334->21336 21337 7ff6c2108a57 21334->21337 21336->21337 21341 7ff6c2108a73 21336->21341 21507 7ff6c2108d9c 11 API calls _get_daylight 21337->21507 21338 7ff6c2108a5f 21508 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21338->21508 21340 7ff6c2108a6b 21340->21254 21341->21340 21509 7ff6c2108d9c 11 API calls _get_daylight 21341->21509 21344 7ff6c20efdbe GetSystemMetrics 21343->21344 21345 7ff6c20efdaa 21343->21345 21347 7ff6c20efdde GetSystemMetrics 21344->21347 21348 7ff6c20efe28 GetSystemMetrics 21344->21348 21346 7ff6c20efe47 8 API calls 21345->21346 21349 7ff6c20eff92 memcpy_s 21346->21349 21347->21346 21348->21346 21350 7ff6c20effa7 GetDIBits 21349->21350 21351 7ff6c20effdf _Yarn memcpy_s 21350->21351 21352 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21351->21352 21353 7ff6c20f0052 21352->21353 21364 7ff6c20f0220 GlobalAlloc GlobalLock 21353->21364 21356 7ff6c20f0089 DeleteObject DeleteObject ReleaseDC 21361 7ff6c20f00b3 21356->21361 21357 7ff6c20f011c _Yarn 21358 7ff6c20f015d DeleteObject DeleteObject ReleaseDC 21357->21358 21358->21361 21359 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21360 7ff6c20f0212 21359->21360 21361->21359 21362 7ff6c20f00ed 21361->21362 21362->21326 21363->21327 21412 7ff6c211d3b0 21364->21412 21367 7ff6c20f05f1 GlobalFree 21369 7ff6c20f0081 21367->21369 21368 7ff6c20f029f 21414 7ff6c20e61e0 21368->21414 21369->21356 21369->21357 21373 7ff6c20f02fc 21374 7ff6c20f0304 GdipCreateBitmapFromStream 21373->21374 21411 7ff6c20f0567 21373->21411 21375 7ff6c20f0330 GdipDisposeImage 21374->21375 21376 7ff6c20f033b 21374->21376 21375->21411 21432 7ff6c20ec340 GdipGetImagePixelFormat 21376->21432 21378 7ff6c20f05aa 21381 7ff6c20e61e0 58 API calls 21378->21381 21379 7ff6c20f0586 DeleteObject 21379->21378 21380 7ff6c20f0348 GdipDisposeImage 21382 7ff6c20f035c CreateStreamOnHGlobal 21380->21382 21380->21411 21384 7ff6c20f05af EnterCriticalSection 21381->21384 21383 7ff6c20f0379 21382->21383 21382->21411 21466 7ff6c20ec7b0 21383->21466 21385 7ff6c20f05c2 EnterCriticalSection 21384->21385 21386 7ff6c20f05e7 LeaveCriticalSection 21384->21386 21388 7ff6c20f05d4 GdiplusShutdown 21385->21388 21389 7ff6c20f05da LeaveCriticalSection 21385->21389 21386->21367 21388->21389 21389->21386 21390 7ff6c20f0386 GetHGlobalFromStream GlobalLock 21391 7ff6c20f03ae GlobalFree 21390->21391 21392 7ff6c20f043f GlobalSize 21390->21392 21394 7ff6c20f03f1 21391->21394 21395 7ff6c20f03cf DeleteObject 21391->21395 21396 7ff6c20f0452 _Yarn 21392->21396 21397 7ff6c20e61e0 58 API calls 21394->21397 21395->21394 21480 7ff6c20e9fd0 21396->21480 21399 7ff6c20f03f6 EnterCriticalSection 21397->21399 21400 7ff6c20f042e LeaveCriticalSection 21399->21400 21401 7ff6c20f0409 EnterCriticalSection 21399->21401 21400->21369 21402 7ff6c20f0421 LeaveCriticalSection 21401->21402 21403 7ff6c20f041b GdiplusShutdown 21401->21403 21402->21400 21403->21402 21404 7ff6c20f0481 21405 7ff6c20f0514 21404->21405 21406 7ff6c20f0618 21404->21406 21408 7ff6c20f0553 GlobalUnlock 21405->21408 21409 7ff6c20f052f DeleteObject 21405->21409 21407 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21406->21407 21410 7ff6c20f061d 21407->21410 21408->21411 21409->21408 21411->21378 21411->21379 21413 7ff6c20f0278 GlobalUnlock CreateStreamOnHGlobal 21412->21413 21413->21367 21413->21368 21415 7ff6c20e6200 21414->21415 21416 7ff6c20e626b EnterCriticalSection LeaveCriticalSection 21414->21416 21494 7ff6c20fdccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21415->21494 21425 7ff6c20ec9b0 21416->21425 21426 7ff6c20e61e0 58 API calls 21425->21426 21427 7ff6c20ec9bb 21426->21427 21428 7ff6c20ec9c4 21427->21428 21429 7ff6c20ec9cc EnterCriticalSection 21427->21429 21428->21373 21430 7ff6c20eca23 LeaveCriticalSection 21429->21430 21431 7ff6c20ec9e9 GdiplusStartup 21429->21431 21430->21373 21431->21430 21434 7ff6c20ec385 GdipGetImageHeight 21432->21434 21435 7ff6c20ec402 21434->21435 21436 7ff6c20ec40f GdipGetImageWidth 21434->21436 21435->21436 21437 7ff6c20ec424 21436->21437 21495 7ff6c20ec160 21437->21495 21439 7ff6c20ec445 21440 7ff6c20ec461 GdipGetImagePaletteSize 21439->21440 21441 7ff6c20ec5fc 21439->21441 21445 7ff6c20ec449 _Yarn 21439->21445 21449 7ff6c20ec47a std::_Locinfo::_Locinfo_ctor 21440->21449 21442 7ff6c20ec6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 21441->21442 21443 7ff6c20ec622 GdipBitmapLockBits 21441->21443 21442->21445 21443->21445 21447 7ff6c20ec66a _Yarn 21443->21447 21444 7ff6c20ec6c4 GdipBitmapUnlockBits 21444->21445 21445->21380 21446 7ff6c20ec78d memcpy_s 21502 7ff6c2108d9c 11 API calls _get_daylight 21446->21502 21447->21444 21447->21446 21449->21445 21450 7ff6c20ec4e7 GdipGetImagePalette 21449->21450 21456 7ff6c20ec4fb 21450->21456 21451 7ff6c20ec799 21503 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21451->21503 21453 7ff6c20ec7a4 21504 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21453->21504 21456->21445 21456->21456 21457 7ff6c20ec5aa SetDIBColorTable 21456->21457 21500 7ff6c20e6280 56 API calls 21456->21500 21457->21441 21459 7ff6c20ec5c4 SelectObject 21457->21459 21501 7ff6c20e6280 56 API calls 21459->21501 21460 7ff6c20ec564 21463 7ff6c20ec58e SelectObject 21460->21463 21464 7ff6c20ec586 CreateCompatibleDC 21460->21464 21462 7ff6c20ec5db 21462->21441 21465 7ff6c20ec5f3 DeleteDC 21462->21465 21463->21457 21464->21463 21465->21441 21467 7ff6c20ec9b0 61 API calls 21466->21467 21468 7ff6c20ec7d4 21467->21468 21469 7ff6c20ec992 21468->21469 21470 7ff6c20ec7dc GdipGetImageEncodersSize 21468->21470 21469->21390 21470->21469 21473 7ff6c20ec7f2 std::_Locinfo::_Locinfo_ctor 21470->21473 21471 7ff6c20ec861 _Yarn 21471->21390 21472 7ff6c20ec86b GdipGetImageEncoders 21472->21471 21474 7ff6c20ec87f 21472->21474 21473->21471 21473->21472 21474->21471 21475 7ff6c20ec923 GdipCreateBitmapFromHBITMAP 21474->21475 21476 7ff6c20ec8f1 GdipCreateBitmapFromScan0 21474->21476 21477 7ff6c20ec933 GdipSaveImageToStream 21475->21477 21476->21477 21478 7ff6c20ec951 GdipDisposeImage 21477->21478 21479 7ff6c20ec95e GdipDisposeImage 21477->21479 21478->21471 21479->21471 21481 7ff6c20ea0d7 21480->21481 21484 7ff6c20ea001 21480->21484 21506 7ff6c20e61c0 49 API calls 21481->21506 21485 7ff6c20ea033 21484->21485 21486 7ff6c20ea08c 21484->21486 21491 7ff6c20ea007 _Yarn 21484->21491 21487 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21485->21487 21488 7ff6c20ea0d1 21485->21488 21489 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21486->21489 21490 7ff6c20ea049 21487->21490 21505 7ff6c20e19d0 49 API calls 2 library calls 21488->21505 21489->21491 21490->21491 21493 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21490->21493 21491->21404 21493->21488 21496 7ff6c20ec19b memcpy_s 21495->21496 21497 7ff6c20ec202 CreateDIBSection 21496->21497 21499 7ff6c20ec249 _Yarn 21496->21499 21498 7ff6c20ec227 GetObjectW 21497->21498 21497->21499 21498->21499 21499->21439 21500->21460 21501->21462 21502->21451 21503->21453 21505->21481 21507->21338 21508->21340 21509->21338 21511 7ff6c20e8164 memcpy_s 21510->21511 21513 7ff6c20e80f6 memcpy_s 21510->21513 21512 7ff6c20fc400 77 API calls 21511->21512 21515 7ff6c20e8185 21512->21515 21547 7ff6c20fc400 21513->21547 21515->21515 21516 7ff6c20e823b 21515->21516 21517 7ff6c20e8337 21515->21517 21518 7ff6c20e8138 _Yarn 21515->21518 21519 7ff6c20e820f 21515->21519 21561 7ff6c20e9de0 49 API calls 4 library calls 21516->21561 21563 7ff6c20e9de0 49 API calls 4 library calls 21517->21563 21518->21278 21519->21518 21523 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21519->21523 21531 7ff6c20e8701 21519->21531 21522 7ff6c20e8356 21527 7ff6c20e9fd0 49 API calls 21522->21527 21525 7ff6c20e86f5 21523->21525 21524 7ff6c20e8256 21526 7ff6c20e9fd0 49 API calls 21524->21526 21528 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21525->21528 21532 7ff6c20e8286 21526->21532 21533 7ff6c20e8383 21527->21533 21529 7ff6c20e86fb 21528->21529 21530 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21529->21530 21530->21531 21534 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21531->21534 21562 7ff6c20e9d20 47 API calls _invalid_parameter_noinfo_noreturn 21532->21562 21564 7ff6c20e9d20 47 API calls _invalid_parameter_noinfo_noreturn 21533->21564 21537 7ff6c20e8707 21534->21537 21538 7ff6c20e8574 OutputDebugStringA 21539 7ff6c20e8598 MultiByteToWideChar 21538->21539 21543 7ff6c20e8611 _Yarn memcpy_s 21538->21543 21540 7ff6c20fdff4 21539->21540 21541 7ff6c20e85df MultiByteToWideChar 21540->21541 21541->21543 21542 7ff6c20e855c 21542->21538 21566 7ff6c20e9d20 47 API calls _invalid_parameter_noinfo_noreturn 21543->21566 21544 7ff6c20e82f3 _Yarn std::_Locinfo::_Locinfo_ctor 21544->21525 21544->21529 21544->21538 21544->21542 21565 7ff6c20ea170 49 API calls 4 library calls 21544->21565 21548 7ff6c20fc420 wsprintfW CreateFileW 21547->21548 21549 7ff6c20fc46d DeviceIoControl 21548->21549 21550 7ff6c20fc629 21548->21550 21551 7ff6c20fc620 CloseHandle 21549->21551 21553 7ff6c20fc4b8 _Yarn 21549->21553 21550->21518 21551->21550 21552 7ff6c20fc4e2 DeviceIoControl 21552->21553 21556 7ff6c20fc613 _Yarn 21552->21556 21553->21551 21553->21552 21554 7ff6c20fc53c DeviceIoControl 21553->21554 21555 7ff6c20fc5a0 DeviceIoControl 21553->21555 21557 7ff6c20fc640 WideCharToMultiByte WideCharToMultiByte 21553->21557 21567 7ff6c20fc2d0 21553->21567 21554->21551 21554->21553 21555->21553 21555->21556 21556->21551 21557->21553 21560 7ff6c20fc60f 21560->21550 21561->21524 21562->21544 21563->21522 21564->21544 21565->21544 21566->21519 21568 7ff6c20fc2f1 21567->21568 21569 7ff6c20fc3e9 CloseHandle 21568->21569 21570 7ff6c20fc34f CreateFileA 21568->21570 21569->21548 21569->21560 21570->21569 21571 7ff6c20fc388 _Yarn 21570->21571 21572 7ff6c20fc390 DeviceIoControl 21571->21572 21572->21569 21573 7ff6c20fc3cb 21572->21573 21576 7ff6c20fbef0 21573->21576 21577 7ff6c20fc2b0 CloseHandle 21576->21577 21595 7ff6c20fbf1d memcpy_s 21576->21595 21578 7ff6c20fc286 _Yarn 21578->21577 21579 7ff6c20fbf60 DeviceIoControl 21579->21578 21579->21595 21580 7ff6c20fbfac DeviceIoControl 21580->21595 21581 7ff6c20fc0ae DeviceIoControl 21581->21595 21582 7ff6c20fc028 GlobalAlloc 21583 7ff6c20fc040 DeviceIoControl 21582->21583 21582->21595 21585 7ff6c20fc09b GlobalFree 21583->21585 21583->21595 21584 7ff6c20fc10e GlobalAlloc 21586 7ff6c20fc123 DeviceIoControl 21584->21586 21584->21595 21585->21595 21587 7ff6c20fc161 21586->21587 21588 7ff6c20fc18c GlobalFree 21586->21588 21596 7ff6c20fc640 WideCharToMultiByte 21587->21596 21588->21595 21590 7ff6c20fc6e0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 21590->21595 21591 7ff6c20fc16a GlobalFree 21592 7ff6c20fc17b 21591->21592 21591->21595 21594 7ff6c20fc2d0 58 API calls 21592->21594 21592->21595 21594->21592 21595->21578 21595->21579 21595->21580 21595->21581 21595->21582 21595->21584 21595->21585 21595->21590 21595->21595 21600 7ff6c20fbe90 51 API calls 21595->21600 21597 7ff6c20fc6ba _Yarn 21596->21597 21598 7ff6c20fc681 21596->21598 21597->21591 21598->21597 21599 7ff6c20fc690 WideCharToMultiByte 21598->21599 21599->21597 21600->21595 21610 7ff6c210ee88 GetLastError 21601->21610 21603 7ff6c2108b70 ExitThread 21604 7ff6c2108b29 21604->21603 21605 7ff6c2108b45 21604->21605 21627 7ff6c211139c 5 API calls std::_Locinfo::_Locinfo_ctor 21604->21627 21607 7ff6c2108b59 21605->21607 21608 7ff6c2108b53 CloseHandle 21605->21608 21607->21603 21609 7ff6c2108b67 FreeLibraryAndExitThread 21607->21609 21608->21607 21609->21603 21611 7ff6c210eec9 FlsSetValue 21610->21611 21612 7ff6c210eeac 21610->21612 21613 7ff6c210eeb9 21611->21613 21614 7ff6c210eedb 21611->21614 21612->21611 21612->21613 21615 7ff6c210ef35 SetLastError 21613->21615 21616 7ff6c2110a28 _get_daylight 5 API calls 21614->21616 21615->21604 21617 7ff6c210eeea 21616->21617 21618 7ff6c210ef08 FlsSetValue 21617->21618 21619 7ff6c210eef8 FlsSetValue 21617->21619 21620 7ff6c210ef26 21618->21620 21621 7ff6c210ef14 FlsSetValue 21618->21621 21622 7ff6c210ef01 21619->21622 21628 7ff6c210eac0 11 API calls _get_daylight 21620->21628 21621->21622 21624 7ff6c210e95c __free_lconv_mon 5 API calls 21622->21624 21624->21613 21625 7ff6c210ef2e 21626 7ff6c210e95c __free_lconv_mon 5 API calls 21625->21626 21626->21615 21627->21605 21628->21625 22362 7ff6c20e9380 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22409 7ff6c20ec080 64 API calls 22500 7ff6c20f1280 8 API calls 22501 7ff6c20ebe80 12 API calls _Wcrtomb 22455 7ff6c21109ac 57 API calls _isindst 22502 7ff6c20e1a80 LeaveCriticalSection 22503 7ff6c210ceb0 GetCommandLineA GetCommandLineW 22456 7ff6c211edb0 WSACleanup 22411 7ff6c20e1078 InitializeCriticalSectionEx shared_ptr 22457 7ff6c20e11b0 HeapDestroy 22365 7ff6c210cb88 11 API calls 22414 7ff6c2118088 55 API calls 4 library calls 22366 7ff6c20eefa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22415 7ff6c20e98a0 83 API calls 22367 7ff6c21003a0 10 API calls 2 library calls 22416 7ff6c20e54a0 70 API calls 22461 7ff6c20e11a0 HeapSize 22463 7ff6c2114190 54 API calls 6 library calls 22506 7ff6c20ee697 79 API calls 4 library calls 22418 7ff6c20fc8d4 DeleteCriticalSection _Yarn 22464 7ff6c21115d8 FreeLibrary 22370 7ff6c20ebbd0 GetStringTypeW 22419 7ff6c20ebcd0 LCMapStringEx __crtLCMapStringW 22465 7ff6c20fd1d0 7 API calls _Yarn 22421 7ff6c20e18d0 47 API calls Concurrency::cancel_current_task 22508 7ff6c21152e0 60 API calls 4 library calls 22372 7ff6c211cfe0 RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 22509 7ff6c20ee2c8 143 API calls _Yarn 22373 7ff6c20ee3c7 ExitProcess 22374 7ff6c211a7e4 67 API calls 22422 7ff6c20fe0c4 48 API calls 2 library calls 22466 7ff6c21109e8 12 API calls 22376 7ff6c20ebfc0 GdipDisposeImage GdipFree 22467 7ff6c20f1dc0 48 API calls 22510 7ff6c20f12c0 HeapFree HeapDestroy HeapCreate HeapDestroy _Yarn 22378 7ff6c21173ec 54 API calls 5 library calls 22379 7ff6c20eeff2 187 API calls 22380 7ff6c20e3ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22469 7ff6c211d1bc 57 API calls 2 library calls 22382 7ff6c20ee3e9 14 API calls 22383 7ff6c20eb3e0 CloseHandle RtlPcToFileHeader RaiseException 21629 7ff6c20fe0e0 21652 7ff6c20fdd80 21629->21652 21632 7ff6c20fe101 21635 7ff6c20fe241 21632->21635 21637 7ff6c20fe11f 21632->21637 21633 7ff6c20fe237 21672 7ff6c20fe66c 7 API calls 2 library calls 21633->21672 21673 7ff6c20fe66c 7 API calls 2 library calls 21635->21673 21638 7ff6c20fe144 21637->21638 21641 7ff6c20fe161 __scrt_release_startup_lock 21637->21641 21658 7ff6c210cde4 21637->21658 21639 7ff6c20fe24c BuildCatchObjectHelperInternal 21642 7ff6c20fe1ca 21641->21642 21669 7ff6c210bfd4 47 API calls 21641->21669 21662 7ff6c210c6ec 21642->21662 21645 7ff6c20fe1cf 21668 7ff6c20fbdf0 10 API calls 21645->21668 21647 7ff6c20fe1ec 21670 7ff6c20fe7c0 GetModuleHandleW 21647->21670 21649 7ff6c20fe1f3 21649->21639 21671 7ff6c20fdf04 7 API calls 21649->21671 21651 7ff6c20fe20a 21651->21638 21653 7ff6c20fdd88 21652->21653 21654 7ff6c20fdd94 __scrt_dllmain_crt_thread_attach 21653->21654 21655 7ff6c20fdda1 21654->21655 21657 7ff6c20fdd9d 21654->21657 21655->21657 21674 7ff6c21003c8 7 API calls 2 library calls 21655->21674 21657->21632 21657->21633 21659 7ff6c210cde9 21658->21659 21660 7ff6c210ce1a 21658->21660 21659->21660 21675 7ff6c20e1000 WSAStartup 21659->21675 21660->21641 21663 7ff6c210c6fc 21662->21663 21667 7ff6c210c711 21662->21667 21663->21667 21682 7ff6c210c3a8 50 API calls __free_lconv_mon 21663->21682 21665 7ff6c210c71a 21665->21667 21683 7ff6c210c578 12 API calls 3 library calls 21665->21683 21667->21645 21668->21647 21669->21642 21670->21649 21671->21651 21672->21635 21673->21639 21674->21657 21678 7ff6c20fdf6c 21675->21678 21681 7ff6c20fdf30 50 API calls 21678->21681 21680 7ff6c20e103a 21680->21659 21681->21680 21682->21665 21683->21667 21684 7ff6c20fb5e0 21742 7ff6c2109ebc 21684->21742 21687 7ff6c20fb653 21689 7ff6c20fb660 GetCurrentProcess OpenProcessToken 21687->21689 21690 7ff6c20fb72f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21687->21690 21688 7ff6c20fb623 21691 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21688->21691 21692 7ff6c20fb6d4 GetModuleHandleA GetProcAddress 21689->21692 21693 7ff6c20fb67f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21689->21693 21750 7ff6c2108be0 21690->21750 21695 7ff6c20fb62d 21691->21695 21692->21690 21696 7ff6c20fb6f9 GetCurrentProcessId OpenProcess 21692->21696 21693->21692 21698 7ff6c2108be0 52 API calls 21695->21698 21696->21690 21699 7ff6c20fb64a CloseHandle 21698->21699 21699->21687 21700 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21701 7ff6c20fb7bd 21700->21701 21768 7ff6c20e36e0 WSAStartup CreateEventW 21701->21768 21703 7ff6c20fb7cc 21704 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21703->21704 21705 7ff6c20fb7d9 21704->21705 21769 7ff6c20eb410 CreateEventW 21705->21769 21707 7ff6c20fb7e8 21802 7ff6c20fae60 RegOpenKeyExW 21707->21802 21710 7ff6c20fb85a CheckTokenMembership 21712 7ff6c20fb874 21710->21712 21713 7ff6c20fb87b FreeSid 21710->21713 21711 7ff6c20fb888 21714 7ff6c20fb891 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21711->21714 21725 7ff6c20fb90c 21711->21725 21712->21713 21713->21711 21714->21725 21715 7ff6c2108a40 47 API calls std::_Locinfo::_Locinfo_ctor 21715->21725 21716 7ff6c2109ebc ProcessCodePage 47 API calls 21717 7ff6c20fba23 SleepEx 21716->21717 21718 7ff6c2109ebc ProcessCodePage 47 API calls 21717->21718 21718->21725 21719 7ff6c2109ebc ProcessCodePage 47 API calls 21719->21725 21720 7ff6c20fba98 CreateEventA 21721 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21720->21721 21721->21725 21723 7ff6c20fbb49 Sleep 21727 7ff6c20fbb3d 21723->21727 21724 7ff6c20fbb7f Sleep 21724->21725 21725->21715 21725->21716 21725->21719 21725->21720 21726 7ff6c20fbbe9 CloseHandle 21725->21726 21725->21727 21728 7ff6c20fbbfd 21725->21728 21835 7ff6c20e3820 ResetEvent timeGetTime socket 21725->21835 21848 7ff6c20e6370 21725->21848 21726->21725 21727->21723 21727->21724 21727->21726 21729 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21728->21729 21730 7ff6c20fbc02 IsDebuggerPresent 21729->21730 21731 7ff6c20fbc31 LoadLibraryW 21730->21731 21732 7ff6c20fbc26 21730->21732 21733 7ff6c20fbc60 GetProcAddress 21731->21733 21739 7ff6c20fbc56 21731->21739 21734 7ff6c20fbc93 memcpy_s 21733->21734 21735 7ff6c20fbc80 FreeLibrary 21733->21735 21736 7ff6c20fbcb5 GetLocalTime wsprintfW CreateFileW 21734->21736 21735->21739 21737 7ff6c20fbd55 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess 21736->21737 21738 7ff6c20fbd47 FreeLibrary 21736->21738 21740 7ff6c20fbda4 CloseHandle FreeLibrary 21737->21740 21738->21739 21740->21739 21743 7ff6c2109eec 21742->21743 21973 7ff6c2109720 21743->21973 21747 7ff6c20fb60b SleepEx 21747->21687 21747->21688 21748 7ff6c2109f40 21748->21747 21993 7ff6c2103bec 47 API calls 2 library calls 21748->21993 21751 7ff6c2108c17 21750->21751 21752 7ff6c2108c00 21750->21752 22002 7ff6c2108b7c 21751->22002 22009 7ff6c2108d9c 11 API calls _get_daylight 21752->22009 21755 7ff6c2108c05 22010 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21755->22010 21757 7ff6c2108c2a CreateThread 21759 7ff6c2108c5a GetLastError 21757->21759 21760 7ff6c20fb7aa CloseHandle 21757->21760 22011 7ff6c2108d10 11 API calls 2 library calls 21759->22011 21760->21700 21762 7ff6c2108c67 21763 7ff6c2108c76 21762->21763 21764 7ff6c2108c70 CloseHandle 21762->21764 21765 7ff6c2108c7f FreeLibrary 21763->21765 21766 7ff6c2108c85 21763->21766 21764->21763 21765->21766 21767 7ff6c210e95c __free_lconv_mon 11 API calls 21766->21767 21767->21760 21768->21703 21770 7ff6c20eb7b0 21769->21770 21771 7ff6c20eb457 21769->21771 22029 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21770->22029 22012 7ff6c20e1200 21771->22012 21774 7ff6c20eb7bb 22030 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21774->22030 21777 7ff6c20eb4d2 HeapCreate 21778 7ff6c20eb7c6 21777->21778 21779 7ff6c20eb521 _Yarn 21777->21779 22031 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21778->22031 21780 7ff6c20eb560 InitializeCriticalSectionAndSpinCount 21779->21780 21782 7ff6c20eb7d1 21780->21782 21783 7ff6c20eb57d CreateEventW 21780->21783 22032 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21782->22032 21784 7ff6c20eb7dc 21783->21784 21785 7ff6c20eb5b8 CreateEventW 21783->21785 22033 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21784->22033 21788 7ff6c20eb7e7 21785->21788 21789 7ff6c20eb5d8 CreateEventW 21785->21789 22034 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21788->22034 21791 7ff6c20eb7f2 21789->21791 21792 7ff6c20eb5f8 InitializeCriticalSectionAndSpinCount 21789->21792 22035 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21791->22035 21794 7ff6c20eb6c1 InitializeCriticalSectionAndSpinCount 21792->21794 21795 7ff6c20eb7fd 21792->21795 21797 7ff6c20eb6d5 timeGetTime CreateEventW CreateEventW 21794->21797 21798 7ff6c20eb7a6 21794->21798 22036 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21795->22036 21801 7ff6c20eb77e 21797->21801 22028 7ff6c20e10f0 RtlPcToFileHeader RaiseException _com_raise_error 21798->22028 21801->21707 21803 7ff6c20fae9f RegQueryValueExW 21802->21803 21804 7ff6c20faecc memcpy_s 21802->21804 21803->21804 21805 7ff6c20faf02 RegQueryValueExW lstrlenW 21804->21805 21833 7ff6c20fb551 AllocateAndInitializeSid 21804->21833 22039 7ff6c211da50 21805->22039 21807 7ff6c20faf50 lstrlenW lstrlenW 21808 7ff6c20faff8 lstrlenW 21807->21808 21814 7ff6c20faf79 _Yarn 21807->21814 21809 7ff6c211da50 memcpy_s 21808->21809 21810 7ff6c20fb01d lstrlenW lstrlenW 21809->21810 21811 7ff6c20fb0c8 lstrlenW lstrlenW 21810->21811 21818 7ff6c20fb04a _Yarn 21810->21818 21812 7ff6c20fb15a lstrlenW 21811->21812 21820 7ff6c20fb0f1 21811->21820 21813 7ff6c211da50 memcpy_s 21812->21813 21815 7ff6c20fb17f lstrlenW lstrlenW 21813->21815 21814->21808 21816 7ff6c20fb228 lstrlenW 21815->21816 21824 7ff6c20fb1ac _Yarn 21815->21824 21817 7ff6c211da50 memcpy_s 21816->21817 21819 7ff6c20fb24d lstrlenW lstrlenW 21817->21819 21818->21811 21821 7ff6c20fb2f8 lstrlenW lstrlenW 21819->21821 21828 7ff6c20fb27a _Yarn 21819->21828 21820->21812 21822 7ff6c20fb38a lstrlenW 21821->21822 21830 7ff6c20fb321 21821->21830 21823 7ff6c211da50 memcpy_s 21822->21823 21825 7ff6c20fb3af lstrlenW lstrlenW 21823->21825 21824->21816 21826 7ff6c20fb458 lstrlenW 21825->21826 21832 7ff6c20fb3dc _Yarn 21825->21832 21827 7ff6c211da50 memcpy_s 21826->21827 21829 7ff6c20fb47d lstrlenW lstrlenW 21827->21829 21828->21821 21831 7ff6c20fb528 lstrlenW lstrlenW 21829->21831 21834 7ff6c20fb4aa _Yarn 21829->21834 21830->21822 21831->21833 21832->21826 21833->21710 21833->21711 21834->21831 21836 7ff6c20e3893 lstrlenW WideCharToMultiByte 21835->21836 21847 7ff6c20e3ad9 21835->21847 21837 7ff6c20fdff4 21836->21837 21838 7ff6c20e38d4 lstrlenW WideCharToMultiByte gethostbyname 21837->21838 21839 7ff6c20e391d 21838->21839 21840 7ff6c20e392e htons connect 21839->21840 21839->21847 21841 7ff6c20e3971 setsockopt setsockopt setsockopt setsockopt 21840->21841 21840->21847 21842 7ff6c20e3a37 WSAIoctl 21841->21842 21843 7ff6c20e3a86 21841->21843 21842->21843 21844 7ff6c2108be0 52 API calls 21843->21844 21845 7ff6c20e3ab0 21844->21845 21846 7ff6c2108be0 52 API calls 21845->21846 21846->21847 21847->21725 21849 7ff6c20e639d std::_Locinfo::_Locinfo_ctor 21848->21849 21850 7ff6c20fdfb8 std::_Facet_Register 49 API calls 21849->21850 21852 7ff6c20e63aa memcpy_s 21850->21852 21851 7ff6c20e63de memcpy_s 21854 7ff6c20e63f6 gethostname gethostbyname 21851->21854 21852->21851 21853 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21852->21853 21853->21851 21855 7ff6c20e6432 inet_ntoa 21854->21855 21856 7ff6c20e64cf 8 API calls 21854->21856 22124 7ff6c21091f8 47 API calls 2 library calls 21855->22124 21857 7ff6c20e65be GetProcAddress 21856->21857 21858 7ff6c20e66dc GetSystemInfo wsprintfW 21856->21858 21860 7ff6c20e66d3 FreeLibrary 21857->21860 21861 7ff6c20e65d7 21857->21861 21862 7ff6c20e6720 GetDriveTypeW 21858->21862 21860->21858 22041 7ff6c20e3670 21861->22041 21864 7ff6c20e6741 GetDiskFreeSpaceExW 21862->21864 21865 7ff6c20e6778 21862->21865 21863 7ff6c20e6455 22125 7ff6c21091f8 47 API calls 2 library calls 21863->22125 21864->21865 21865->21862 21867 7ff6c20e677f GlobalMemoryStatusEx 21865->21867 21869 7ff6c20e3670 50 API calls 21867->21869 21871 7ff6c20e67e2 21869->21871 21870 7ff6c20e6620 22045 7ff6c20e9300 GetModuleHandleW GetProcAddress 21870->22045 21873 7ff6c20e3670 50 API calls 21871->21873 21872 7ff6c20e6480 inet_ntoa 22126 7ff6c21091f8 47 API calls 2 library calls 21872->22126 21875 7ff6c20e6806 21873->21875 22049 7ff6c20e8f60 CreateDXGIFactory 21875->22049 21876 7ff6c20e646d 21876->21856 21876->21872 22127 7ff6c21091f8 47 API calls 2 library calls 21876->22127 21881 7ff6c20e6819 GetForegroundWindow 21882 7ff6c20e6824 GetWindowTextW 21881->21882 21883 7ff6c20e683a lstrlenW 21881->21883 21882->21883 22061 7ff6c20e8e30 21883->22061 21886 7ff6c20e66a2 21887 7ff6c20e66c0 RegCloseKey 21886->21887 21890 7ff6c21094e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21886->21890 21889 7ff6c20fdf84 21887->21889 21888 7ff6c20e687a 21891 7ff6c20e68a3 21888->21891 21892 7ff6c20e687f GetLocalTime wsprintfW 21888->21892 21889->21860 21890->21887 21893 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21891->21893 21892->21891 21894 7ff6c20e68bb lstrlenW 21893->21894 21895 7ff6c20e8e30 6 API calls 21894->21895 21896 7ff6c20e68df 21895->21896 21897 7ff6c20e68f8 GetModuleHandleW GetProcAddress 21896->21897 21898 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21896->21898 21899 7ff6c20e6931 GetSystemInfo 21897->21899 21900 7ff6c20e692d GetNativeSystemInfo 21897->21900 21898->21897 21901 7ff6c20e6937 wsprintfW 21899->21901 21900->21901 22070 7ff6c20e8c30 21901->22070 21904 7ff6c20e6986 GetCurrentProcessId 21905 7ff6c20e6ade CoInitializeEx CoCreateInstance 21904->21905 21906 7ff6c20e699c OpenProcess 21904->21906 21907 7ff6c20e6c0f 21905->21907 21937 7ff6c20e6b15 21905->21937 21908 7ff6c20e69bd K32GetProcessImageFileNameW 21906->21908 21909 7ff6c20e6ad7 21906->21909 21913 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21907->21913 21910 7ff6c20e6ace CloseHandle 21908->21910 21911 7ff6c20e69db GetLogicalDriveStringsW 21908->21911 21909->21905 21910->21909 21912 7ff6c20e6abe lstrcpyW 21911->21912 21929 7ff6c20e69f5 21911->21929 21912->21910 21914 7ff6c20e6c2b memcpy_s 21913->21914 21916 7ff6c20e6c46 RegOpenKeyExW 21914->21916 21915 7ff6c20e6a10 lstrcmpiW 21917 7ff6c20e6a32 lstrcmpiW 21915->21917 21915->21929 21918 7ff6c20e6dd2 lstrlenW 21916->21918 21919 7ff6c20e6c75 RegQueryInfoKeyW 21916->21919 21920 7ff6c20e6a46 QueryDosDeviceW 21917->21920 21917->21929 21921 7ff6c20e6e02 21918->21921 21922 7ff6c20e6de4 21918->21922 21919->21921 21931 7ff6c20e6cd5 memcpy_s 21919->21931 21920->21910 21923 7ff6c20e6a80 lstrlenW 21920->21923 22099 7ff6c20e7a60 21921->22099 22090 7ff6c21094e8 21922->22090 22128 7ff6c210934c 53 API calls 3 library calls 21923->22128 21926 7ff6c20e6bfe CoUninitialize 21926->21907 21929->21912 21929->21915 21930 7ff6c20e6f0d lstrcpyW lstrcatW 21929->21930 21930->21910 21931->21918 21934 7ff6c20e6dc7 RegCloseKey 21931->21934 21940 7ff6c20e6d34 RegEnumKeyExW lstrlenW 21931->21940 21945 7ff6c2108dc4 47 API calls std::_Locinfo::_Locinfo_ctor 21931->21945 21932 7ff6c21094e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21933 7ff6c20e6e21 GetTickCount 21932->21933 22117 7ff6c2108e3c GetSystemTimeAsFileTime 21933->22117 21934->21918 21937->21907 21937->21926 21939 7ff6c20e6bb6 SysFreeString 21937->21939 21939->21937 21940->21931 21943 7ff6c20e6d77 lstrlenW 21940->21943 21942 7ff6c20e6eff 21944 7ff6c20e72d0 116 API calls 21942->21944 21943->21931 21946 7ff6c20e6f51 lstrlenW 21944->21946 21945->21931 21947 7ff6c20e8e30 6 API calls 21946->21947 21948 7ff6c20e6f8a 21947->21948 21949 7ff6c20e6f93 6 API calls 21948->21949 21950 7ff6c20e7067 CreateToolhelp32Snapshot 21948->21950 21951 7ff6c20e705a RegCloseKey 21949->21951 21952 7ff6c20e7018 lstrlenW RegSetValueExW 21949->21952 21953 7ff6c20e7081 memcpy_s 21950->21953 21954 7ff6c20e7108 CreateToolhelp32Snapshot 21950->21954 21951->21950 21952->21951 21956 7ff6c20e704d RegCloseKey 21952->21956 21959 7ff6c20e7095 Process32FirstW 21953->21959 21957 7ff6c20e712b memcpy_s 21954->21957 21958 7ff6c20e71b8 CreateToolhelp32Snapshot 21954->21958 21956->21951 21963 7ff6c20e713f Process32FirstW 21957->21963 21961 7ff6c20e7264 21958->21961 21962 7ff6c20e71db memcpy_s 21958->21962 21959->21954 21966 7ff6c20e70b3 21959->21966 21972 7ff6c20e3e30 10 API calls 21961->21972 21967 7ff6c20e71ef Process32FirstW 21962->21967 21963->21958 21969 7ff6c20e715d 21963->21969 21964 7ff6c20e729c 21964->21725 21965 7ff6c20e70f4 Process32NextW 21965->21954 21965->21966 21966->21954 21966->21965 21967->21961 21971 7ff6c20e720d 21967->21971 21968 7ff6c20e71a4 Process32NextW 21968->21958 21968->21969 21969->21958 21969->21968 21970 7ff6c20e7250 Process32NextW 21970->21961 21970->21971 21971->21961 21971->21970 21972->21964 21974 7ff6c2109758 21973->21974 21975 7ff6c210976a 21973->21975 21994 7ff6c2108d9c 11 API calls _get_daylight 21974->21994 21976 7ff6c21097b4 21975->21976 21978 7ff6c2109778 21975->21978 21984 7ff6c21097cf ProcessCodePage 21976->21984 21997 7ff6c2108400 47 API calls ProcessCodePage 21976->21997 21996 7ff6c2103f0c 47 API calls _invalid_parameter_noinfo_noreturn 21978->21996 21979 7ff6c210975d 21995 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21979->21995 21983 7ff6c2109b55 21990 7ff6c2109768 21983->21990 22000 7ff6c2108d9c 11 API calls _get_daylight 21983->22000 21984->21983 21998 7ff6c2108d9c 11 API calls _get_daylight 21984->21998 21987 7ff6c2109b4a 21999 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21987->21999 21988 7ff6c2109de6 22001 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 21988->22001 21990->21748 21992 7ff6c2103bec 47 API calls 2 library calls 21990->21992 21992->21748 21993->21747 21994->21979 21995->21990 21996->21990 21997->21984 21998->21987 21999->21983 22000->21988 22001->21990 22003 7ff6c2110a28 _get_daylight 11 API calls 22002->22003 22004 7ff6c2108b9e 22003->22004 22005 7ff6c210e95c __free_lconv_mon 11 API calls 22004->22005 22006 7ff6c2108ba8 22005->22006 22007 7ff6c2108bad 22006->22007 22008 7ff6c2108bb1 GetModuleHandleExW 22006->22008 22007->21757 22007->21760 22008->22007 22009->21755 22010->21760 22011->21762 22013 7ff6c20e1221 22012->22013 22014 7ff6c20e1270 22012->22014 22037 7ff6c20fdccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 22013->22037 22015 7ff6c20e12f3 22014->22015 22038 7ff6c20fdccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 22014->22038 22015->21774 22015->21777 22040 7ff6c211da40 22039->22040 22040->21807 22040->22040 22042 7ff6c20e3695 22041->22042 22129 7ff6c210892c 22042->22129 22046 7ff6c20e9341 GetSystemInfo 22045->22046 22047 7ff6c20e933d GetNativeSystemInfo 22045->22047 22048 7ff6c20e6642 RegOpenKeyExW RegQueryValueExW 22046->22048 22047->22048 22048->21886 22048->21887 22051 7ff6c20e92a3 22049->22051 22055 7ff6c20e8fba 22049->22055 22050 7ff6c20e92d5 22050->21881 22051->22050 22052 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22051->22052 22053 7ff6c20e92f6 22052->22053 22056 7ff6c2103ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22053->22056 22059 7ff6c20e9035 22055->22059 22143 7ff6c20ea4c0 49 API calls _Yarn 22055->22143 22057 7ff6c20e92fc 22056->22057 22059->22051 22059->22053 22060 7ff6c20e3670 50 API calls 22059->22060 22144 7ff6c20ea4c0 49 API calls _Yarn 22059->22144 22060->22059 22062 7ff6c211da50 memcpy_s 22061->22062 22063 7ff6c20e8e71 RegOpenKeyExW 22062->22063 22064 7ff6c20e8e9c 22063->22064 22065 7ff6c20e8ea6 22063->22065 22067 7ff6c20e8f28 RegCloseKey RegCloseKey 22064->22067 22066 7ff6c20e8eb4 RegQueryValueExW 22065->22066 22065->22067 22066->22067 22068 7ff6c20e8ef3 lstrcmpW 22066->22068 22067->21888 22068->22064 22069 7ff6c20e8f10 lstrcpyW 22068->22069 22069->22067 22071 7ff6c20fdff4 22070->22071 22072 7ff6c20e8c48 GetCurrentProcessId wsprintfW 22071->22072 22145 7ff6c20e8a40 GetCurrentProcessId OpenProcess 22072->22145 22074 7ff6c20e8c70 memcpy_s 22075 7ff6c20e8c84 GetVersionExW 22074->22075 22076 7ff6c20e8df2 22075->22076 22077 7ff6c20e8c9f 22075->22077 22078 7ff6c20e8df9 wsprintfW 22076->22078 22077->22076 22080 7ff6c20e8cb5 GetCurrentProcess OpenProcessToken 22077->22080 22079 7ff6c20e8e09 22078->22079 22079->21904 22080->22076 22081 7ff6c20e8ce1 GetTokenInformation 22080->22081 22082 7ff6c20e8d9c CloseHandle 22081->22082 22083 7ff6c20e8d16 GetLastError 22081->22083 22082->22076 22089 7ff6c20e8dae 22082->22089 22083->22082 22084 7ff6c20e8d21 LocalAlloc 22083->22084 22085 7ff6c20e8d94 22084->22085 22086 7ff6c20e8d43 GetTokenInformation 22084->22086 22085->22082 22087 7ff6c20e8d72 GetSidSubAuthorityCount GetSidSubAuthority 22086->22087 22088 7ff6c20e8d8b LocalFree 22086->22088 22087->22088 22088->22085 22089->22078 22089->22079 22095 7ff6c2109505 22090->22095 22091 7ff6c210950a 22093 7ff6c2109520 22091->22093 22265 7ff6c2108d9c 11 API calls _get_daylight 22091->22265 22093->21921 22094 7ff6c2109514 22266 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 22094->22266 22095->22091 22095->22093 22097 7ff6c2109556 22095->22097 22097->22093 22267 7ff6c2108d9c 11 API calls _get_daylight 22097->22267 22102 7ff6c20e7a93 memcpy_s 22099->22102 22100 7ff6c20e7b7c CoCreateInstance 22101 7ff6c20e7da1 lstrlenW 22100->22101 22113 7ff6c20e7bad memcpy_s 22100->22113 22103 7ff6c20e6e07 22101->22103 22104 7ff6c20e7dae lstrcatW 22101->22104 22102->22100 22105 7ff6c20e7ae4 CreateToolhelp32Snapshot 22102->22105 22109 7ff6c20e7de5 CloseHandle 22102->22109 22110 7ff6c20e7b3f Process32NextW 22102->22110 22103->21932 22104->22103 22105->22102 22107 7ff6c20e7afa Process32FirstW 22105->22107 22106 7ff6c20e7d8f 22106->22101 22107->22102 22108 7ff6c20e7b4d CloseHandle 22107->22108 22108->22102 22109->22102 22112 7ff6c20e7df5 lstrcatW lstrcatW 22109->22112 22110->22102 22110->22108 22111 7ff6c20e7c35 wsprintfW RegOpenKeyExW 22111->22113 22112->22102 22113->22106 22113->22111 22114 7ff6c20e7cf7 RegQueryValueExW 22113->22114 22115 7ff6c20e7d60 RegCloseKey 22114->22115 22116 7ff6c20e7d40 lstrcatW lstrcatW 22114->22116 22115->22113 22116->22115 22118 7ff6c20e6e32 22117->22118 22119 7ff6c21091b0 22118->22119 22268 7ff6c2111a1c 22119->22268 22123 7ff6c20e6e52 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 22123->21942 22124->21863 22125->21876 22126->21876 22127->21876 22128->21929 22131 7ff6c2108965 22129->22131 22130 7ff6c21089a8 22135 7ff6c21089e7 22130->22135 22140 7ff6c2103f0c 47 API calls _invalid_parameter_noinfo_noreturn 22130->22140 22131->22130 22139 7ff6c2104280 50 API calls 3 library calls 22131->22139 22134 7ff6c2108a0d 22137 7ff6c20e36b4 22134->22137 22142 7ff6c2103bec 47 API calls 2 library calls 22134->22142 22135->22134 22141 7ff6c2103bec 47 API calls 2 library calls 22135->22141 22137->21870 22139->22130 22140->22135 22141->22134 22142->22137 22143->22055 22144->22059 22146 7ff6c20e8a71 OpenProcessToken 22145->22146 22147 7ff6c20e8a99 22145->22147 22148 7ff6c20e8a90 CloseHandle 22146->22148 22149 7ff6c20e8aaf 22146->22149 22147->22074 22148->22147 22184 7ff6c20e8710 22149->22184 22151 7ff6c20e8acd 22152 7ff6c20e8b03 22151->22152 22153 7ff6c20e8ae1 SysStringLen 22151->22153 22154 7ff6c20e8ae9 22151->22154 22155 7ff6c20e8b4c _Yarn 22152->22155 22156 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22152->22156 22153->22154 22154->22152 22158 7ff6c20e8af9 SysStringLen 22154->22158 22157 7ff6c20e8b5a CloseHandle CloseHandle 22155->22157 22159 7ff6c20e8b1e 22156->22159 22160 7ff6c20e8b88 22157->22160 22163 7ff6c20e8baa 22157->22163 22158->22152 22159->22155 22165 7ff6c20e8c20 22159->22165 22162 7ff6c20e8ba1 SysFreeString 22160->22162 22160->22163 22161 7ff6c20e8be5 SysFreeString 22164 7ff6c20e8bee 22161->22164 22162->22163 22163->22161 22163->22164 22164->22074 22166 7ff6c20e8c48 GetCurrentProcessId wsprintfW 22165->22166 22167 7ff6c20e8a40 87 API calls 22166->22167 22168 7ff6c20e8c70 memcpy_s 22167->22168 22169 7ff6c20e8c84 GetVersionExW 22168->22169 22170 7ff6c20e8df2 22169->22170 22171 7ff6c20e8c9f 22169->22171 22172 7ff6c20e8df9 wsprintfW 22170->22172 22171->22170 22174 7ff6c20e8cb5 GetCurrentProcess OpenProcessToken 22171->22174 22173 7ff6c20e8e09 22172->22173 22173->22074 22174->22170 22175 7ff6c20e8ce1 GetTokenInformation 22174->22175 22176 7ff6c20e8d9c CloseHandle 22175->22176 22177 7ff6c20e8d16 GetLastError 22175->22177 22176->22170 22183 7ff6c20e8dae 22176->22183 22177->22176 22178 7ff6c20e8d21 LocalAlloc 22177->22178 22179 7ff6c20e8d94 22178->22179 22180 7ff6c20e8d43 GetTokenInformation 22178->22180 22179->22176 22181 7ff6c20e8d72 GetSidSubAuthorityCount GetSidSubAuthority 22180->22181 22182 7ff6c20e8d8b LocalFree 22180->22182 22181->22182 22182->22179 22183->22172 22183->22173 22185 7ff6c20e8750 22184->22185 22186 7ff6c20e8794 22185->22186 22261 7ff6c20e6300 22185->22261 22189 7ff6c20e87f1 22186->22189 22190 7ff6c20e6300 SysFreeString 22186->22190 22218 7ff6c20e89ff 22186->22218 22188 7ff6c20e875d 22191 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22188->22191 22193 7ff6c20e880e GetTokenInformation 22189->22193 22189->22218 22194 7ff6c20e87ba 22190->22194 22192 7ff6c20e8767 22191->22192 22192->22186 22195 7ff6c20e8774 SysAllocString 22192->22195 22196 7ff6c20e8833 GetLastError 22193->22196 22197 7ff6c20e886c GetTokenInformation 22193->22197 22198 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22194->22198 22195->22186 22195->22218 22199 7ff6c20e8842 GetProcessHeap HeapAlloc 22196->22199 22196->22218 22200 7ff6c20e889a LookupAccountSidW 22197->22200 22221 7ff6c20e88f7 22197->22221 22201 7ff6c20e87c4 22198->22201 22199->22197 22199->22218 22203 7ff6c20e88d4 GetLastError 22200->22203 22204 7ff6c20e891b 22200->22204 22201->22189 22205 7ff6c20e87d1 SysAllocString 22201->22205 22202 7ff6c20e89eb GetProcessHeap HeapFree 22202->22218 22206 7ff6c20e88e1 22203->22206 22207 7ff6c20e88fc 22203->22207 22209 7ff6c20e896e 22204->22209 22210 7ff6c20e6300 SysFreeString 22204->22210 22205->22189 22205->22218 22208 7ff6c2108a40 std::_Locinfo::_Locinfo_ctor 47 API calls 22206->22208 22207->22151 22208->22221 22213 7ff6c20e6300 SysFreeString 22209->22213 22209->22218 22209->22221 22211 7ff6c20e8935 22210->22211 22212 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22211->22212 22214 7ff6c20e893f 22212->22214 22215 7ff6c20e899c 22213->22215 22214->22209 22216 7ff6c20e894c SysAllocString 22214->22216 22217 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22215->22217 22216->22209 22216->22218 22219 7ff6c20e89a6 22217->22219 22222 7ff6c20e8a40 GetCurrentProcessId OpenProcess 22218->22222 22220 7ff6c20e89b3 SysAllocString 22219->22220 22219->22221 22220->22218 22220->22221 22221->22202 22221->22218 22223 7ff6c20e8a71 OpenProcessToken 22222->22223 22224 7ff6c20e8a99 22222->22224 22225 7ff6c20e8a90 CloseHandle 22223->22225 22226 7ff6c20e8aaf 22223->22226 22224->22151 22225->22224 22227 7ff6c20e8710 74 API calls 22226->22227 22228 7ff6c20e8acd 22227->22228 22229 7ff6c20e8b03 22228->22229 22230 7ff6c20e8ae1 SysStringLen 22228->22230 22231 7ff6c20e8ae9 22228->22231 22232 7ff6c20e8b4c _Yarn 22229->22232 22233 7ff6c20fdfb8 std::_Facet_Register 49 API calls 22229->22233 22230->22231 22231->22229 22235 7ff6c20e8af9 SysStringLen 22231->22235 22234 7ff6c20e8b5a CloseHandle CloseHandle 22232->22234 22236 7ff6c20e8b1e 22233->22236 22237 7ff6c20e8b88 22234->22237 22240 7ff6c20e8baa 22234->22240 22235->22229 22236->22232 22242 7ff6c20e8c20 22236->22242 22239 7ff6c20e8ba1 SysFreeString 22237->22239 22237->22240 22238 7ff6c20e8be5 SysFreeString 22241 7ff6c20e8bee 22238->22241 22239->22240 22240->22238 22240->22241 22241->22151 22243 7ff6c20e8c48 GetCurrentProcessId wsprintfW 22242->22243 22244 7ff6c20e8a40 74 API calls 22243->22244 22245 7ff6c20e8c70 memcpy_s 22244->22245 22246 7ff6c20e8c84 GetVersionExW 22245->22246 22247 7ff6c20e8df2 22246->22247 22248 7ff6c20e8c9f 22246->22248 22249 7ff6c20e8df9 wsprintfW 22247->22249 22248->22247 22251 7ff6c20e8cb5 GetCurrentProcess OpenProcessToken 22248->22251 22250 7ff6c20e8e09 22249->22250 22250->22151 22251->22247 22252 7ff6c20e8ce1 GetTokenInformation 22251->22252 22253 7ff6c20e8d9c CloseHandle 22252->22253 22254 7ff6c20e8d16 GetLastError 22252->22254 22253->22247 22260 7ff6c20e8dae 22253->22260 22254->22253 22255 7ff6c20e8d21 LocalAlloc 22254->22255 22256 7ff6c20e8d94 22255->22256 22257 7ff6c20e8d43 GetTokenInformation 22255->22257 22256->22253 22258 7ff6c20e8d72 GetSidSubAuthorityCount GetSidSubAuthority 22257->22258 22259 7ff6c20e8d8b LocalFree 22257->22259 22258->22259 22259->22256 22260->22249 22260->22250 22262 7ff6c20e6315 22261->22262 22264 7ff6c20e6339 22261->22264 22263 7ff6c20e632c SysFreeString 22262->22263 22262->22264 22263->22264 22264->22188 22265->22094 22266->22093 22267->22094 22269 7ff6c210ee88 _get_daylight 11 API calls 22268->22269 22270 7ff6c2111a27 22269->22270 22271 7ff6c2111a4b 22270->22271 22272 7ff6c21091c7 22270->22272 22308 7ff6c210f070 22270->22308 22271->22272 22315 7ff6c2108d9c 11 API calls _get_daylight 22271->22315 22272->22123 22277 7ff6c2108eb0 22272->22277 22276 7ff6c210e95c __free_lconv_mon 11 API calls 22276->22271 22278 7ff6c2108ec6 22277->22278 22279 7ff6c2108ee1 22277->22279 22331 7ff6c2108d9c 11 API calls _get_daylight 22278->22331 22279->22278 22281 7ff6c2108efa 22279->22281 22283 7ff6c2108f00 22281->22283 22286 7ff6c2108f1d 22281->22286 22282 7ff6c2108ecb 22332 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 22282->22332 22333 7ff6c2108d9c 11 API calls _get_daylight 22283->22333 22318 7ff6c21125dc 22286->22318 22291 7ff6c2109197 22293 7ff6c2104028 _invalid_parameter_noinfo_noreturn 17 API calls 22291->22293 22295 7ff6c21091ac 22293->22295 22297 7ff6c2111a1c 12 API calls 22295->22297 22299 7ff6c21091c7 22297->22299 22301 7ff6c21091dc 22299->22301 22302 7ff6c2108eb0 61 API calls 22299->22302 22300 7ff6c2108f61 22303 7ff6c2108fda 22300->22303 22304 7ff6c2108f7a 22300->22304 22301->22123 22302->22301 22307 7ff6c2108ed7 22303->22307 22347 7ff6c2112620 47 API calls _isindst 22303->22347 22304->22307 22346 7ff6c2112620 47 API calls _isindst 22304->22346 22307->22123 22309 7ff6c210f0bb 22308->22309 22310 7ff6c210f07f _get_daylight 22308->22310 22317 7ff6c2108d9c 11 API calls _get_daylight 22309->22317 22310->22309 22311 7ff6c210f0a2 HeapAlloc 22310->22311 22316 7ff6c210ccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 22310->22316 22311->22310 22313 7ff6c210f0b9 22311->22313 22313->22276 22315->22272 22316->22310 22317->22313 22319 7ff6c2108f22 22318->22319 22320 7ff6c21125eb 22318->22320 22325 7ff6c2111704 22319->22325 22348 7ff6c210ae44 EnterCriticalSection 22320->22348 22322 7ff6c21125f3 22323 7ff6c2112604 22322->22323 22324 7ff6c211244c 61 API calls 22322->22324 22324->22323 22326 7ff6c211170d 22325->22326 22327 7ff6c2108f37 22325->22327 22349 7ff6c2108d9c 11 API calls _get_daylight 22326->22349 22327->22291 22334 7ff6c2111734 22327->22334 22329 7ff6c2111712 22350 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 22329->22350 22331->22282 22332->22307 22333->22307 22335 7ff6c211173d 22334->22335 22336 7ff6c2108f48 22334->22336 22351 7ff6c2108d9c 11 API calls _get_daylight 22335->22351 22336->22291 22340 7ff6c2111764 22336->22340 22338 7ff6c2111742 22352 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 22338->22352 22341 7ff6c211176d 22340->22341 22342 7ff6c2108f59 22340->22342 22353 7ff6c2108d9c 11 API calls _get_daylight 22341->22353 22342->22291 22342->22300 22344 7ff6c2111772 22354 7ff6c2103fd8 47 API calls _invalid_parameter_noinfo_noreturn 22344->22354 22346->22307 22347->22307 22349->22329 22350->22327 22351->22338 22352->22336 22353->22344 22354->22342 22473 7ff6c211edd0 DeleteDC DeleteDC DeleteDC DeleteDC 22384 7ff6c2115fd4 56 API calls 2 library calls 22385 7ff6c20ed410 393 API calls 6 library calls 22386 7ff6c20f1c10 50 API calls 22387 7ff6c20e5410 36 API calls 22474 7ff6c20fe20e GetModuleHandleW BuildCatchObjectHelperInternal 22520 7ff6c211ef24 DecodePointer 22521 7ff6c2110728 80 API calls __free_lconv_mon 22478 7ff6c20fee00 RtlPcToFileHeader RaiseException _com_raise_error _com_error::_com_error 22479 7ff6c20e5200 8 API calls _Yarn 22522 7ff6c20e5300 115 API calls 22390 7ff6c20fdffc 59 API calls 2 library calls 22480 7ff6c211ee30 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22523 7ff6c20eb331 17 API calls 22482 7ff6c210adfc 7 API calls 22435 7ff6c20e1130 HeapAlloc 22524 7ff6c211cf04 CloseHandle 22391 7ff6c20fe824 56 API calls 22484 7ff6c20ffa24 60 API calls __CxxCallCatchBlock 22525 7ff6c20eef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22485 7ff6c2110608 17 API calls 2 library calls 22486 7ff6c210be09 63 API calls 22392 7ff6c20f0c20 15 API calls _Yarn 22393 7ff6c20ec020 GdipCloneImage GdipAlloc 22394 7ff6c20ee01f 71 API calls memcpy_s 22438 7ff6c211e110 RegCloseKey RegCloseKey 22487 7ff6c20ee217 TerminateThread CloseHandle

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ff6c20e6370-7ff6c20e63c4 call 7ff6c20fe600 call 7ff6c20fdfb8 call 7ff6c211da50 7 7ff6c20e63de-7ff6c20e642c call 7ff6c211da50 gethostname gethostbyname 0->7 8 7ff6c20e63c6-7ff6c20e63d9 call 7ff6c2108a40 0->8 12 7ff6c20e6432-7ff6c20e647c inet_ntoa call 7ff6c21091f8 * 2 7->12 13 7ff6c20e64cf-7ff6c20e65b8 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 7->13 8->7 12->13 29 7ff6c20e647e 12->29 14 7ff6c20e65be-7ff6c20e65d1 GetProcAddress 13->14 15 7ff6c20e66dc-7ff6c20e6717 GetSystemInfo wsprintfW 13->15 17 7ff6c20e66d3-7ff6c20e66d6 FreeLibrary 14->17 18 7ff6c20e65d7-7ff6c20e6665 call 7ff6c20e3670 call 7ff6c20fdff4 call 7ff6c20e9300 14->18 19 7ff6c20e6720-7ff6c20e673f GetDriveTypeW 15->19 17->15 47 7ff6c20e666d-7ff6c20e66a0 RegOpenKeyExW RegQueryValueExW 18->47 48 7ff6c20e6667 18->48 21 7ff6c20e6741-7ff6c20e6775 GetDiskFreeSpaceExW 19->21 22 7ff6c20e6778-7ff6c20e677d 19->22 21->22 22->19 25 7ff6c20e677f-7ff6c20e6822 GlobalMemoryStatusEx call 7ff6c20e3670 * 2 call 7ff6c20e8f60 GetForegroundWindow 22->25 45 7ff6c20e6824-7ff6c20e6834 GetWindowTextW 25->45 46 7ff6c20e683a-7ff6c20e687d lstrlenW call 7ff6c20e8e30 25->46 32 7ff6c20e6480-7ff6c20e64cd inet_ntoa call 7ff6c21091f8 * 2 29->32 32->13 45->46 56 7ff6c20e68a3-7ff6c20e68e2 call 7ff6c2108a40 lstrlenW call 7ff6c20e8e30 46->56 57 7ff6c20e687f-7ff6c20e689d GetLocalTime wsprintfW 46->57 50 7ff6c20e66a2-7ff6c20e66a4 47->50 51 7ff6c20e66c0-7ff6c20e66ce RegCloseKey call 7ff6c20fdf84 47->51 48->47 50->51 52 7ff6c20e66a6-7ff6c20e66bb call 7ff6c21094e8 50->52 51->17 52->51 62 7ff6c20e68e4-7ff6c20e68f3 call 7ff6c2108a40 56->62 63 7ff6c20e68f8-7ff6c20e692b GetModuleHandleW GetProcAddress 56->63 57->56 62->63 65 7ff6c20e6931 GetSystemInfo 63->65 66 7ff6c20e692d-7ff6c20e692f GetNativeSystemInfo 63->66 67 7ff6c20e6937-7ff6c20e6943 65->67 66->67 68 7ff6c20e6945-7ff6c20e694f 67->68 69 7ff6c20e6951 67->69 68->69 70 7ff6c20e6956-7ff6c20e6996 wsprintfW call 7ff6c20e8c30 GetCurrentProcessId 68->70 69->70 73 7ff6c20e6ade-7ff6c20e6b0f CoInitializeEx CoCreateInstance 70->73 74 7ff6c20e699c-7ff6c20e69b7 OpenProcess 70->74 75 7ff6c20e6b15-7ff6c20e6b2a 73->75 76 7ff6c20e6c0f 73->76 77 7ff6c20e69bd-7ff6c20e69d5 K32GetProcessImageFileNameW 74->77 78 7ff6c20e6ad7 74->78 82 7ff6c20e6b30-7ff6c20e6b32 75->82 81 7ff6c20e6c16-7ff6c20e6c6f call 7ff6c2108a40 call 7ff6c211da50 RegOpenKeyExW 76->81 79 7ff6c20e6ace-7ff6c20e6ad1 CloseHandle 77->79 80 7ff6c20e69db-7ff6c20e69ef GetLogicalDriveStringsW 77->80 78->73 79->78 83 7ff6c20e69f5-7ff6c20e69fe 80->83 84 7ff6c20e6abe-7ff6c20e6ac8 lstrcpyW 80->84 95 7ff6c20e6dd2-7ff6c20e6de2 lstrlenW 81->95 96 7ff6c20e6c75-7ff6c20e6ccf RegQueryInfoKeyW 81->96 82->76 87 7ff6c20e6b38-7ff6c20e6b65 82->87 83->84 88 7ff6c20e6a04-7ff6c20e6a0b 83->88 84->79 106 7ff6c20e6bfe-7ff6c20e6c0d CoUninitialize 87->106 107 7ff6c20e6b6b 87->107 90 7ff6c20e6a10-7ff6c20e6a30 lstrcmpiW 88->90 93 7ff6c20e6a32-7ff6c20e6a44 lstrcmpiW 90->93 94 7ff6c20e6aae-7ff6c20e6ab8 90->94 93->94 97 7ff6c20e6a46-7ff6c20e6a7e QueryDosDeviceW 93->97 94->84 94->90 98 7ff6c20e6e02-7ff6c20e6efd call 7ff6c20e7a60 call 7ff6c21094e8 GetTickCount call 7ff6c2108e3c call 7ff6c21091b0 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 95->98 100 7ff6c20e6de4-7ff6c20e6dfd call 7ff6c21094e8 95->100 96->98 99 7ff6c20e6cd5-7ff6c20e6ce7 96->99 97->79 102 7ff6c20e6a80-7ff6c20e6aa8 lstrlenW call 7ff6c210934c 97->102 134 7ff6c20e6eff-7ff6c20e6f0b 98->134 135 7ff6c20e6f36 98->135 99->95 103 7ff6c20e6ced-7ff6c20e6cf0 99->103 100->98 102->94 113 7ff6c20e6f0d-7ff6c20e6f31 lstrcpyW lstrcatW 102->113 103->95 109 7ff6c20e6cf6-7ff6c20e6d0f call 7ff6c211da50 103->109 106->76 106->81 111 7ff6c20e6b70-7ff6c20e6b93 107->111 121 7ff6c20e6d15 109->121 122 7ff6c20e6dc7-7ff6c20e6dcc RegCloseKey 109->122 119 7ff6c20e6b95-7ff6c20e6bb4 111->119 120 7ff6c20e6bcd-7ff6c20e6bf8 111->120 113->79 130 7ff6c20e6bc2-7ff6c20e6bc7 119->130 131 7ff6c20e6bb6-7ff6c20e6bbc SysFreeString 119->131 120->106 120->111 124 7ff6c20e6d20-7ff6c20e6d75 call 7ff6c211da50 RegEnumKeyExW lstrlenW 121->124 122->95 137 7ff6c20e6d77-7ff6c20e6d87 lstrlenW 124->137 138 7ff6c20e6db9-7ff6c20e6dc1 124->138 130->120 131->130 139 7ff6c20e6f3b-7ff6c20e6f8d call 7ff6c20e72d0 lstrlenW call 7ff6c20e8e30 134->139 135->139 137->138 140 7ff6c20e6d89-7ff6c20e6db4 call 7ff6c2108dc4 * 2 137->140 138->122 138->124 148 7ff6c20e6f93-7ff6c20e7016 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 139->148 149 7ff6c20e7067-7ff6c20e707b CreateToolhelp32Snapshot 139->149 140->138 150 7ff6c20e705a-7ff6c20e7061 RegCloseKey 148->150 151 7ff6c20e7018-7ff6c20e704b lstrlenW RegSetValueExW 148->151 152 7ff6c20e7081-7ff6c20e70b1 call 7ff6c211da50 Process32FirstW 149->152 153 7ff6c20e7108 149->153 150->149 151->150 155 7ff6c20e704d-7ff6c20e7054 RegCloseKey 151->155 152->153 160 7ff6c20e70b3-7ff6c20e70ba 152->160 154 7ff6c20e710a-7ff6c20e7125 CreateToolhelp32Snapshot 153->154 157 7ff6c20e712b-7ff6c20e715b call 7ff6c211da50 Process32FirstW 154->157 158 7ff6c20e71b8 154->158 155->150 157->158 169 7ff6c20e715d-7ff6c20e7168 157->169 161 7ff6c20e71ba-7ff6c20e71d5 CreateToolhelp32Snapshot 158->161 163 7ff6c20e70c0-7ff6c20e70cf 160->163 164 7ff6c20e727f-7ff6c20e7299 call 7ff6c20e3e30 161->164 165 7ff6c20e71db-7ff6c20e720b call 7ff6c211da50 Process32FirstW 161->165 167 7ff6c20e70d0-7ff6c20e70da 163->167 170 7ff6c20e729c-7ff6c20e72c0 call 7ff6c20fdf84 164->170 165->164 178 7ff6c20e720d-7ff6c20e7218 165->178 171 7ff6c20e70f4-7ff6c20e7106 Process32NextW 167->171 172 7ff6c20e70dc-7ff6c20e70e4 167->172 174 7ff6c20e7170-7ff6c20e717e 169->174 171->153 171->163 176 7ff6c20e70ea-7ff6c20e70f2 172->176 177 7ff6c20e7266-7ff6c20e726b 172->177 179 7ff6c20e7180-7ff6c20e718a 174->179 176->167 176->171 177->154 181 7ff6c20e7220-7ff6c20e722e 178->181 182 7ff6c20e71a4-7ff6c20e71b6 Process32NextW 179->182 183 7ff6c20e718c-7ff6c20e7194 179->183 184 7ff6c20e7230-7ff6c20e723a 181->184 182->158 182->174 185 7ff6c20e7270-7ff6c20e7275 183->185 186 7ff6c20e719a-7ff6c20e71a2 183->186 187 7ff6c20e7250-7ff6c20e7262 Process32NextW 184->187 188 7ff6c20e723c-7ff6c20e7244 184->188 185->161 186->179 186->182 187->181 191 7ff6c20e7264 187->191 189 7ff6c20e727a 188->189 190 7ff6c20e7246-7ff6c20e724e 188->190 189->164 190->184 190->187 191->164
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
      • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $3b6311a8-7ec5-474e-9db0-a86adda60c45$A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$kernel32.dll$ntdll.dll$x64$x86
      • API String ID: 4136965836-2430981841
      • Opcode ID: baafd4b893ac4f89cafd32f5bb9b4dad6c00bfcc7aeefeacfe09a16904dd0568
      • Instruction ID: ad3b52b079104dbc05fa676bf0a4df29a0258a257b77dc04e8111a383b5c932a
      • Opcode Fuzzy Hash: baafd4b893ac4f89cafd32f5bb9b4dad6c00bfcc7aeefeacfe09a16904dd0568
      • Instruction Fuzzy Hash: C3926272B08B8285EB20DF25E8442E92361FB54B5AF814132DE9DC7BA4EF7CD685C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 193 7ff6c20fb5e0-7ff6c20fb621 call 7ff6c2109ebc SleepEx 196 7ff6c20fb653-7ff6c20fb65a 193->196 197 7ff6c20fb623-7ff6c20fb64d call 7ff6c20fdfb8 call 7ff6c2108be0 CloseHandle 193->197 198 7ff6c20fb660-7ff6c20fb67d GetCurrentProcess OpenProcessToken 196->198 199 7ff6c20fb72f-7ff6c20fb858 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff6c2108be0 CloseHandle call 7ff6c20fdfb8 call 7ff6c20e36e0 call 7ff6c20fdfb8 call 7ff6c20eb410 call 7ff6c20fae60 AllocateAndInitializeSid 196->199 197->196 201 7ff6c20fb6d4-7ff6c20fb6f7 GetModuleHandleA GetProcAddress 198->201 202 7ff6c20fb67f-7ff6c20fb6ce LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 198->202 219 7ff6c20fb85a-7ff6c20fb872 CheckTokenMembership 199->219 220 7ff6c20fb888-7ff6c20fb88f 199->220 201->199 205 7ff6c20fb6f9-7ff6c20fb72a GetCurrentProcessId OpenProcess 201->205 202->201 205->199 221 7ff6c20fb874 219->221 222 7ff6c20fb87b-7ff6c20fb882 FreeSid 219->222 223 7ff6c20fb891-7ff6c20fb906 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 220->223 224 7ff6c20fb90c 220->224 221->222 222->220 223->224 225 7ff6c20fb913-7ff6c20fb926 224->225 226 7ff6c20fb954-7ff6c20fb978 call 7ff6c2108a40 * 2 225->226 227 7ff6c20fb928-7ff6c20fb952 call 7ff6c2108a40 * 2 225->227 236 7ff6c20fb97e-7ff6c20fb9a7 226->236 227->236 237 7ff6c20fb9ec-7ff6c20fb9f6 236->237 238 7ff6c20fb9a9-7ff6c20fb9e5 call 7ff6c2108a40 * 2 236->238 240 7ff6c20fb9f8-7ff6c20fba00 237->240 241 7ff6c20fba06-7ff6c20fba5b call 7ff6c2109ebc SleepEx call 7ff6c2109ebc call 7ff6c20e3820 237->241 238->237 240->241 241->225 251 7ff6c20fba61-7ff6c20fbb25 call 7ff6c2109ebc CreateEventA call 7ff6c2108a40 call 7ff6c20e6370 241->251 258 7ff6c20fbb2a-7ff6c20fbb2d 251->258 259 7ff6c20fbb2f-7ff6c20fbb3b 258->259 260 7ff6c20fbb3d 258->260 265 7ff6c20fbb8b-7ff6c20fbba1 259->265 261 7ff6c20fbb40-7ff6c20fbb47 260->261 263 7ff6c20fbb72-7ff6c20fbb79 261->263 264 7ff6c20fbb49-7ff6c20fbb59 Sleep 261->264 268 7ff6c20fbb7f-7ff6c20fbb8a Sleep 263->268 264->261 266 7ff6c20fbb5b-7ff6c20fbb62 264->266 269 7ff6c20fbba3-7ff6c20fbbbb 265->269 270 7ff6c20fbbe9-7ff6c20fbbf8 CloseHandle 265->270 266->263 267 7ff6c20fbb64-7ff6c20fbb70 266->267 267->268 268->265 271 7ff6c20fbbd2-7ff6c20fbbe2 call 7ff6c20fdf84 269->271 272 7ff6c20fbbbd-7ff6c20fbbd0 269->272 270->225 271->270 272->271 275 7ff6c20fbbfd-7ff6c20fbc24 call 7ff6c2103ff8 IsDebuggerPresent 272->275 279 7ff6c20fbc31-7ff6c20fbc54 LoadLibraryW 275->279 280 7ff6c20fbc26-7ff6c20fbc30 275->280 281 7ff6c20fbc60-7ff6c20fbc7e GetProcAddress 279->281 282 7ff6c20fbc56-7ff6c20fbc5b 279->282 284 7ff6c20fbc93-7ff6c20fbd45 call 7ff6c211da50 GetLocalTime wsprintfW CreateFileW 281->284 285 7ff6c20fbc80-7ff6c20fbc8e FreeLibrary 281->285 283 7ff6c20fbdce-7ff6c20fbde8 282->283 289 7ff6c20fbd55-7ff6c20fbdb0 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 284->289 290 7ff6c20fbd47-7ff6c20fbd53 FreeLibrary 284->290 286 7ff6c20fbdc6 285->286 286->283 291 7ff6c20fbdb6-7ff6c20fbdbe 289->291 290->291 291->286
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressCurrentFreeLibraryProc$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturnwsprintf
      • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$192.238.134.113$192.238.134.113$192.238.134.113$192.238.134.113$4433$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
      • API String ID: 2641691789-2327769729
      • Opcode ID: 77c7ebbd6b1270c41e18ab2e88367418a2e18304979642d2bf76458933601cb2
      • Instruction ID: 02fd5c40f19893d42db3890cfc81aa7ebf0e55feb43f6e7ed0ed2ceb13635978
      • Opcode Fuzzy Hash: 77c7ebbd6b1270c41e18ab2e88367418a2e18304979642d2bf76458933601cb2
      • Instruction Fuzzy Hash: 69222F71A08B8286E720DF25E8442AA73A5FB98B5AF500136DECDC7BA4DFBCD154C744

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 294 7ff6c20ef410-7ff6c20ef49f call 7ff6c20fdfb8 call 7ff6c211da50 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 299 7ff6c20ef4b4-7ff6c20ef4d6 CreateToolhelp32Snapshot 294->299 300 7ff6c20ef4a1-7ff6c20ef4ae GetWindowTextW 294->300 301 7ff6c20ef555 299->301 302 7ff6c20ef4d8-7ff6c20ef4ff call 7ff6c211da50 Process32FirstW 299->302 300->299 304 7ff6c20ef557-7ff6c20ef571 CreateToolhelp32Snapshot 301->304 302->301 309 7ff6c20ef501-7ff6c20ef508 302->309 305 7ff6c20ef5f8 304->305 306 7ff6c20ef577-7ff6c20ef5a7 call 7ff6c211da50 Process32FirstW 304->306 310 7ff6c20ef5fa-7ff6c20ef614 CreateToolhelp32Snapshot 305->310 306->305 315 7ff6c20ef5a9 306->315 312 7ff6c20ef510-7ff6c20ef517 309->312 313 7ff6c20ef61a-7ff6c20ef64a call 7ff6c211da50 Process32FirstW 310->313 314 7ff6c20ef6a8 310->314 317 7ff6c20ef520-7ff6c20ef52a 312->317 313->314 332 7ff6c20ef64c-7ff6c20ef657 313->332 316 7ff6c20ef6aa-7ff6c20ef6f4 RegOpenKeyExW 314->316 319 7ff6c20ef5b0-7ff6c20ef5ba 315->319 320 7ff6c20ef913-7ff6c20ef94b RegOpenKeyExW 316->320 321 7ff6c20ef6fa-7ff6c20ef72e RegQueryValueExW 316->321 322 7ff6c20ef544-7ff6c20ef553 Process32NextW 317->322 323 7ff6c20ef52c-7ff6c20ef534 317->323 327 7ff6c20ef5c0-7ff6c20ef5ca 319->327 325 7ff6c20ef9f2-7ff6c20efa2a RegOpenKeyExW 320->325 326 7ff6c20ef951-7ff6c20ef984 RegQueryValueExW 320->326 328 7ff6c20ef734-7ff6c20ef78b call 7ff6c20fdff4 call 7ff6c211da50 RegQueryValueExW 321->328 329 7ff6c20ef908-7ff6c20ef90d RegCloseKey 321->329 322->301 322->312 330 7ff6c20ef7f2-7ff6c20ef7f4 323->330 331 7ff6c20ef53a-7ff6c20ef542 323->331 338 7ff6c20efa30-7ff6c20efa63 RegQueryValueExW 325->338 339 7ff6c20efad1-7ff6c20efb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 325->339 333 7ff6c20ef986-7ff6c20ef9dd call 7ff6c20fdff4 call 7ff6c211da50 RegQueryValueExW 326->333 334 7ff6c20ef9e7-7ff6c20ef9ec RegCloseKey 326->334 335 7ff6c20ef5e4-7ff6c20ef5f6 Process32NextW 327->335 336 7ff6c20ef5cc-7ff6c20ef5d4 327->336 328->329 365 7ff6c20ef791-7ff6c20ef7b9 call 7ff6c20f1310 328->365 329->320 330->304 331->317 331->322 340 7ff6c20ef660-7ff6c20ef66a 332->340 333->334 368 7ff6c20ef9df 333->368 334->325 335->305 335->319 345 7ff6c20ef5da-7ff6c20ef5e2 336->345 346 7ff6c20ef7f9-7ff6c20ef7fb 336->346 348 7ff6c20efa65-7ff6c20efabc call 7ff6c20fdff4 call 7ff6c211da50 RegQueryValueExW 338->348 349 7ff6c20efac6-7ff6c20efacb RegCloseKey 338->349 343 7ff6c20efb91-7ff6c20efbdc FindClose call 7ff6c20efd10 339->343 344 7ff6c20efb89 339->344 341 7ff6c20ef670-7ff6c20ef67a 340->341 350 7ff6c20ef694-7ff6c20ef6a6 Process32NextW 341->350 351 7ff6c20ef67c-7ff6c20ef684 341->351 363 7ff6c20efbde-7ff6c20efbe2 343->363 364 7ff6c20efbf8-7ff6c20efc20 call 7ff6c20fdff4 343->364 344->343 345->327 345->335 346->310 348->349 372 7ff6c20efabe 348->372 349->339 350->314 350->340 356 7ff6c20ef800-7ff6c20ef802 351->356 357 7ff6c20ef68a-7ff6c20ef692 351->357 356->316 357->341 357->350 363->364 369 7ff6c20efbe4-7ff6c20efbf1 363->369 375 7ff6c20efc23-7ff6c20efc7c 364->375 376 7ff6c20ef845-7ff6c20ef855 365->376 377 7ff6c20ef7bf-7ff6c20ef7ca 365->377 368->334 369->364 372->349 375->375 381 7ff6c20efc7e-7ff6c20efcac call 7ff6c211d3b0 375->381 379 7ff6c20ef8cd-7ff6c20ef8d1 376->379 380 7ff6c20ef857-7ff6c20ef85e 376->380 378 7ff6c20ef7d0-7ff6c20ef7d9 377->378 378->376 383 7ff6c20ef7db 378->383 379->329 384 7ff6c20ef8d3-7ff6c20ef8e5 379->384 385 7ff6c20ef862-7ff6c20ef86b 380->385 392 7ff6c20efcbe-7ff6c20efcc1 381->392 393 7ff6c20efcae-7ff6c20efcbb call 7ff6c20e3e30 381->393 388 7ff6c20ef7e0-7ff6c20ef7e4 383->388 389 7ff6c20ef900-7ff6c20ef903 call 7ff6c20fdf84 384->389 390 7ff6c20ef8e7-7ff6c20ef8fa 384->390 385->379 386 7ff6c20ef86d 385->386 391 7ff6c20ef870-7ff6c20ef874 386->391 394 7ff6c20ef7e6-7ff6c20ef7ee 388->394 395 7ff6c20ef807-7ff6c20ef80a 388->395 389->329 390->389 396 7ff6c20efcfe-7ff6c20efd03 call 7ff6c2103ff8 390->396 398 7ff6c20ef88b-7ff6c20ef88e 391->398 399 7ff6c20ef876-7ff6c20ef87e 391->399 401 7ff6c20efcc3-7ff6c20efcc6 call 7ff6c20fdf84 392->401 402 7ff6c20efccb-7ff6c20efcf4 call 7ff6c20fdf84 392->402 393->392 394->388 400 7ff6c20ef7f0 394->400 395->376 403 7ff6c20ef80c-7ff6c20ef81c 395->403 398->379 406 7ff6c20ef890-7ff6c20ef89d 398->406 399->391 405 7ff6c20ef880 399->405 400->376 401->402 409 7ff6c20ef820-7ff6c20ef826 403->409 405->379 411 7ff6c20ef8a0-7ff6c20ef8a6 406->411 413 7ff6c20ef882-7ff6c20ef886 409->413 414 7ff6c20ef828-7ff6c20ef834 409->414 415 7ff6c20efcf5-7ff6c20efcf9 411->415 416 7ff6c20ef8ac-7ff6c20ef8b8 411->416 413->378 414->409 417 7ff6c20ef836-7ff6c20ef83f 414->417 415->385 416->411 418 7ff6c20ef8ba-7ff6c20ef8c3 416->418 417->376 419 7ff6c20ef8c5 417->419 418->379 418->419 419->379
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
      • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
      • API String ID: 3029130142-1423135667
      • Opcode ID: 77770f3fe4e5ae1fd40f8f499dfc1e97523b9b5445e13bf16ce9108d366140f7
      • Instruction ID: 98eeaffea96d4f61188c62ce469dc6c9f8c1c70a98138c20653957c3a0284466
      • Opcode Fuzzy Hash: 77770f3fe4e5ae1fd40f8f499dfc1e97523b9b5445e13bf16ce9108d366140f7
      • Instruction Fuzzy Hash: 2E329062B0868285EB20CF24D4086B977A1FB95B89F855132DFDD87B94DFBCE684C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$QueryValue$Open
      • String ID: 10443$192.238.134.113$192.238.134.113$192.238.134.113$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
      • API String ID: 1772312705-4199381161
      • Opcode ID: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
      • Instruction ID: c43804cfd9aea00b590c7280c69a9559ed9df134567b8a2df73ccd81255cc6d2
      • Opcode Fuzzy Hash: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
      • Instruction Fuzzy Hash: 8522B761F5862781EA249F18E55467A63A1FF98B4EF825032CECEC2F91DFBCE1458704

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 572 7ff6c20e72d0-7ff6c20e7326 573 7ff6c20e7330-7ff6c20e7339 572->573 573->573 574 7ff6c20e733b-7ff6c20e7344 573->574 575 7ff6c20e7362-7ff6c20e7367 call 7ff6c20ea300 574->575 576 7ff6c20e7346-7ff6c20e7360 call 7ff6c211d3b0 574->576 579 7ff6c20e736c 575->579 576->579 581 7ff6c20e7373-7ff6c20e737b 579->581 581->581 582 7ff6c20e737d-7ff6c20e7390 581->582 583 7ff6c20e7392-7ff6c20e73c3 call 7ff6c211d3b0 582->583 584 7ff6c20e73c5-7ff6c20e73d5 call 7ff6c20ea300 582->584 588 7ff6c20e73da 583->588 584->588 589 7ff6c20e73e1-7ff6c20e73ea 588->589 589->589 590 7ff6c20e73ec-7ff6c20e73ff 589->590 591 7ff6c20e7434-7ff6c20e7444 call 7ff6c20ea300 590->591 592 7ff6c20e7401-7ff6c20e7432 call 7ff6c211d3b0 590->592 595 7ff6c20e7449-7ff6c20e744d 591->595 592->595 597 7ff6c20e7454-7ff6c20e745d 595->597 597->597 598 7ff6c20e745f-7ff6c20e7472 597->598 599 7ff6c20e7474-7ff6c20e74a5 call 7ff6c211d3b0 598->599 600 7ff6c20e74a7-7ff6c20e74b4 call 7ff6c20ea300 598->600 604 7ff6c20e74b9-7ff6c20e74cd 599->604 600->604 605 7ff6c20e7505-7ff6c20e751f call 7ff6c20ea300 604->605 606 7ff6c20e74cf-7ff6c20e7503 call 7ff6c211d3b0 604->606 609 7ff6c20e7524-7ff6c20e752f 605->609 606->609 611 7ff6c20e7530-7ff6c20e7539 609->611 611->611 612 7ff6c20e753b-7ff6c20e754e 611->612 613 7ff6c20e7583-7ff6c20e7590 call 7ff6c20ea300 612->613 614 7ff6c20e7550-7ff6c20e7581 call 7ff6c211d3b0 612->614 618 7ff6c20e7595-7ff6c20e7599 613->618 614->618 619 7ff6c20e75a0-7ff6c20e75a9 618->619 619->619 620 7ff6c20e75ab-7ff6c20e75be 619->620 621 7ff6c20e75f3-7ff6c20e7600 call 7ff6c20ea300 620->621 622 7ff6c20e75c0-7ff6c20e75f1 call 7ff6c211d3b0 620->622 625 7ff6c20e7605-7ff6c20e76b4 call 7ff6c20f9250 call 7ff6c20f9be0 MultiByteToWideChar * 2 621->625 622->625 631 7ff6c20e76e3-7ff6c20e76fd 625->631 632 7ff6c20e76b6-7ff6c20e76c7 625->632 635 7ff6c20e7732-7ff6c20e7752 631->635 636 7ff6c20e76ff-7ff6c20e7716 631->636 633 7ff6c20e76de call 7ff6c20fdf84 632->633 634 7ff6c20e76c9-7ff6c20e76dc 632->634 633->631 634->633 637 7ff6c20e7759-7ff6c20e7797 call 7ff6c2103ff8 CreateMutexExW GetLastError 634->637 639 7ff6c20e772d call 7ff6c20fdf84 636->639 640 7ff6c20e7718-7ff6c20e772b 636->640 647 7ff6c20e77c9-7ff6c20e77d0 637->647 648 7ff6c20e7799 637->648 639->635 640->639 642 7ff6c20e7753-7ff6c20e7758 call 7ff6c2103ff8 640->642 642->637 650 7ff6c20e7870-7ff6c20e7922 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 647->650 651 7ff6c20e77d6 647->651 649 7ff6c20e77a0-7ff6c20e77c7 Sleep CreateMutexW GetLastError 648->649 649->647 649->649 653 7ff6c20e7924-7ff6c20e7927 DeleteFileW 650->653 654 7ff6c20e792d-7ff6c20e795d ReleaseMutex DirectInput8Create 650->654 652 7ff6c20e77e0-7ff6c20e7840 lstrlenW call 7ff6c20e8e30 651->652 660 7ff6c20e7842-7ff6c20e7856 lstrcmpW 652->660 661 7ff6c20e7858-7ff6c20e786a SleepEx 652->661 653->654 655 7ff6c20e7963-7ff6c20e7983 654->655 656 7ff6c20e7a00-7ff6c20e7a1e 654->656 655->656 662 7ff6c20e7985-7ff6c20e799b 655->662 660->650 660->661 661->650 661->652 662->656 664 7ff6c20e799d-7ff6c20e79b5 662->664 664->656 666 7ff6c20e79b7-7ff6c20e79ed 664->666 666->656 668 7ff6c20e79ef-7ff6c20e79fe 666->668 668->656 670 7ff6c20e7a1f-7ff6c20e7a51 GetTickCount GetKeyState call 7ff6c20eadb0 668->670
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
      • String ID: <$X64$\DisplaySessionContainers.log$key$open
      • API String ID: 143101810-941791203
      • Opcode ID: a156107f8c53ddcc210f2a4acee747cea3435655495c8a579799f45f1d1ec670
      • Instruction ID: 222c5f6db26c35bf7761cafd26a4b136e2d3666e373a4184dc7bd33db9bddb31
      • Opcode Fuzzy Hash: a156107f8c53ddcc210f2a4acee747cea3435655495c8a579799f45f1d1ec670
      • Instruction Fuzzy Hash: D3227162B18B8192EB10DF25E4442AE6361FB94B99F504232EFDD83BA4DF7CD585C780

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 673 7ff6c20efd10-7ff6c20efda8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 674 7ff6c20efdbe-7ff6c20efddc GetSystemMetrics 673->674 675 7ff6c20efdaa-7ff6c20efdb9 673->675 677 7ff6c20efdde-7ff6c20efe26 GetSystemMetrics 674->677 678 7ff6c20efe28-7ff6c20efe43 GetSystemMetrics 674->678 676 7ff6c20efe47-7ff6c20f0083 GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff6c20fdff4 call 7ff6c211da50 GetDIBits call 7ff6c20fdff4 call 7ff6c211da50 call 7ff6c211d3b0 call 7ff6c20fdfb8 call 7ff6c20f0220 675->676 693 7ff6c20f011c-7ff6c20f014c call 7ff6c20fdff4 676->693 694 7ff6c20f0089-7ff6c20f00c3 DeleteObject * 2 ReleaseDC call 7ff6c20fdf84 * 2 676->694 677->676 678->676 700 7ff6c20f0151-7ff6c20f018c call 7ff6c211d3b0 DeleteObject * 2 ReleaseDC call 7ff6c20fdf84 * 2 693->700 701 7ff6c20f014e 693->701 705 7ff6c20f00f5-7ff6c20f0117 call 7ff6c20fdf84 694->705 706 7ff6c20f00c5-7ff6c20f00d2 694->706 720 7ff6c20f0191-7ff6c20f0199 700->720 701->700 718 7ff6c20f01ea-7ff6c20f020c 705->718 708 7ff6c20f00d4-7ff6c20f00e7 706->708 709 7ff6c20f00f0 call 7ff6c20fdf84 706->709 712 7ff6c20f020d-7ff6c20f0212 call 7ff6c2103ff8 708->712 713 7ff6c20f00ed 708->713 709->705 713->709 721 7ff6c20f019b-7ff6c20f01a8 720->721 722 7ff6c20f01c7-7ff6c20f01e7 call 7ff6c20fdf84 720->722 723 7ff6c20f01c2 call 7ff6c20fdf84 721->723 724 7ff6c20f01aa-7ff6c20f01bd 721->724 722->718 723->722 724->712 726 7ff6c20f01bf 724->726 726->723
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: MetricsObjectSystem$Delete$CreateCriticalGlobalSection$EnterRelease$BitmapCapsCompatibleConcurrency::cancel_current_taskDeviceGdipStreamStretch$AllocBitsDesktopDisposeFromGdiplusImageLeaveLockModeSelectShutdownUnlockWindow_invalid_parameter_noinfo_noreturn
      • String ID: $($6$gfff$gfff
      • API String ID: 1610826097-2922166585
      • Opcode ID: 9268ed5fa4fae6bcec40410b5ce8732adc3c7e98fe7ceeb40a54cfb4e8bb88cd
      • Instruction ID: e6d1faefa36bac5f054bba11e845981d8f415eab111be0b3ef9506385a0b614f
      • Opcode Fuzzy Hash: 9268ed5fa4fae6bcec40410b5ce8732adc3c7e98fe7ceeb40a54cfb4e8bb88cd
      • Instruction Fuzzy Hash: E1D1C371A1878182E7159F35E40436AA2A2FF99F89F018236DE8D97B55DF7CD4C4C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 729 7ff6c20e8a40-7ff6c20e8a6f GetCurrentProcessId OpenProcess 730 7ff6c20e8a71-7ff6c20e8a8e OpenProcessToken 729->730 731 7ff6c20e8a99-7ff6c20e8aae 729->731 732 7ff6c20e8a90-7ff6c20e8a93 CloseHandle 730->732 733 7ff6c20e8aaf-7ff6c20e8ad7 call 7ff6c20e8710 730->733 732->731 736 7ff6c20e8b0a 733->736 737 7ff6c20e8ad9-7ff6c20e8adf 733->737 740 7ff6c20e8b0f-7ff6c20e8b12 736->740 738 7ff6c20e8ae1-7ff6c20e8ae7 SysStringLen 737->738 739 7ff6c20e8ae9 737->739 741 7ff6c20e8aec-7ff6c20e8aef 738->741 739->741 742 7ff6c20e8b14-7ff6c20e8b29 call 7ff6c20fdfb8 740->742 743 7ff6c20e8b4c-7ff6c20e8b86 call 7ff6c211d3b0 CloseHandle * 2 740->743 741->736 745 7ff6c20e8af1-7ff6c20e8af7 741->745 753 7ff6c20e8b3b 742->753 754 7ff6c20e8b2b-7ff6c20e8b39 742->754 751 7ff6c20e8bce-7ff6c20e8bd6 743->751 752 7ff6c20e8b88-7ff6c20e8b92 743->752 748 7ff6c20e8b03-7ff6c20e8b08 745->748 749 7ff6c20e8af9-7ff6c20e8b01 SysStringLen 745->749 748->740 749->740 755 7ff6c20e8c0d-7ff6c20e8c1f 751->755 756 7ff6c20e8bd8-7ff6c20e8be3 751->756 758 7ff6c20e8b94-7ff6c20e8b9f 752->758 759 7ff6c20e8bc9 752->759 757 7ff6c20e8b3e-7ff6c20e8b46 753->757 754->757 760 7ff6c20e8be5-7ff6c20e8beb SysFreeString 756->760 761 7ff6c20e8bee-7ff6c20e8bf5 756->761 757->743 762 7ff6c20e8c20-7ff6c20e8c99 call 7ff6c20feca0 call 7ff6c20fdff4 GetCurrentProcessId wsprintfW call 7ff6c20e8a40 call 7ff6c211da50 GetVersionExW 757->762 763 7ff6c20e8ba1-7ff6c20e8ba7 SysFreeString 758->763 764 7ff6c20e8baa-7ff6c20e8bb1 758->764 759->751 760->761 765 7ff6c20e8c00-7ff6c20e8c08 call 7ff6c20fdf84 761->765 766 7ff6c20e8bf7-7ff6c20e8bfc call 7ff6c20fdf84 761->766 784 7ff6c20e8df2 762->784 785 7ff6c20e8c9f-7ff6c20e8ca4 762->785 763->764 767 7ff6c20e8bb3-7ff6c20e8bb8 call 7ff6c20fdf84 764->767 768 7ff6c20e8bbc-7ff6c20e8bc4 call 7ff6c20fdf84 764->768 765->755 766->765 767->768 768->759 786 7ff6c20e8df9-7ff6c20e8e03 wsprintfW 784->786 785->784 787 7ff6c20e8caa-7ff6c20e8caf 785->787 788 7ff6c20e8e09-7ff6c20e8e20 call 7ff6c20fdf84 786->788 787->784 789 7ff6c20e8cb5-7ff6c20e8cdb GetCurrentProcess OpenProcessToken 787->789 789->784 791 7ff6c20e8ce1-7ff6c20e8d10 GetTokenInformation 789->791 793 7ff6c20e8d9c-7ff6c20e8dac CloseHandle 791->793 794 7ff6c20e8d16-7ff6c20e8d1f GetLastError 791->794 793->784 795 7ff6c20e8dae-7ff6c20e8db4 793->795 794->793 796 7ff6c20e8d21-7ff6c20e8d41 LocalAlloc 794->796 797 7ff6c20e8de9-7ff6c20e8df0 795->797 798 7ff6c20e8db6-7ff6c20e8dbc 795->798 799 7ff6c20e8d94 796->799 800 7ff6c20e8d43-7ff6c20e8d70 GetTokenInformation 796->800 797->786 803 7ff6c20e8de0-7ff6c20e8de7 798->803 804 7ff6c20e8dbe-7ff6c20e8dc4 798->804 799->793 801 7ff6c20e8d72-7ff6c20e8d89 GetSidSubAuthorityCount GetSidSubAuthority 800->801 802 7ff6c20e8d8b-7ff6c20e8d8e LocalFree 800->802 801->802 802->799 803->786 805 7ff6c20e8dc6-7ff6c20e8dcc 804->805 806 7ff6c20e8dd7-7ff6c20e8dde 804->806 805->788 807 7ff6c20e8dce-7ff6c20e8dd5 805->807 806->786 807->786
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$CloseHandleStringToken$CurrentFreeOpen$AuthorityInformationLocalwsprintf$AllocCountErrorLastVersion
      • String ID: -N/$NO/$None/%s$VenNetwork
      • API String ID: 166307840-819860926
      • Opcode ID: 718425a93fc7a6cb4dcfacf082e235d535518e74dea5eaa6a08581fcc943249b
      • Instruction ID: 2746cadc0bf08dd7ab8911977de76cce357c54aa9c0d75730a8877cf7111d1b0
      • Opcode Fuzzy Hash: 718425a93fc7a6cb4dcfacf082e235d535518e74dea5eaa6a08581fcc943249b
      • Instruction Fuzzy Hash: DEB15F25B0974282FA259F21E4502B963A1FF94B8AF054436DECEC7BA4DFBCD585C780

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 962 7ff6c20e8710-7ff6c20e874e 963 7ff6c20e8755-7ff6c20e8772 call 7ff6c20e6300 call 7ff6c20fdfb8 962->963 964 7ff6c20e8750-7ff6c20e8753 962->964 977 7ff6c20e8774-7ff6c20e878e SysAllocString 963->977 978 7ff6c20e8796 963->978 964->963 965 7ff6c20e87a5-7ff6c20e87ab 964->965 967 7ff6c20e87b2-7ff6c20e87cf call 7ff6c20e6300 call 7ff6c20fdfb8 965->967 968 7ff6c20e87ad-7ff6c20e87b0 965->968 995 7ff6c20e87f3 967->995 996 7ff6c20e87d1-7ff6c20e87eb SysAllocString 967->996 968->967 970 7ff6c20e8802-7ff6c20e8808 968->970 974 7ff6c20e880e-7ff6c20e8831 GetTokenInformation 970->974 975 7ff6c20e89ff 970->975 979 7ff6c20e8833-7ff6c20e883c GetLastError 974->979 980 7ff6c20e886c-7ff6c20e8894 GetTokenInformation 974->980 988 7ff6c20e8a06-7ff6c20e8a10 call 7ff6c20feca0 975->988 982 7ff6c20e8794 977->982 983 7ff6c20e8a11-7ff6c20e8a1b call 7ff6c20feca0 977->983 985 7ff6c20e8799-7ff6c20e879f 978->985 979->975 984 7ff6c20e8842-7ff6c20e8866 GetProcessHeap HeapAlloc 979->984 986 7ff6c20e889a-7ff6c20e88d2 LookupAccountSidW 980->986 987 7ff6c20e89e6-7ff6c20e89e9 980->987 982->985 1004 7ff6c20e8a1c-7ff6c20e8a26 call 7ff6c20feca0 983->1004 984->975 984->980 985->965 985->988 991 7ff6c20e88d4-7ff6c20e88df GetLastError 986->991 992 7ff6c20e891b-7ff6c20e8921 986->992 987->975 990 7ff6c20e89eb-7ff6c20e89f9 GetProcessHeap HeapFree 987->990 988->983 990->975 997 7ff6c20e88e1-7ff6c20e88f7 call 7ff6c2108a40 991->997 998 7ff6c20e88fc-7ff6c20e891a 991->998 1001 7ff6c20e8923-7ff6c20e892b 992->1001 1002 7ff6c20e892d-7ff6c20e894a call 7ff6c20e6300 call 7ff6c20fdfb8 992->1002 1005 7ff6c20e87f6-7ff6c20e87fc 995->1005 1003 7ff6c20e87f1 996->1003 996->1004 997->987 1001->1002 1007 7ff6c20e897f-7ff6c20e8985 1001->1007 1023 7ff6c20e8970 1002->1023 1024 7ff6c20e894c-7ff6c20e8968 SysAllocString 1002->1024 1003->1005 1018 7ff6c20e8a27-7ff6c20e8a31 call 7ff6c20feca0 1004->1018 1005->970 1005->988 1010 7ff6c20e8994-7ff6c20e89b1 call 7ff6c20e6300 call 7ff6c20fdfb8 1007->1010 1011 7ff6c20e8987-7ff6c20e8992 1007->1011 1031 7ff6c20e89b3-7ff6c20e89d2 SysAllocString 1010->1031 1032 7ff6c20e89d6 1010->1032 1011->1010 1016 7ff6c20e89e1 1011->1016 1016->987 1026 7ff6c20e8a32-7ff6c20e8a6f call 7ff6c20feca0 GetCurrentProcessId OpenProcess 1018->1026 1028 7ff6c20e8973-7ff6c20e8979 1023->1028 1024->1018 1027 7ff6c20e896e 1024->1027 1037 7ff6c20e8a71-7ff6c20e8a8e OpenProcessToken 1026->1037 1038 7ff6c20e8a99-7ff6c20e8aae 1026->1038 1027->1028 1028->988 1028->1007 1031->1026 1035 7ff6c20e89d4 1031->1035 1033 7ff6c20e89d9-7ff6c20e89df 1032->1033 1033->988 1033->1016 1035->1033 1039 7ff6c20e8a90-7ff6c20e8a93 CloseHandle 1037->1039 1040 7ff6c20e8aaf-7ff6c20e8ad7 call 7ff6c20e8710 1037->1040 1039->1038 1043 7ff6c20e8b0a 1040->1043 1044 7ff6c20e8ad9-7ff6c20e8adf 1040->1044 1047 7ff6c20e8b0f-7ff6c20e8b12 1043->1047 1045 7ff6c20e8ae1-7ff6c20e8ae7 SysStringLen 1044->1045 1046 7ff6c20e8ae9 1044->1046 1048 7ff6c20e8aec-7ff6c20e8aef 1045->1048 1046->1048 1049 7ff6c20e8b14-7ff6c20e8b29 call 7ff6c20fdfb8 1047->1049 1050 7ff6c20e8b4c-7ff6c20e8b86 call 7ff6c211d3b0 CloseHandle * 2 1047->1050 1048->1043 1052 7ff6c20e8af1-7ff6c20e8af7 1048->1052 1060 7ff6c20e8b3b 1049->1060 1061 7ff6c20e8b2b-7ff6c20e8b39 1049->1061 1058 7ff6c20e8bce-7ff6c20e8bd6 1050->1058 1059 7ff6c20e8b88-7ff6c20e8b92 1050->1059 1055 7ff6c20e8b03-7ff6c20e8b08 1052->1055 1056 7ff6c20e8af9-7ff6c20e8b01 SysStringLen 1052->1056 1055->1047 1056->1047 1062 7ff6c20e8c0d-7ff6c20e8c1f 1058->1062 1063 7ff6c20e8bd8-7ff6c20e8be3 1058->1063 1065 7ff6c20e8b94-7ff6c20e8b9f 1059->1065 1066 7ff6c20e8bc9 1059->1066 1064 7ff6c20e8b3e-7ff6c20e8b46 1060->1064 1061->1064 1067 7ff6c20e8be5-7ff6c20e8beb SysFreeString 1063->1067 1068 7ff6c20e8bee-7ff6c20e8bf5 1063->1068 1064->1050 1069 7ff6c20e8c20-7ff6c20e8c99 call 7ff6c20feca0 call 7ff6c20fdff4 GetCurrentProcessId wsprintfW call 7ff6c20e8a40 call 7ff6c211da50 GetVersionExW 1064->1069 1070 7ff6c20e8ba1-7ff6c20e8ba7 SysFreeString 1065->1070 1071 7ff6c20e8baa-7ff6c20e8bb1 1065->1071 1066->1058 1067->1068 1072 7ff6c20e8c00-7ff6c20e8c08 call 7ff6c20fdf84 1068->1072 1073 7ff6c20e8bf7-7ff6c20e8bfc call 7ff6c20fdf84 1068->1073 1091 7ff6c20e8df2 1069->1091 1092 7ff6c20e8c9f-7ff6c20e8ca4 1069->1092 1070->1071 1074 7ff6c20e8bb3-7ff6c20e8bb8 call 7ff6c20fdf84 1071->1074 1075 7ff6c20e8bbc-7ff6c20e8bc4 call 7ff6c20fdf84 1071->1075 1072->1062 1073->1072 1074->1075 1075->1066 1093 7ff6c20e8df9-7ff6c20e8e03 wsprintfW 1091->1093 1092->1091 1094 7ff6c20e8caa-7ff6c20e8caf 1092->1094 1095 7ff6c20e8e09-7ff6c20e8e20 call 7ff6c20fdf84 1093->1095 1094->1091 1096 7ff6c20e8cb5-7ff6c20e8cdb GetCurrentProcess OpenProcessToken 1094->1096 1096->1091 1098 7ff6c20e8ce1-7ff6c20e8d10 GetTokenInformation 1096->1098 1100 7ff6c20e8d9c-7ff6c20e8dac CloseHandle 1098->1100 1101 7ff6c20e8d16-7ff6c20e8d1f GetLastError 1098->1101 1100->1091 1102 7ff6c20e8dae-7ff6c20e8db4 1100->1102 1101->1100 1103 7ff6c20e8d21-7ff6c20e8d41 LocalAlloc 1101->1103 1104 7ff6c20e8de9-7ff6c20e8df0 1102->1104 1105 7ff6c20e8db6-7ff6c20e8dbc 1102->1105 1106 7ff6c20e8d94 1103->1106 1107 7ff6c20e8d43-7ff6c20e8d70 GetTokenInformation 1103->1107 1104->1093 1110 7ff6c20e8de0-7ff6c20e8de7 1105->1110 1111 7ff6c20e8dbe-7ff6c20e8dc4 1105->1111 1106->1100 1108 7ff6c20e8d72-7ff6c20e8d89 GetSidSubAuthorityCount GetSidSubAuthority 1107->1108 1109 7ff6c20e8d8b-7ff6c20e8d8e LocalFree 1107->1109 1108->1109 1109->1106 1110->1093 1112 7ff6c20e8dc6-7ff6c20e8dcc 1111->1112 1113 7ff6c20e8dd7-7ff6c20e8dde 1111->1113 1112->1095 1114 7ff6c20e8dce-7ff6c20e8dd5 1112->1114 1113->1093 1114->1093
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AllocProcess$HeapString$Token$ErrorInformationLastOpen$AccountCloseCurrentFreeHandleLookup
      • String ID: NONE_MAPPED
      • API String ID: 1410310566-2950899194
      • Opcode ID: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
      • Instruction ID: 532b0d3777d17678cea468492d73ace10dc5a6ea14269f981bd4dba623873f5c
      • Opcode Fuzzy Hash: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
      • Instruction Fuzzy Hash: C6A18331B09B4281FA558F11E41427962E5FF94B89F5A4436DECD87BA0EFBCE885C350

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1115 7ff6c20e7a60-7ff6c20e7aac call 7ff6c211da50 call 7ff6c20fff40 1120 7ff6c20e7ab2-7ff6c20e7ac6 1115->1120 1121 7ff6c20e7b7c-7ff6c20e7ba7 CoCreateInstance 1115->1121 1124 7ff6c20e7ad0-7ff6c20e7af8 call 7ff6c211da50 CreateToolhelp32Snapshot 1120->1124 1122 7ff6c20e7da1-7ff6c20e7dac lstrlenW 1121->1122 1123 7ff6c20e7bad-7ff6c20e7bf9 1121->1123 1126 7ff6c20e7dbf-7ff6c20e7dc6 1122->1126 1127 7ff6c20e7dae-7ff6c20e7dbe lstrcatW 1122->1127 1132 7ff6c20e7d8f-7ff6c20e7d99 1123->1132 1133 7ff6c20e7bff-7ff6c20e7c1b 1123->1133 1134 7ff6c20e7afa-7ff6c20e7b10 Process32FirstW 1124->1134 1135 7ff6c20e7b56-7ff6c20e7b76 call 7ff6c20fff40 1124->1135 1130 7ff6c20e7dce-7ff6c20e7de4 1126->1130 1131 7ff6c20e7dc8 1126->1131 1127->1126 1131->1130 1132->1122 1137 7ff6c20e7d9b 1132->1137 1133->1132 1143 7ff6c20e7c21-7ff6c20e7cdd call 7ff6c211da50 wsprintfW RegOpenKeyExW 1133->1143 1138 7ff6c20e7b12-7ff6c20e7b1c 1134->1138 1139 7ff6c20e7b4d-7ff6c20e7b50 CloseHandle 1134->1139 1135->1121 1135->1124 1137->1122 1142 7ff6c20e7b20-7ff6c20e7b2a 1138->1142 1139->1135 1144 7ff6c20e7b34-7ff6c20e7b39 1142->1144 1145 7ff6c20e7b2c-7ff6c20e7b32 1142->1145 1151 7ff6c20e7ce3-7ff6c20e7d3e call 7ff6c211da50 RegQueryValueExW 1143->1151 1152 7ff6c20e7d6d-7ff6c20e7d7f 1143->1152 1147 7ff6c20e7de5-7ff6c20e7def CloseHandle 1144->1147 1148 7ff6c20e7b3f-7ff6c20e7b4b Process32NextW 1144->1148 1145->1142 1145->1144 1147->1135 1150 7ff6c20e7df5-7ff6c20e7e13 lstrcatW * 2 1147->1150 1148->1138 1148->1139 1150->1135 1156 7ff6c20e7d60-7ff6c20e7d67 RegCloseKey 1151->1156 1157 7ff6c20e7d40-7ff6c20e7d5a lstrcatW * 2 1151->1157 1154 7ff6c20e7d87-7ff6c20e7d89 1152->1154 1154->1132 1154->1143 1156->1152 1157->1156
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
      • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
      • API String ID: 582347850-1583895642
      • Opcode ID: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
      • Instruction ID: 88f046564ead17b9b48879be62b0ef0a246991e0fca7f84e4808d32cb4591089
      • Opcode Fuzzy Hash: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
      • Instruction Fuzzy Hash: 23A16222B0879286E720CF25E8406AA67B1FB85B5EF544136DE8D87B68DF7CD684C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1205 7ff6c20eb410-7ff6c20eb451 CreateEventW 1206 7ff6c20eb7b1-7ff6c20eb7bb call 7ff6c20e10f0 1205->1206 1207 7ff6c20eb457-7ff6c20eb4c6 call 7ff6c20e1200 1205->1207 1212 7ff6c20eb7bc-7ff6c20eb7c6 call 7ff6c20e10f0 1206->1212 1207->1212 1213 7ff6c20eb4cc-7ff6c20eb51b HeapCreate 1207->1213 1218 7ff6c20eb7c7-7ff6c20eb7d1 call 7ff6c20e10f0 1212->1218 1217 7ff6c20eb521-7ff6c20eb549 1213->1217 1213->1218 1219 7ff6c20eb560-7ff6c20eb577 InitializeCriticalSectionAndSpinCount 1217->1219 1220 7ff6c20eb54b-7ff6c20eb55a call 7ff6c2103bd8 1217->1220 1223 7ff6c20eb7d2-7ff6c20eb7dc call 7ff6c20e10f0 1218->1223 1219->1223 1224 7ff6c20eb57d-7ff6c20eb5b2 CreateEventW 1219->1224 1220->1219 1227 7ff6c20eb7dd-7ff6c20eb7e7 call 7ff6c20e10f0 1223->1227 1224->1227 1228 7ff6c20eb5b8-7ff6c20eb5d2 CreateEventW 1224->1228 1231 7ff6c20eb7e8-7ff6c20eb7f2 call 7ff6c20e10f0 1227->1231 1228->1231 1232 7ff6c20eb5d8-7ff6c20eb5f2 CreateEventW 1228->1232 1236 7ff6c20eb7f3-7ff6c20eb7fd call 7ff6c20e10f0 1231->1236 1232->1236 1237 7ff6c20eb5f8-7ff6c20eb6bb InitializeCriticalSectionAndSpinCount 1232->1237 1241 7ff6c20eb7fe-7ff6c20eb826 call 7ff6c20e10f0 1236->1241 1240 7ff6c20eb6c1-7ff6c20eb6cf InitializeCriticalSectionAndSpinCount 1237->1240 1237->1241 1244 7ff6c20eb6d5-7ff6c20eb7a5 timeGetTime CreateEventW * 2 call 7ff6c20fdff4 * 2 1240->1244 1245 7ff6c20eb7a6-7ff6c20eb7b0 call 7ff6c20e10f0 1240->1245 1250 7ff6c20eb832-7ff6c20eb83a 1241->1250 1251 7ff6c20eb828-7ff6c20eb82d call 7ff6c20fdf84 1241->1251 1245->1206 1251->1250
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
      • String ID: <$<
      • API String ID: 2446585644-213342407
      • Opcode ID: 4a3ea3394690932cb0d2d856ce8909e67e1cf7f35bb4a36878bb821cefc6b694
      • Instruction ID: 58d4402fbf8c222603273566057e00630a402c4eab3791f99b5e2bb886ba289a
      • Opcode Fuzzy Hash: 4a3ea3394690932cb0d2d856ce8909e67e1cf7f35bb4a36878bb821cefc6b694
      • Instruction Fuzzy Hash: 34B13972605B818AE754CF35E4857A933A5FB04B09F58413DCF8C8BB99DFB8A0A4C758
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
      • String ID: \\.\HCD%d
      • API String ID: 2324936672-2696249065
      • Opcode ID: 976449f406f44e82ee4552859a2aa0bd98404e5d535f3e00274a106eb8da92fd
      • Instruction ID: 11d7563d83d332e8a4d80341969602af75b7facf0e329e83d75dc0b982070188
      • Opcode Fuzzy Hash: 976449f406f44e82ee4552859a2aa0bd98404e5d535f3e00274a106eb8da92fd
      • Instruction Fuzzy Hash: 29516C32B0C78186EA60DF11B4817AB66A4EB85B9AF042135DECE87F95DF7CD055CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
      • String ID:
      • API String ID: 2277684705-0
      • Opcode ID: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
      • Instruction ID: 95183a280a2dd9a9900f1a9173bd10c0d9823e7eee84ee49e7deb1466c21aee6
      • Opcode Fuzzy Hash: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
      • Instruction Fuzzy Hash: BF01C825A18B4282E314DF70EC5556A22A2FF98F1BF414135CE9EC2B70EEBCD485C600
      APIs
      • _get_daylight.LIBCMT ref: 00007FF6C211208D
        • Part of subcall function 00007FF6C2111704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2111718
        • Part of subcall function 00007FF6C210E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E972
        • Part of subcall function 00007FF6C210E95C: GetLastError.KERNEL32(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E97C
        • Part of subcall function 00007FF6C2104028: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6C2103FD7,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C2104031
        • Part of subcall function 00007FF6C2104028: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6C2103FD7,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C2104056
        • Part of subcall function 00007FF6C211A1B4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C211A0FF
      • _get_daylight.LIBCMT ref: 00007FF6C211207C
        • Part of subcall function 00007FF6C2111764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2111778
      • _get_daylight.LIBCMT ref: 00007FF6C21122F2
      • _get_daylight.LIBCMT ref: 00007FF6C2112303
      • _get_daylight.LIBCMT ref: 00007FF6C2112314
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6C2112554), ref: 00007FF6C211233B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
      • String ID: Eastern Standard Time$Eastern Summer Time
      • API String ID: 4070488512-239921721
      • Opcode ID: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
      • Instruction ID: 0864b0eb4758591121ef54402535f1c33f351547bc2ad99bd5d19666b3f0d5ed
      • Opcode Fuzzy Hash: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
      • Instruction Fuzzy Hash: 34D1BD26A0826286EB24EF2698511B96761FF64F99F448135EF8DC7F85DFBCE481C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
      • String ID:
      • API String ID: 3155671162-0
      • Opcode ID: b340a1fa3acb893865ad2ef9f08c6749c254f50d214876e63c374723e95af656
      • Instruction ID: 16ae143297ae67d06a699d0a51a12d7e204e9ab1f08d64062e4d2919482af509
      • Opcode Fuzzy Hash: b340a1fa3acb893865ad2ef9f08c6749c254f50d214876e63c374723e95af656
      • Instruction Fuzzy Hash: 0A029062F18B8185EB00DF61E4502AD23A1FB55B9DF014236EEDD97BD9DEB8E485C340
      APIs
      • _get_daylight.LIBCMT ref: 00007FF6C21122F2
        • Part of subcall function 00007FF6C2111764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2111778
      • _get_daylight.LIBCMT ref: 00007FF6C2112303
        • Part of subcall function 00007FF6C2111704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2111718
      • _get_daylight.LIBCMT ref: 00007FF6C2112314
        • Part of subcall function 00007FF6C2111734: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2111748
        • Part of subcall function 00007FF6C210E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E972
        • Part of subcall function 00007FF6C210E95C: GetLastError.KERNEL32(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E97C
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6C2112554), ref: 00007FF6C211233B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
      • String ID: Eastern Standard Time$Eastern Summer Time
      • API String ID: 3458911817-239921721
      • Opcode ID: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
      • Instruction ID: 3a7ba6365e7c7fee75a72f1e88f515cdd219dc7014511ef21cc56782a5d33bf0
      • Opcode Fuzzy Hash: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
      • Instruction Fuzzy Hash: 7E517A32A1865286E720DF26E8915A96761BF68B89F404135EF8DC3F96DFBCE480C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1405656091-0
      • Opcode ID: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
      • Instruction ID: 64e560259493ab4f115a71e2533a4ed14ef4f8e37f1e681a8688d2fcd43b9713
      • Opcode Fuzzy Hash: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
      • Instruction Fuzzy Hash: FB91D4B2B043868AEB588F29C9112A967A5EB54F8DF048035DF4DCBB89EF7CE551C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFreeTimerecvselecttime
      • String ID:
      • API String ID: 1996171534-0
      • Opcode ID: 23a90fc057aa06d069fd8243b6c9acbfff7205866c389b5e17964529276d1c99
      • Instruction ID: 6813c2b83809352e0cb73355537ba96f9e5a2bfd54cd647bb48f87267a1e9ecf
      • Opcode Fuzzy Hash: 23a90fc057aa06d069fd8243b6c9acbfff7205866c389b5e17964529276d1c99
      • Instruction Fuzzy Hash: 88715B62B18A8581EB209F28E4042BD7761FB94B8DF15923ADFCD83755DF79E484C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
      • Instruction ID: 0a06e6bae4fa035fa2ec9fdde400f28331e4d15f8725b359d2770a19641d35fb
      • Opcode Fuzzy Hash: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
      • Instruction Fuzzy Hash: 814107727086418AE709CF2AE45066AA755FB84FC9F054139EF8EC7745EE78D981C780

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 808 7ff6c20f0220-7ff6c20f0299 GlobalAlloc GlobalLock call 7ff6c211d3b0 GlobalUnlock CreateStreamOnHGlobal 811 7ff6c20f05f1-7ff6c20f05fa GlobalFree 808->811 812 7ff6c20f029f-7ff6c20f02fe call 7ff6c20e61e0 EnterCriticalSection LeaveCriticalSection call 7ff6c20ec9b0 808->812 813 7ff6c20f05fd-7ff6c20f0617 811->813 818 7ff6c20f0304-7ff6c20f032e GdipCreateBitmapFromStream 812->818 819 7ff6c20f056e-7ff6c20f0584 812->819 820 7ff6c20f0330-7ff6c20f0336 GdipDisposeImage 818->820 821 7ff6c20f033b-7ff6c20f0356 call 7ff6c20ec340 GdipDisposeImage 818->821 824 7ff6c20f05aa-7ff6c20f05c0 call 7ff6c20e61e0 EnterCriticalSection 819->824 825 7ff6c20f0586-7ff6c20f05a4 DeleteObject 819->825 820->819 821->819 828 7ff6c20f035c-7ff6c20f0373 CreateStreamOnHGlobal 821->828 831 7ff6c20f05c2-7ff6c20f05d2 EnterCriticalSection 824->831 832 7ff6c20f05e7-7ff6c20f05eb LeaveCriticalSection 824->832 825->824 828->819 829 7ff6c20f0379-7ff6c20f03a8 call 7ff6c20ec7b0 GetHGlobalFromStream GlobalLock 828->829 837 7ff6c20f03ae-7ff6c20f03cd GlobalFree 829->837 838 7ff6c20f043f-7ff6c20f0488 GlobalSize call 7ff6c20fdff4 call 7ff6c211d3b0 call 7ff6c20e9fd0 829->838 834 7ff6c20f05d4 GdiplusShutdown 831->834 835 7ff6c20f05da-7ff6c20f05e1 LeaveCriticalSection 831->835 832->811 834->835 835->832 843 7ff6c20f03f1-7ff6c20f0407 call 7ff6c20e61e0 EnterCriticalSection 837->843 844 7ff6c20f03cf-7ff6c20f03eb DeleteObject 837->844 852 7ff6c20f04de 838->852 853 7ff6c20f048a-7ff6c20f0492 838->853 850 7ff6c20f042e-7ff6c20f043a LeaveCriticalSection 843->850 851 7ff6c20f0409-7ff6c20f0419 EnterCriticalSection 843->851 844->843 850->813 854 7ff6c20f0421-7ff6c20f0428 LeaveCriticalSection 851->854 855 7ff6c20f041b GdiplusShutdown 851->855 858 7ff6c20f04e2-7ff6c20f04e6 852->858 856 7ff6c20f04c4-7ff6c20f04dc 853->856 857 7ff6c20f0494-7ff6c20f04a1 853->857 854->850 855->854 856->858 859 7ff6c20f04a3-7ff6c20f04b6 857->859 860 7ff6c20f04bf call 7ff6c20fdf84 857->860 861 7ff6c20f04e8-7ff6c20f04f9 858->861 862 7ff6c20f0519-7ff6c20f052d call 7ff6c20fdf84 858->862 864 7ff6c20f04bc 859->864 865 7ff6c20f0618-7ff6c20f061f call 7ff6c2103ff8 859->865 860->856 867 7ff6c20f0514 call 7ff6c20fdf84 861->867 868 7ff6c20f04fb-7ff6c20f050e 861->868 872 7ff6c20f0553-7ff6c20f0561 GlobalUnlock 862->872 873 7ff6c20f052f-7ff6c20f054d DeleteObject 862->873 864->860 867->862 868->865 868->867 875 7ff6c20f0567 872->875 873->872 875->819
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 953580087-0
      • Opcode ID: 95f9102791bae23428d256b808952fa6c2f0dd8150e6595b9474aac6058de54d
      • Instruction ID: 70300724975207970b7643951170a5ff81e9c063c8cfb443834be3b4686f393f
      • Opcode Fuzzy Hash: 95f9102791bae23428d256b808952fa6c2f0dd8150e6595b9474aac6058de54d
      • Instruction Fuzzy Hash: EBC14D36B08B428AEB00DF65E4041AE3376FB54B5EB014136DE9D97B99DFB8E489C344

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 876 7ff6c20ec340-7ff6c20ec383 GdipGetImagePixelFormat 877 7ff6c20ec385 876->877 878 7ff6c20ec387-7ff6c20ec3a4 876->878 877->878 879 7ff6c20ec3b9-7ff6c20ec3c4 878->879 880 7ff6c20ec3a6-7ff6c20ec3b3 878->880 881 7ff6c20ec3db-7ff6c20ec400 GdipGetImageHeight 879->881 882 7ff6c20ec3c6-7ff6c20ec3d4 879->882 880->879 883 7ff6c20ec402-7ff6c20ec40c 881->883 884 7ff6c20ec40f-7ff6c20ec422 GdipGetImageWidth 881->884 882->881 883->884 885 7ff6c20ec424 884->885 886 7ff6c20ec426-7ff6c20ec447 call 7ff6c20ec160 884->886 885->886 889 7ff6c20ec453-7ff6c20ec45b 886->889 890 7ff6c20ec449-7ff6c20ec44e 886->890 892 7ff6c20ec461-7ff6c20ec478 GdipGetImagePaletteSize 889->892 893 7ff6c20ec60d-7ff6c20ec61c 889->893 891 7ff6c20ec773-7ff6c20ec78c 890->891 896 7ff6c20ec47c-7ff6c20ec487 892->896 897 7ff6c20ec47a 892->897 894 7ff6c20ec6e2-7ff6c20ec74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 893->894 895 7ff6c20ec622-7ff6c20ec64e GdipBitmapLockBits 893->895 902 7ff6c20ec753-7ff6c20ec756 894->902 898 7ff6c20ec650-7ff6c20ec65a 895->898 899 7ff6c20ec66a-7ff6c20ec686 895->899 900 7ff6c20ec4ba-7ff6c20ec4c6 call 7ff6c2104070 896->900 901 7ff6c20ec489-7ff6c20ec492 call 7ff6c20eb2e0 896->901 897->896 898->902 904 7ff6c20ec6c4-7ff6c20ec6db GdipBitmapUnlockBits 899->904 905 7ff6c20ec688-7ff6c20ec68b 899->905 916 7ff6c20ec4cd-7ff6c20ec4d4 900->916 917 7ff6c20ec4c8-7ff6c20ec4cb 900->917 901->900 920 7ff6c20ec494-7ff6c20ec49b 901->920 907 7ff6c20ec770 902->907 908 7ff6c20ec758 902->908 904->902 912 7ff6c20ec6dd-7ff6c20ec6e0 904->912 910 7ff6c20ec6ad-7ff6c20ec6c2 905->910 911 7ff6c20ec68d-7ff6c20ec690 905->911 907->891 914 7ff6c20ec760-7ff6c20ec76e call 7ff6c2103bd8 908->914 910->904 910->905 918 7ff6c20ec794-7ff6c20ec7af call 7ff6c2108d9c call 7ff6c2103fd8 call 7ff6c20e10f0 911->918 919 7ff6c20ec696-7ff6c20ec69f 911->919 912->902 914->907 922 7ff6c20ec4d7-7ff6c20ec4da 916->922 917->922 924 7ff6c20ec6a5-7ff6c20ec6a8 call 7ff6c211d3b0 919->924 925 7ff6c20ec78d-7ff6c20ec78f call 7ff6c211da50 919->925 926 7ff6c20ec49d 920->926 927 7ff6c20ec4a7-7ff6c20ec4b8 call 7ff6c20fe600 920->927 929 7ff6c20ec4dc-7ff6c20ec4e2 922->929 930 7ff6c20ec4e7-7ff6c20ec4f9 GdipGetImagePalette 922->930 924->910 925->918 926->927 927->922 929->902 935 7ff6c20ec4ff-7ff6c20ec50a 930->935 936 7ff6c20ec4fb 930->936 939 7ff6c20ec510-7ff6c20ec515 935->939 940 7ff6c20ec65f-7ff6c20ec665 935->940 936->935 942 7ff6c20ec555-7ff6c20ec55d 939->942 943 7ff6c20ec517 939->943 940->902 946 7ff6c20ec55f-7ff6c20ec56a call 7ff6c20e6280 942->946 947 7ff6c20ec5aa-7ff6c20ec5c2 SetDIBColorTable 942->947 945 7ff6c20ec520-7ff6c20ec553 943->945 945->942 945->945 953 7ff6c20ec570-7ff6c20ec57d 946->953 949 7ff6c20ec5c4-7ff6c20ec5de SelectObject call 7ff6c20e6280 947->949 950 7ff6c20ec607 947->950 957 7ff6c20ec5e0-7ff6c20ec5ea 949->957 950->893 955 7ff6c20ec58e-7ff6c20ec5a6 SelectObject 953->955 956 7ff6c20ec57f-7ff6c20ec584 953->956 955->947 956->953 958 7ff6c20ec586-7ff6c20ec588 CreateCompatibleDC 956->958 959 7ff6c20ec5fc-7ff6c20ec603 957->959 960 7ff6c20ec5ec-7ff6c20ec5f1 957->960 958->955 959->950 960->957 961 7ff6c20ec5f3-7ff6c20ec5f6 DeleteDC 960->961 961->959
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
      • String ID: &
      • API String ID: 4034434136-3042966939
      • Opcode ID: a499d526fc759152f962bd8ac92b94fef4b08a799c35396b5de34858d35d3e9a
      • Instruction ID: 73510f9f643af0cbc431e42adf69fb94c225714defb66555d69d03d10f849fc2
      • Opcode Fuzzy Hash: a499d526fc759152f962bd8ac92b94fef4b08a799c35396b5de34858d35d3e9a
      • Instruction Fuzzy Hash: B2D1BE727047828AEB208F21D4446AD37A5FB04B9DF028036DF9D97B84DFB9E980C780

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
      • String ID: 0u
      • API String ID: 3082052849-3203441087
      • Opcode ID: bf00bf6d4c918ad4b15b4ac4507d87e622e3328d71f4f2b0ff17e7bcb51563e4
      • Instruction ID: 6b966f558693dbba7f17d6e97a3fa0562133d5c00c3bb6674d8c7534f5a1c716
      • Opcode Fuzzy Hash: bf00bf6d4c918ad4b15b4ac4507d87e622e3328d71f4f2b0ff17e7bcb51563e4
      • Instruction Fuzzy Hash: BC711972608B8186E7248F21F44476AB7A5FB84B99F004229EFCE87B54DF7DD189CB04

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
      • String ID: VenNetwork
      • API String ID: 4155081256-3057682757
      • Opcode ID: 3f8584f5fcd7f5c6e2a43086911b50252391c07ec280dcb647a940034b709ca1
      • Instruction ID: c62e7282dbfd1b8c7cec452a947a83acbfba23849e7d68154f081f95cc25defb
      • Opcode Fuzzy Hash: 3f8584f5fcd7f5c6e2a43086911b50252391c07ec280dcb647a940034b709ca1
      • Instruction Fuzzy Hash: 94411A35B0C78282EB619F21E4443A92361FFA5B4AF454036DECEC2BA4DEBCD589C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1256 7ff6c20fbef0-7ff6c20fbf17 1257 7ff6c20fc2b0-7ff6c20fc2c1 CloseHandle 1256->1257 1258 7ff6c20fbf1d-7ff6c20fbf37 1256->1258 1259 7ff6c20fbf40-7ff6c20fbf5a call 7ff6c2104070 1258->1259 1262 7ff6c20fc290-7ff6c20fc2a8 1259->1262 1263 7ff6c20fbf60-7ff6c20fbf9c DeviceIoControl 1259->1263 1262->1257 1264 7ff6c20fbfa2-7ff6c20fbfa6 1263->1264 1265 7ff6c20fc288-7ff6c20fc28b call 7ff6c2103bd8 1263->1265 1266 7ff6c20fbfac-7ff6c20fc00b DeviceIoControl 1264->1266 1267 7ff6c20fc27a-7ff6c20fc280 1264->1267 1265->1262 1269 7ff6c20fc0a4-7ff6c20fc0a8 1266->1269 1270 7ff6c20fc011-7ff6c20fc018 1266->1270 1267->1259 1271 7ff6c20fc286 1267->1271 1273 7ff6c20fc195-7ff6c20fc1ed call 7ff6c211da50 call 7ff6c20fc6e0 * 2 1269->1273 1274 7ff6c20fc0ae-7ff6c20fc0f5 DeviceIoControl 1269->1274 1270->1269 1272 7ff6c20fc01e-7ff6c20fc026 1270->1272 1271->1262 1272->1269 1275 7ff6c20fc028-7ff6c20fc03e GlobalAlloc 1272->1275 1292 7ff6c20fc1f2-7ff6c20fc219 call 7ff6c20fbe90 1273->1292 1274->1273 1277 7ff6c20fc0fb-7ff6c20fc108 1274->1277 1275->1269 1278 7ff6c20fc040-7ff6c20fc084 DeviceIoControl 1275->1278 1277->1273 1280 7ff6c20fc10e-7ff6c20fc121 GlobalAlloc 1277->1280 1281 7ff6c20fc09b-7ff6c20fc09e GlobalFree 1278->1281 1282 7ff6c20fc086-7ff6c20fc08c 1278->1282 1280->1273 1284 7ff6c20fc123-7ff6c20fc15f DeviceIoControl 1280->1284 1281->1269 1282->1281 1285 7ff6c20fc08e-7ff6c20fc099 1282->1285 1287 7ff6c20fc161-7ff6c20fc179 call 7ff6c20fc640 GlobalFree 1284->1287 1288 7ff6c20fc18c-7ff6c20fc18f GlobalFree 1284->1288 1285->1269 1285->1281 1287->1273 1293 7ff6c20fc17b-7ff6c20fc18a call 7ff6c20fc2d0 1287->1293 1288->1273 1298 7ff6c20fc220-7ff6c20fc227 1292->1298 1293->1273 1298->1298 1299 7ff6c20fc229-7ff6c20fc22d 1298->1299 1300 7ff6c20fc234-7ff6c20fc23c 1299->1300 1300->1300 1301 7ff6c20fc23e-7ff6c20fc248 1300->1301 1301->1262 1302 7ff6c20fc24a-7ff6c20fc24d 1301->1302 1303 7ff6c20fc250-7ff6c20fc258 1302->1303 1303->1303 1304 7ff6c20fc25a-7ff6c20fc25e 1303->1304 1305 7ff6c20fc260-7ff6c20fc26e 1304->1305 1305->1305 1306 7ff6c20fc270-7ff6c20fc275 1305->1306 1306->1267
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDeviceGlobal$Free$Alloc
      • String ID: - External Hub$%s-%s|
      • API String ID: 3253977144-729331614
      • Opcode ID: 1f7e9db755a157d432911f1b9fe012dddbccf9669206c13c65b8f16a53449968
      • Instruction ID: 758a6093adc107f053d0cbb6d8addc85015265e56507af06782401577cefd33c
      • Opcode Fuzzy Hash: 1f7e9db755a157d432911f1b9fe012dddbccf9669206c13c65b8f16a53449968
      • Instruction Fuzzy Hash: 92B1AA72A08B8186E760CF60E8403AAB7A0FB85B99F454236DF8D97B94DF7CD585C704

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
      • String ID: %d min$Console$IpDatespecial
      • API String ID: 357503962-2712035571
      • Opcode ID: ace1b3d2cd48c08365a0f90486035991872f61de3151780784e465d55028fd4b
      • Instruction ID: e2a06dfe49ca288e8c0f040b322200421b70543f58ca584c1c8037b85af13b71
      • Opcode Fuzzy Hash: ace1b3d2cd48c08365a0f90486035991872f61de3151780784e465d55028fd4b
      • Instruction Fuzzy Hash: 1151BD72708E8685EB608F24EC443A923A5EB44B5EF454132DE8C87BA8DF79D689C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
      • String ID: &
      • API String ID: 370471037-3042966939
      • Opcode ID: 7f9e19e0c3492a4602d088b06f396f1b06bc9926d3b4bbca2e4df5d1cc66e2cf
      • Instruction ID: e0525705c6f9dd9287ffee70a69e70e054bf3a611b243b034d8f94f606dba40e
      • Opcode Fuzzy Hash: 7f9e19e0c3492a4602d088b06f396f1b06bc9926d3b4bbca2e4df5d1cc66e2cf
      • Instruction Fuzzy Hash: A5518532B0474286EB119F25D5046B82361FB54B9EF554132DEDD87B94DFBDE582C380
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoSystem$AddressHandleModuleNativeProc
      • String ID: GetNativeSystemInfo$kernel32.dll
      • API String ID: 3433367815-192647395
      • Opcode ID: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
      • Instruction ID: eb9d991456e0420c60162be0aa30e2058a99b1da6e198716c075e371731f21b3
      • Opcode Fuzzy Hash: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
      • Instruction Fuzzy Hash: BEF06D15E18F8683EA50DF20D4502752251FFA8B0AF915335EDCEC1B55EFACD2D48640
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Close$OpenQueryValuelstrcmp
      • String ID:
      • API String ID: 4288439342-0
      • Opcode ID: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
      • Instruction ID: fe1e1f4747da915ad8db1d790e82006e6f9ae1c4761d01480f138f003ae68374
      • Opcode Fuzzy Hash: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
      • Instruction Fuzzy Hash: 51316131718B8182E760CF25E88866A73A4FB94B99F504231DEDD83BA8DF7DD544C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
      • String ID: %s%s %d %d $%s%s %d*%d
      • API String ID: 2331002265-1924168580
      • Opcode ID: a5ae18454dd4e952492b121e68ba7776273e3bb709e69e407b14d655c7c09278
      • Instruction ID: c9b2238698f281cf2dbf1cdb5ec6578559efe1d98b5a15a20dab589e79f7affd
      • Opcode Fuzzy Hash: a5ae18454dd4e952492b121e68ba7776273e3bb709e69e407b14d655c7c09278
      • Instruction Fuzzy Hash: 78A18D32B04B8589EB10CF69D4442AE7761FB89BA8F554226EEDD97B98CF78D081C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2067211477-0
      • Opcode ID: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
      • Instruction ID: dc1c24c823df4e37f107d36f26d6bed40a9f8f4f28ec6095480e53bfe61fff81
      • Opcode Fuzzy Hash: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
      • Instruction Fuzzy Hash: 44215C25A0EB8285EA14DF66A4000B9A3A0BF88F99F094535DF8DC3F55DEBCE4508600
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlCreateDeviceFile
      • String ID: L$\\.\
      • API String ID: 107608037-1891537229
      • Opcode ID: a07068868a0198f375fdba6670056fd9ee1ad646044f5fd81988d03a78d23320
      • Instruction ID: fb1475347925c0438ae310189798218eb7e454b3ae251c89cfcfd81b4caea095
      • Opcode Fuzzy Hash: a07068868a0198f375fdba6670056fd9ee1ad646044f5fd81988d03a78d23320
      • Instruction Fuzzy Hash: 76319362A0978181E7508F11B49037A7B90EB85BE9F084235EFE987BC9DFBCD4058B04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentThreadsend
      • String ID:
      • API String ID: 302076607-0
      • Opcode ID: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
      • Instruction ID: 8410d5ae56e32b2b068c338387f5275078b17ec7ba9618ba6bd01322b7495d47
      • Opcode Fuzzy Hash: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
      • Instruction Fuzzy Hash: 33515F22B04B4687E7149F25E54437AB7A0FB84B89F05803ACFD987B55DFB8E5928381
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CancelEventclosesocketsetsockopt
      • String ID:
      • API String ID: 852421847-0
      • Opcode ID: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
      • Instruction ID: d5348ebb37f3fbc41445aea39e290f3e6268f011f69350882819f57093e23b4a
      • Opcode Fuzzy Hash: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
      • Instruction Fuzzy Hash: E9F06D3260478187E7148F25E55432AB330FB84B69F104335CBAC87BA4CF79D0A5C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
      • String ID:
      • API String ID: 3058672631-0
      • Opcode ID: e8f6ede7849d36d52dc95aee6e98d13eba40ea345c343918e182da1ef7c32a74
      • Instruction ID: 4963874d369446ee22995b0a5a7e7a5f6954b75c18dc5d5da84afeefa7ca47fd
      • Opcode Fuzzy Hash: e8f6ede7849d36d52dc95aee6e98d13eba40ea345c343918e182da1ef7c32a74
      • Instruction Fuzzy Hash: D031CD21B0C78285EA20CF11A4442AAA7A1EB89BD5F154135EEDD87B85DF7DC4428B00
      APIs
        • Part of subcall function 00007FF6C20E61E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF6C20E6231
        • Part of subcall function 00007FF6C20E61E0: GetLastError.KERNEL32 ref: 00007FF6C20E623B
      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6C20EC7D4), ref: 00007FF6C20EC9DA
      • GdiplusStartup.GDIPLUS ref: 00007FF6C20ECA0F
      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6C20EC7D4), ref: 00007FF6C20ECA27
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
      • String ID:
      • API String ID: 2723390537-0
      • Opcode ID: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
      • Instruction ID: f410e8c32365018ca74f182764139990a1fda8373ce09ea4aa3dff677c124310
      • Opcode Fuzzy Hash: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
      • Instruction Fuzzy Hash: ED014032A08B8586E7509F15E40436AB7E5F795B4AF491025EBCE83B54CF7CD495CB40
      APIs
        • Part of subcall function 00007FF6C210EE88: GetLastError.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EE97
        • Part of subcall function 00007FF6C210EE88: SetLastError.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EF37
      • CloseHandle.KERNEL32(?,?,?,00007FF6C2108CC5,?,?,?,?,00007FF6C2108B09), ref: 00007FF6C2108B53
      • FreeLibraryAndExitThread.KERNEL32(?,?,?,00007FF6C2108CC5,?,?,?,?,00007FF6C2108B09), ref: 00007FF6C2108B69
      • ExitThread.KERNEL32 ref: 00007FF6C2108B72
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
      • String ID:
      • API String ID: 1991824761-0
      • Opcode ID: a30104ba4f4f868018fa850f0c9dce139a3884833968d360b0db499d9868783c
      • Instruction ID: 311a17699b370b0981fd3519177c504c5f2c966cd3cefd7930e1a4f482b60ccf
      • Opcode Fuzzy Hash: a30104ba4f4f868018fa850f0c9dce139a3884833968d360b0db499d9868783c
      • Instruction Fuzzy Hash: E0F03C61A08A8641EA64AF24D04427C6265AF40F7EF1D0735CFBCC2BE4DFB8D8558340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID:
      • API String ID: 626452242-0
      • Opcode ID: bc16c43eea0ed280334d93034586a90535d51b13af79ee49b066fa01463f18a8
      • Instruction ID: 36601720316e490934925c0bc85bf44888d383b1952758f382115b4c57f81349
      • Opcode Fuzzy Hash: bc16c43eea0ed280334d93034586a90535d51b13af79ee49b066fa01463f18a8
      • Instruction Fuzzy Hash: 11115E32B08B8186A710DF26B84102A77A5BB84FE9B584239EFD983B94DF78E4518704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: SleepTimetime
      • String ID:
      • API String ID: 346578373-0
      • Opcode ID: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
      • Instruction ID: ee71a7a14567f2014b0a81e687ed0874d49b8c6e6aeff276b55bd8ab314ca1dd
      • Opcode Fuzzy Hash: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
      • Instruction Fuzzy Hash: B2016122B1864187E7644F24E18833D26A0FB44B49F451139DBDA86BD0CFBCD4E5C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorExitLastThread
      • String ID:
      • API String ID: 1611280651-0
      • Opcode ID: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
      • Instruction ID: 69e8505fe17ecabf96cc6a218e91f2ce362dd68da7806f947c91a8a0ad1662b3
      • Opcode Fuzzy Hash: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
      • Instruction Fuzzy Hash: AEF06D21E1A68682EE14AF71D40907D1260AF64F6AF041434DF8DC7B96DEACE4918300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task
      • String ID:
      • API String ID: 118556049-0
      • Opcode ID: 27ce854fd7d12c0980c58eb44fd6b716ec2b61cb45cb586127daaf2819af3026
      • Instruction ID: 7caeb75034f27608c332bceeac12403b8ec4d35b87007195f2a38def497e0e8f
      • Opcode Fuzzy Hash: 27ce854fd7d12c0980c58eb44fd6b716ec2b61cb45cb586127daaf2819af3026
      • Instruction Fuzzy Hash: 24E0BF44F9D10B45F9186E66240687A01401F5477AF1B1B32DEFDC47D3ADDCA469C159
      APIs
      • RtlFreeHeap.NTDLL(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E972
      • GetLastError.KERNEL32(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E97C
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
      • Instruction ID: fd5c9281d599b22ad3ebd1025452d4f9f95fa79e86123c206009dfd1fb29f3fe
      • Opcode Fuzzy Hash: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
      • Instruction Fuzzy Hash: DEE08C10F1934342FF586FF6A84517826A1AF94F0AF005434CF8DC7B51DEBCA8A04310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
      • Instruction ID: 6bfa94fb11ef675bfcc79a56336598d71eae54afa1f76e763a80706da70d50b3
      • Opcode Fuzzy Hash: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
      • Instruction Fuzzy Hash: 72218121B18A4186D764CF2AF48012AB7B1FB88B84B148135EBDED3B19EE3CE5C18744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
      • Instruction ID: d3d05d13d4d335b6c72d47967d9029ff588653183b20b98f34aa64da99909416
      • Opcode Fuzzy Hash: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
      • Instruction Fuzzy Hash: 4A11D371B28A4182D7548F2AA440129A3A5EB98FC9B144132EE8ED3B58EE7CD9C1C780
      APIs
        • Part of subcall function 00007FF6C20FDD80: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF6C20FDD94
      • __scrt_release_startup_lock.LIBCMT ref: 00007FF6C20FE177
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
      • String ID:
      • API String ID: 2217363868-0
      • Opcode ID: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
      • Instruction ID: dbebe6031629d9c9f4460de6e4a70aef1d28a3c26ce0faf839a1d0c2c000d7b6
      • Opcode Fuzzy Hash: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
      • Instruction Fuzzy Hash: D6315922B8D24741FA54AF25D4113BA2291AF81B8EF550036EECDCB7E7DEACA4448745
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Startup
      • String ID:
      • API String ID: 724789610-0
      • Opcode ID: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
      • Instruction ID: 4a6d4d966b71bcdb6c5b7f77e71819a5e52df5f318c7a0d4b420dd47ff2e60e9
      • Opcode Fuzzy Hash: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
      • Instruction Fuzzy Hash: 52E04F39B05A45CAE6119F24D4490A47364FB68709F404132EACCC3B94DF7CD155CB00
      APIs
      • HeapAlloc.KERNEL32(?,?,?,00007FF6C21127CD,?,?,00000000,00007FF6C210A69B,?,?,?,00007FF6C210C873,?,?,?,00007FF6C210C769), ref: 00007FF6C210F0AE
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
      • Instruction ID: 5bed41fa256146b9d2fab92d17d6725937311736381ece7ff19bea28ecb466dd
      • Opcode Fuzzy Hash: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
      • Instruction Fuzzy Hash: 26F08241B0D38641FE546F629A42A7522825FA4F6AF080730DFAEC6FC5DDACE4614211
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
      • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
      • API String ID: 3040193174-4212407401
      • Opcode ID: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
      • Instruction ID: d025c05fe1b8821b5efe1d18ced40483fc639c3a143f74a29821cf975c0c5566
      • Opcode Fuzzy Hash: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
      • Instruction Fuzzy Hash: 69A14D72B08B8285EB25CF21E8143A923A4FB99B8DF404135DE8D97B64DFBCD285C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
      • String ID: [$[$%s%s$%s%s$%s%s$[esc]
      • API String ID: 3669393114-972647286
      • Opcode ID: 0ba4a650500777e326fb2fa0ba1ce122045bb19d315cab67db3075d848846471
      • Instruction ID: 24786ec39e186c7e35c4447b0f9fb6325ce27342e9ec7130608e6ba218ec6eee
      • Opcode Fuzzy Hash: 0ba4a650500777e326fb2fa0ba1ce122045bb19d315cab67db3075d848846471
      • Instruction Fuzzy Hash: 22D15B25A0874282EB10DF55E8442B963A1FF95B4AF414136DFCEC2BA4DFBCE588C780
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$CreateEventLocalTimewsprintf
      • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
      • API String ID: 2157945651-1225219777
      • Opcode ID: 47fad789ab3af050acc245a7c8e2a4ba1bf5ebe93637114f82c187b4c691db7b
      • Instruction ID: 7d94e48316f86d0a3728443cc721ffbb812746ee51554d2e3de1806715d8cfe3
      • Opcode Fuzzy Hash: 47fad789ab3af050acc245a7c8e2a4ba1bf5ebe93637114f82c187b4c691db7b
      • Instruction Fuzzy Hash: BCF1D166B1469286EB209F25E8403BD23A4FB44B8EF414232DEDD97B95DFBCE581C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
      • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
      • API String ID: 2977986460-1099148085
      • Opcode ID: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
      • Instruction ID: 8204fcd367c26a11a2938d16b471214005ba196ce633cde88fea386245874170
      • Opcode Fuzzy Hash: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
      • Instruction Fuzzy Hash: 2B41B265709B4282EA24DF11E40477A67A0FF89B9AF484131DEDE87B54DFBCD184CB80
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
      • String ID:
      • API String ID: 1851032462-0
      • Opcode ID: aabcae955cac2af6ba832851c4318358007fcfe9d1e2923aa11ce886c13c8c26
      • Instruction ID: faf764cbccfb2fe753ad92429ef618519dc3a9ebfa9c450d6ba0baa5a8dbcc7c
      • Opcode Fuzzy Hash: aabcae955cac2af6ba832851c4318358007fcfe9d1e2923aa11ce886c13c8c26
      • Instruction Fuzzy Hash: A7D1C172B49B8282EB109F65E4442AE6361FF84B99F014136EE9D83BD9DFBCE444C744
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
      • String ID: %s %s$%s%s$3b6311a8-7ec5-474e-9db0-a86adda60c45$@$Windows\System32\svchost.exe$h$nlyloadinmyself$plugmark
      • API String ID: 4033188109-2318592918
      • Opcode ID: dd76dec3fe357dc3d491a64959cfce8b3d3ceb37c461736123a1101bb35bc249
      • Instruction ID: ea697b4cba084c09656dccaaecc6a3e1f3461efef724fa9828b770e7b9f56ab1
      • Opcode Fuzzy Hash: dd76dec3fe357dc3d491a64959cfce8b3d3ceb37c461736123a1101bb35bc249
      • Instruction Fuzzy Hash: C112A066B18A8282EB20CF25D4442BD67A1FB98B49F458136DFCD87B95DFBCE185C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
      • Instruction ID: cf6be719504b6682b9ca070539412be5c85568834aa5f6dd25318e1a520fb956
      • Opcode Fuzzy Hash: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
      • Instruction Fuzzy Hash: 01313C75A08B8686E720CF24E8143AA6361FB94B5BF104036DE8DD2B64CFBCD1C9C740
      APIs
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA6C5
      • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA74A
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA79F
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA7BE
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA821
      • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA842
      • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA856
      • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA873
      • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA88F
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FA8AC
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20ED242), ref: 00007FF6C20FAB92
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
      • String ID:
      • API String ID: 1282860858-0
      • Opcode ID: 4d973c66754e088e73cc59f97826ef657113e5d729d23b3f6b76df67dc1bbb1c
      • Instruction ID: 82c64f378c18bc360761b38ebf30b67d7626862508cd2994f56937ce7093010d
      • Opcode Fuzzy Hash: 4d973c66754e088e73cc59f97826ef657113e5d729d23b3f6b76df67dc1bbb1c
      • Instruction Fuzzy Hash: 16D19431B5964286EB60CF1AE45177A73A5FF58B8AF064036CE8DC7B80EEBCE4458354
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
      • Instruction ID: 4600a640b324ad37edbc2bd0e479e25e75617b423707718103ea4eeb35c46790
      • Opcode Fuzzy Hash: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
      • Instruction Fuzzy Hash: 5B312D75A08B8686E720CF25E8143AA6361FB94B5BF504036DE8DD6B64CFBDD1C9C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
      • Instruction ID: c32d9919457c1356b050154bece528a753d04223db7c51c9b96db70f2852201a
      • Opcode Fuzzy Hash: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
      • Instruction Fuzzy Hash: 3A310D75608F8685E720CF25E8143AA6361FB94B5BF504036DE8DD6B64CFBDD18AC740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
      • Instruction ID: c4f5ab80ee1e5152d395c27b2decdeb2a3dec479011c1683fecc9b98166abc5c
      • Opcode Fuzzy Hash: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
      • Instruction Fuzzy Hash: 7DB2C072A182828AE724CE64D4407FD37A1FB64B89F505135DF59D7F88DFB8EA808B40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Close$OpenQueryValuelstrcpy
      • String ID: %08X
      • API String ID: 2032971926-3773563069
      • Opcode ID: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
      • Instruction ID: d9856d5aecaff20aec7400914aeb5ec6fb31383e14896265564c52b55cbedbf1
      • Opcode Fuzzy Hash: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
      • Instruction Fuzzy Hash: 12512A72648A8281E670CF25E4443ABA3A1FB95B59F804136DBDD83BA8DF7CD544CB08
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
      • TranslateName.LIBCMT ref: 00007FF6C21179E6
      • TranslateName.LIBCMT ref: 00007FF6C2117A21
      • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF6C210D778), ref: 00007FF6C2117A68
      • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF6C210D778), ref: 00007FF6C2117AA0
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C2117C5D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
      • String ID: utf8
      • API String ID: 3069159798-905460609
      • Opcode ID: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
      • Instruction ID: b9ea34ec605ec3fb82722d7124d884174a898c22c1b65a9e98042601776c5950
      • Opcode Fuzzy Hash: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
      • Instruction Fuzzy Hash: 26917F32A0874285EB24AF21E9412B923A5EB64F8AF444531DF8DC7BC5DFBDE592C740
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED55
      • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF6C2118534
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED82
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED93
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDA4
      • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF6C210D771), ref: 00007FF6C211851B
      • ProcessCodePage.LIBCMT ref: 00007FF6C211855E
      • IsValidCodePage.KERNEL32 ref: 00007FF6C2118570
      • IsValidLocale.KERNEL32 ref: 00007FF6C2118586
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C21185E2
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C21185FE
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
      • String ID:
      • API String ID: 2591520935-0
      • Opcode ID: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
      • Instruction ID: 61a3cc88c36cfba89462c10196c93e40166d3481fdada96cae7b19ebabf08644
      • Opcode Fuzzy Hash: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
      • Instruction Fuzzy Hash: 4C715662B1860299FB609F64D8512F932A1BF64B4AF458135CF8DC3B95EFBCE485C350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 3140674995-0
      • Opcode ID: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
      • Instruction ID: 0e2509aab06ff181beb724fdfdf1114b9cc1aa50e07744dc527dfa0f2b1dd6c6
      • Opcode Fuzzy Hash: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
      • Instruction Fuzzy Hash: DE312C72618B8186EB608F60E8407EE7364FB94B49F44403ADB8E87B95EF7CD648C714
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Event$ClearCloseOpen
      • String ID: Application$Security$System
      • API String ID: 1391105993-2169399579
      • Opcode ID: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
      • Instruction ID: 0e84a36bfa796ba9cce9aa3dd27395707024aa9e7620bc5832fe1ca9391ca84d
      • Opcode Fuzzy Hash: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
      • Instruction Fuzzy Hash: 38F03126A0DF4681EA15CF15F444266A3A5FF89B6AF041036DECDC2B64EEBCD1E68700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
      • Instruction ID: f862f38ca93e8a29cc6b0302f6f35d4456f8111413e197aa5112433d3f9acfcf
      • Opcode Fuzzy Hash: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
      • Instruction Fuzzy Hash: 36317E32618B8186DB60CF25E8842AE73A4FB98B59F540136EF8D87B95DF7CC555CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: FileFindFirst_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2227656907-0
      • Opcode ID: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
      • Instruction ID: cb234b2cf140f11bc77eb116b5884a4cafe45e25726d7355f25c0e7f901398ac
      • Opcode Fuzzy Hash: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
      • Instruction Fuzzy Hash: C0B18326B1869241EA619F23E4146BA6391EB64FD9F445131EF9EC7F85EEFCE4818300
      APIs
      Strings
      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6C20FC8AF
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: DebugDebuggerErrorLastOutputPresentString
      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
      • API String ID: 389471666-631824599
      • Opcode ID: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
      • Instruction ID: 3bcc7c650c0f3c3eeb19ba200277a0b63ac2157a5ebbe3844355c7e5c70cd60e
      • Opcode Fuzzy Hash: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
      • Instruction Fuzzy Hash: DA112832A14B4296F704DF26E6453B932A1FB5474AF404135CB8DC2EA0EFBCE4A5C750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
      • Instruction ID: 0ca8c1b122a76303ef65bb35a3a8b50afd6a3bbe3f1d4f2425eb8d811be31c21
      • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
      • Instruction Fuzzy Hash: DFC1E572B186CA87E724CF16A04466AB791F784B89F448135DF8AC3B94DF7DEA11CB40
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED55
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C2117EAC
        • Part of subcall function 00007FF6C2113FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2113FE9
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C2117EF5
        • Part of subcall function 00007FF6C2113FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C2114042
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C2117FBD
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1791019856-0
      • Opcode ID: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
      • Instruction ID: 45aa820644556c9effb340f906338ebf27269ebb6224ffde04a0519ec4fa782d
      • Opcode Fuzzy Hash: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
      • Instruction Fuzzy Hash: 6B617C32A0854386EB248F25D5502BA73A1EB64B4AF058235DFDDD3B95DFBCE591C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoLocale
      • String ID: GetLocaleInfoEx
      • API String ID: 2299586839-2904428671
      • Opcode ID: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
      • Instruction ID: 8af925f862be06391e55ad0c5f9494863b1ef0fb7c71ab0e34ac2bb234e11867
      • Opcode Fuzzy Hash: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
      • Instruction Fuzzy Hash: F101DF64B08A8185EB008F5AB4001A6A260AB94FD9F584031EF8DC3F59CEBCD9818340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
      • Instruction ID: 79d86ceb0de51c29d253d3f37852aedefc3a362d0c6eff24331f40071e70eeeb
      • Opcode Fuzzy Hash: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
      • Instruction Fuzzy Hash: 52B13777604B898AEB158F29C8463687BA0F794F49F148922DF9DC7BA8CF79D491C700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: $
      • API String ID: 0-227171996
      • Opcode ID: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
      • Instruction ID: 8349aabc475e11705383a923d0af21986e6139840171a3a0c814a28b1135bf0b
      • Opcode Fuzzy Hash: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
      • Instruction Fuzzy Hash: 00E19236A0868681EB688E29805453D3BA0FF45F9DF145235DF8EC7B94DFA9E863C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: e+000$gfff
      • API String ID: 0-3030954782
      • Opcode ID: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
      • Instruction ID: 2b839eecd4f6bfebadd551367e6bec2da8d2a38856a296aa50d1386ad06c8a6e
      • Opcode Fuzzy Hash: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
      • Instruction Fuzzy Hash: B1514762B182C586E7248E36A901769BB91E744F99F48C231DFD8CBFD5CEBDD0548700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Info
      • String ID:
      • API String ID: 1807457897-0
      • Opcode ID: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
      • Instruction ID: 5fd3cbaaa44ebff6de336aa74cc90bcdc5e5666cc1c6dfda5314b9ec02438688
      • Opcode Fuzzy Hash: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
      • Instruction Fuzzy Hash: 68127922A08BC186E751CF2994542F973A4FB58B49F059236EFDCC6B92EF79E190C300
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
      • Instruction ID: 0815f0dfb47ea9093ccaa729ea525a8701adffca0cdc9677b6c8cc3b643179b7
      • Opcode Fuzzy Hash: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
      • Instruction Fuzzy Hash: 81E12D32A04B9586E720DF61E4412EE77A4FB64B89F404636DF9D93B56EFB8D285C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: [RO] %ld bytes
      • API String ID: 0-772938740
      • Opcode ID: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
      • Instruction ID: 5eabc7e720e03b08d3d26d0a789a9d034be7a228d0d4eba04cca5440f83df8cc
      • Opcode Fuzzy Hash: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
      • Instruction Fuzzy Hash: FE428C736092C58BC328CF28D44066E7FA0F755B48F44812ADBCA87B46DB78E995CB91
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
        • Part of subcall function 00007FF6C210ED10: FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED55
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6C21180F0
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastValue$InfoLocale
      • String ID:
      • API String ID: 673564084-0
      • Opcode ID: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
      • Instruction ID: 3bb657831c529eee74f06881ad383656038d838f9b9ba21863f0b72eb2bfeaf7
      • Opcode Fuzzy Hash: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
      • Instruction Fuzzy Hash: 99315E32B086828AFB248F21D4417AA72A1FB54B89F558535DFCDC3B85DFBCE4918700
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
      • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6C21184C7,00000000,00000092,?,?,00000000,?,?,00007FF6C210D771), ref: 00007FF6C2117D76
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EnumLocalesSystemValue
      • String ID:
      • API String ID: 3029459697-0
      • Opcode ID: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
      • Instruction ID: 024a940d52b596484f4e2a0b4bc0bc06de48c1bf0dc394b48c7625b218b83222
      • Opcode Fuzzy Hash: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
      • Instruction Fuzzy Hash: 66112763A086458AEF108F15D0802B877A1FB60FA5F548131DBA9C37C0DFB9D6D2C700
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
      • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6C211803A), ref: 00007FF6C21182C7
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$InfoLocaleValue
      • String ID:
      • API String ID: 3796814847-0
      • Opcode ID: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
      • Instruction ID: b09b6c72a2508869832ce7f43444df3ad26887a8211fdfc6e45949e45d52e974
      • Opcode Fuzzy Hash: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
      • Instruction Fuzzy Hash: DE11C831B2855283F7648E25A0406BF6261EB64B69F59C631DFADC7BC4EEB9D8C18700
      APIs
        • Part of subcall function 00007FF6C210ED10: GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
        • Part of subcall function 00007FF6C210ED10: FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
        • Part of subcall function 00007FF6C210ED10: SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
      • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6C2118483,00000000,00000092,?,?,00000000,?,?,00007FF6C210D771), ref: 00007FF6C2117E26
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EnumLocalesSystemValue
      • String ID:
      • API String ID: 3029459697-0
      • Opcode ID: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
      • Instruction ID: ae8857caa60f2972e106c45177c916a74f6cb79a422694a3e870f6c1282d8d69
      • Opcode Fuzzy Hash: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
      • Instruction Fuzzy Hash: 8F01D262F0828546EB204F15E4407B976E1EB60FAAF558231DBA8C7BC4CFB8D8C28700
      APIs
      • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF6C2110F7F,?,?,?,?,?,?,?,?,00000000,00007FF6C2117328), ref: 00007FF6C2110B27
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EnumLocalesSystem
      • String ID:
      • API String ID: 2099609381-0
      • Opcode ID: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
      • Instruction ID: 6701fff515d39680ef9a75c428265de3b48601851d470ef03ad9703b8350da17
      • Opcode Fuzzy Hash: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
      • Instruction Fuzzy Hash: 2AF01972B08B4183E604DF15E8906AA6366FB99F85F548036EF8DD7B65CEBCD4A0C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: gfffffff
      • API String ID: 0-1523873471
      • Opcode ID: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
      • Instruction ID: 3b70ba9eb853a048be071d05148369bd8cf2cf3529bd8fd045799aa3a9dd7a52
      • Opcode Fuzzy Hash: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
      • Instruction Fuzzy Hash: 31A14563A087C686EB21CF29A1017A97B91EB50F88F058132DF8DC7B95DE7DE516C701
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
      • Instruction ID: 8988cf1c28ceebc4a7c39dd40850a021a4636cd56e0ce619090b7346ee67fa8b
      • Opcode Fuzzy Hash: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
      • Instruction Fuzzy Hash: 29B159B2A086C689EB648F29805023C3BA0E749F4DF285136DF8EC7B95CFB9D461C705
      APIs
      • GetLastError.KERNEL32 ref: 00007FF6C2112A89
        • Part of subcall function 00007FF6C2110A28: HeapAlloc.KERNEL32(?,?,00000000,00007FF6C210EEEA,?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000), ref: 00007FF6C2110A7D
        • Part of subcall function 00007FF6C210E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E972
        • Part of subcall function 00007FF6C210E95C: GetLastError.KERNEL32(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E97C
        • Part of subcall function 00007FF6C211A24C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C211A27F
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
      • String ID:
      • API String ID: 916656526-0
      • Opcode ID: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
      • Instruction ID: d91c001ef46746c7448522fd685ae59ee7f3612e1a662191a741da9f9bb501ef
      • Opcode Fuzzy Hash: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
      • Instruction Fuzzy Hash: 6541A221B096A341FA705E26745167AA6A0BFA5F8AF444535EFCDC7FC5EEBCE4808600
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
      • Instruction ID: 3bb79c61b73e213a80e73269346f2dd72438fedb2b6e91c8894266fc4bd4754c
      • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
      • Instruction Fuzzy Hash: 3F22CEB7B3805047D36DCB1DEC52FA97692B7A5348748A02CBA07C3F45EA3DEA458A44
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
      • Instruction ID: 4f175223612d133407d974edc293dd9997d5cc33747b4566023f255cbcdc215b
      • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
      • Instruction Fuzzy Hash: 9FC10F73B0869187DB09CF52E94056A77A2B7C8BD5B56C135CE8A47B88DE3CD801CB00
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
      • Instruction ID: f149e68e35a2fbc7e6e54de33c0a96fe108c58f86f66c0bc169478c49a7ca598
      • Opcode Fuzzy Hash: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
      • Instruction Fuzzy Hash: 19D1B522A0868686FB688E29845027E2BA0FB05F4DF145135DF8DC7BD5DFB9E863C740
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
      • String ID:
      • API String ID: 4023145424-0
      • Opcode ID: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
      • Instruction ID: 18ed8e43bebfe4975a5f3c2e0aae2fa3728e1ad549dcbd0a5bf45d2157320616
      • Opcode Fuzzy Hash: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
      • Instruction Fuzzy Hash: BFC1932AA186C285EB609F6295107BA67A0FB94F8DF404036EFCDC7B89DEBCD555C700
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$Value_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1500699246-0
      • Opcode ID: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
      • Instruction ID: 9fe7d299f0e08ed88994b65959d05c858d5b76b4b733be87f643099a88fcc6ce
      • Opcode Fuzzy Hash: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
      • Instruction Fuzzy Hash: BFB1B332A0864686EB649F25D5116B933A1EB64F8EF504131DF89C3BC9DFBCE592C780
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
      • Instruction ID: bc65e55136a3522cc07b754b869c0f473c40dc07fc6a11315d2d0cbc36369d61
      • Opcode Fuzzy Hash: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
      • Instruction Fuzzy Hash: 1BB16C729086C585EB648F29809027C3BA4EB49F4DF284139CF8EC7B99CFB9E461C755
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
      • Instruction ID: b180853b3ddc7f6a4339f2aaba5af23bd0f94187574e22d37cf05c8010c2ec0d
      • Opcode Fuzzy Hash: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
      • Instruction Fuzzy Hash: E381B072A04A9186EB609E26D4913BD33A0FB84F9DF104636EF9DD7B99CF78D5618300
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
      • Instruction ID: e20cacdb80031b6d35c3914555ede45dd5a0ae93097af51eee557a56b8322643
      • Opcode Fuzzy Hash: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
      • Instruction Fuzzy Hash: 9481A172A087818AE7A4CE19944037A6691EB55BD9F144235EFCDC3F95CE7DD5809B00
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
      • Instruction ID: 7d3514ab839386570e5be86be82c7387b2a647f575492ef2c593451aab33e3fb
      • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
      • Instruction Fuzzy Hash: 3F610772B18BC982DE208F29E4516AAA360FB59794F559236DFDC87B54EF7DE180C300
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction ID: ab584789bf448eb12a0b0edd766480509f9b8aac1e0e5ef3cf2fa74010e58980
      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction Fuzzy Hash: A0514F36A18695D6E7248E29C05022937A0FB49F6DF244131DF8DDBB94CFBAE863C740
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction ID: a45b4ba527c88829272ae7f69beeb7650e19212abf13f98aaffb3e2e529d0849
      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction Fuzzy Hash: 66515F76A1869596E7248F29C09022837A1FB44F6DF248131DF8DD7B94CFBAE863C740
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction ID: 4a71fcc27f2ada15bc4ade4dbcd295588c45b76686c362b839924782e276e900
      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction Fuzzy Hash: 35515F76A18A9196E7248F29C05022827A0FB44F6DF244131CF8DD7B94CFBAE863D780
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
      • Instruction ID: e54379e9114fe15f4702c5787bb0b821782f617d076dc80bb5de4d4b78543ba7
      • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
      • Instruction Fuzzy Hash: 08516036A1869196E7648F29C04427C27A1FB58F5EF244131CF8DD7BA4DF7AE862C780
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
      • Instruction ID: 07f6299138035a17278e23deeca216e02fe18748a04f030beec4cf861b2b6d02
      • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
      • Instruction Fuzzy Hash: 9C513C36A1869596E7248E29C04472D27A0FB44F5EF244131CF8DD7BA8DF7AEC62C780
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
      • Instruction ID: bd7b6aa4e8bbbc117f17394a4f2909c96a5452b18511afb680a5456439d3e611
      • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
      • Instruction Fuzzy Hash: 5C517436A1869196E7248F2AC04423837A0FB44F6DF285131CF8DD7B95DF7AE862C744
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
      • Instruction ID: a4a1e976e098f02aa905f70499a48c10437fa5191cfd273bff1378851e190fcc
      • Opcode Fuzzy Hash: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
      • Instruction Fuzzy Hash: 3C41E272B14A9581EF08CF2AD92426973A2BB48FC4B489032EF8DD7B58DE7DD0518740
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
      • Instruction ID: c2a63489f85a396a5654f50b4b5b0d4a51449ee3078c6f19597482438bcf3725
      • Opcode Fuzzy Hash: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
      • Instruction Fuzzy Hash: 98F044716182558AEBA48F28A402A297795FB08785B908439DBC9C3F04DE7C90508F04
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
      • Instruction ID: a64f10247fb98e07e1f08f53f9c00206e0f1a2e4510e18f7c4689b834a859530
      • Opcode Fuzzy Hash: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
      • Instruction Fuzzy Hash: 19A00231A5CE42D0E604DF00E95413223B0EBA4B0AB4A0032CA8DC2A709FBDF581C355
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
      • String ID:
      • API String ID: 4058177064-0
      • Opcode ID: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
      • Instruction ID: e07aa702eef55d665a966753c6f6b8feeadc4db0608918c22a43e57d0a1f9a97
      • Opcode Fuzzy Hash: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
      • Instruction Fuzzy Hash: E5914976B08A8296E7689F25D5442A973A0FB44B5AF014536CFEDC3B90CFB8E4A4C750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
      • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
      • API String ID: 1783372451-551013563
      • Opcode ID: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
      • Instruction ID: f806ad2bd955d18c5396dcf3e603e1fc60581b050f8c8bcfacba9858071ff7de
      • Opcode Fuzzy Hash: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
      • Instruction Fuzzy Hash: B5617032B18B9285EB20DF60D8442EA2361FB9874DF454136DE8D82F99EFBCD645C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
      • String ID:
      • API String ID: 1455939504-0
      • Opcode ID: 9a40c917c3a144fb0e85df481e15c57252f9d18ea51718549b18d6b35bc4cd58
      • Instruction ID: 0c9d3e91c7d9507fa78d7e1fa02b063c5c1587d902d0d38b85244ef8abd25714
      • Opcode Fuzzy Hash: 9a40c917c3a144fb0e85df481e15c57252f9d18ea51718549b18d6b35bc4cd58
      • Instruction Fuzzy Hash: 9B512C72608B9186E720CF61E84466A77A5FB94BA9F100236EEDD83F94CF7CD585C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
      • String ID:
      • API String ID: 2081738530-0
      • Opcode ID: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
      • Instruction ID: 48c92c13e1e2c3e37f66f3189ca9b8741c2886922454d73f3da3f0f38d83d3ef
      • Opcode Fuzzy Hash: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
      • Instruction Fuzzy Hash: 6E516136B88B4281EA159F19E44417A73A1FB54B9AF190133DEDD83BA6DFBCE442C304
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
      • String ID:
      • API String ID: 957247320-3916222277
      • Opcode ID: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
      • Instruction ID: 2835170e14b53e7c8c47e0356e4d35da0402da62d1dca024ffa65ddc2234e784
      • Opcode Fuzzy Hash: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
      • Instruction Fuzzy Hash: 8C712772B086828AE3648F29D58436976E0FB44B49F154136CFD9C3B95CFFDE8858B80
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
      • Instruction ID: 3d75a105ad216d7351b523a2c2bcf59bb3b114ad5fb94b5e1c78dd3d347c7890
      • Opcode Fuzzy Hash: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
      • Instruction Fuzzy Hash: A161CE32B0864286E6589F15D46567D6765FB84B8AF824432CFDEC3B90DFBCE894C380
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
      • Instruction ID: 46c2ef5ae897c10ec568f711f8a5f074265a1672a94e2dbe7a6da204870e1942
      • Opcode Fuzzy Hash: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
      • Instruction Fuzzy Hash: 92318820B0CB4286E7589F25E8891796661FF44B8AF550476DEDEC7B90CFBCE885C381
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseValue$CreateDeleteOpenlstrlen
      • String ID: Software$VenNetwork
      • API String ID: 3197061591-1820303132
      • Opcode ID: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
      • Instruction ID: bdc615d54ab84862062ed87124fdb07b37773f820869c5141e5b138e43b70589
      • Opcode Fuzzy Hash: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
      • Instruction Fuzzy Hash: FF213076608A4186E710DF26E84825AB361FB94FAAF444131EE9DC3F68DFBCD149CB04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalErrorLastSection$EnterLeave
      • String ID:
      • API String ID: 2124651672-0
      • Opcode ID: 81cee7a1bb8c55b665f2cb6114ea46a9dbeaedbff72b1fcf3e0ec13788c62983
      • Instruction ID: e158204ff45766edfccf0df89b4a2b603e6cadcdb96831ad9664100934f41333
      • Opcode Fuzzy Hash: 81cee7a1bb8c55b665f2cb6114ea46a9dbeaedbff72b1fcf3e0ec13788c62983
      • Instruction Fuzzy Hash: 5451BC32A086518BE7649F15E44467D77A5FB48B8AF06413ADECEC7751CF78E884C780
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$f$p$p$f
      • API String ID: 3215553584-1325933183
      • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
      • Instruction ID: 3a3e82935772cce2f1eb8c928c2624709529ca616e084b621ebade57746ee65a
      • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
      • Instruction Fuzzy Hash: C3127332A081C785FB209E16A18467A7251FB90B5AF944135EBCAC6FC4DFFDE5A08B14
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
      • String ID:
      • API String ID: 2911610646-0
      • Opcode ID: 34ebcb83ecca3e20ff49f256afc65ca9a808d404bf61d5c783bec37bfef76818
      • Instruction ID: 2dd1522ce4de3e89b37563dbe9b524f2d1c16dffdb159f04fd99d51f63f29240
      • Opcode Fuzzy Hash: 34ebcb83ecca3e20ff49f256afc65ca9a808d404bf61d5c783bec37bfef76818
      • Instruction Fuzzy Hash: FB513772A05B8297E7148F25E90436973A0FB4875AF110135DF8DD7BA0DFBDE4A98B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
      • String ID:
      • API String ID: 3019579578-0
      • Opcode ID: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
      • Instruction ID: c382120b48148e17bfa1054f149ec583b83c141940f5d23fb89a492b4e292160
      • Opcode Fuzzy Hash: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
      • Instruction Fuzzy Hash: 93410432A0864287E7749F15E44423EBB61FB94B5AF150536DBCA83B94DFBCE8C58780
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
      • Instruction ID: 383c36706c542eff7030ea93933624c94defe6d19b8b7a8a912429b950c6c8f3
      • Opcode Fuzzy Hash: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
      • Instruction Fuzzy Hash: 40310A32A186528AE7909F25D44426937A4FF54B4EF440432DE8EC6B54DFBCD499C741
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 849930591-393685449
      • Opcode ID: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
      • Instruction ID: 545928692ba84c9358972402602da8e0bc7d04ccd54434a6ef8fc50c6face240
      • Opcode Fuzzy Hash: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
      • Instruction Fuzzy Hash: BCD14D22A086818AEB209F6994803AD77A0FB55B9DF104135EF8DD7F96DF7CE5A1C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressFreeLibraryProc
      • String ID: api-ms-$ext-ms-
      • API String ID: 3013587201-537541572
      • Opcode ID: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
      • Instruction ID: 2c2c372fcacb35476ef0c7c47eea46852fd70f80820d86015ec8aa443f477dc3
      • Opcode Fuzzy Hash: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
      • Instruction Fuzzy Hash: D4411661F19B0245FA25CF16A80037A2291FF19FAAF054536DF8DD7B84EEBCE4899740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
      • String ID: %s %s
      • API String ID: 958574092-2939940506
      • Opcode ID: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
      • Instruction ID: 321ece75e1130b899578944a57fcf285016816b9d00bbca0d4588b60ce8f9b4c
      • Opcode Fuzzy Hash: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
      • Instruction Fuzzy Hash: 8A415F22A18BC682E711CF28D9042FD2320FBA4B5DF15A222DF8C56656EF79E2C5C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterLeave$ErrorLastsend
      • String ID:
      • API String ID: 3480985631-0
      • Opcode ID: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
      • Instruction ID: 98f57336e92d843602d5da6941d41cbdaa2af7fc94313d56d8bce3a3b2e1b056
      • Opcode Fuzzy Hash: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
      • Instruction Fuzzy Hash: 25415936608B8282E7948F25E5442AC73A4FB48F9DF190136CF9D87B58CFB8E595C790
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$p$p
      • API String ID: 3215553584-1995029353
      • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
      • Instruction ID: c45fb2814dbfab0f586ea7fcc03a4135dfa3a62aafb4cc2c55981a9f05121b13
      • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
      • Instruction Fuzzy Hash: 23126172A0C1C386FB24DE1591646BA7651EB40F5AF944135EBDAC6FC4DFBDE8A08B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
      • String ID:
      • API String ID: 2807917265-0
      • Opcode ID: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
      • Instruction ID: 7afacd81ee1573109b147f52cf107dcd0b14748c707659f83780a187500a14a1
      • Opcode Fuzzy Hash: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
      • Instruction Fuzzy Hash: 62517D72B0874286EB608F25A84427923A4FB54B6EF150632DEEEC7795DFBCE4C08741
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
      • String ID: bad locale name
      • API String ID: 1386471777-1405518554
      • Opcode ID: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
      • Instruction ID: 5688c6268587fc103a51262dee9545ee0bede966c5e6b19acc3c0b29f428e5df
      • Opcode Fuzzy Hash: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
      • Instruction Fuzzy Hash: DC516922B09B818AEB24DFA0D4902BD3370EF54749F054136DF8DA6A9ADF78E596C344
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
      • String ID: bad locale name
      • API String ID: 3908275632-1405518554
      • Opcode ID: 9e920306f43e4952b8c64fd291f4ca624831a52797418e3e011e95836a5b2e51
      • Instruction ID: 12cbfdc8853b18c5c4bcd8fd000f4c1d8a356ada9187f4e62b483c27b26d7bb7
      • Opcode Fuzzy Hash: 9e920306f43e4952b8c64fd291f4ca624831a52797418e3e011e95836a5b2e51
      • Instruction Fuzzy Hash: 7F517A22B49A8189FB10DFB4D4503BD3361AF44B4DF064136DE8DA6B9ADFB8955AC304
      APIs
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6C2103A7E,?,?,?,00007FF6C2103770,?,?,?,00007FF6C21003A9), ref: 00007FF6C2103851
      • GetLastError.KERNEL32(?,?,?,00007FF6C2103A7E,?,?,?,00007FF6C2103770,?,?,?,00007FF6C21003A9), ref: 00007FF6C210385F
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6C2103A7E,?,?,?,00007FF6C2103770,?,?,?,00007FF6C21003A9), ref: 00007FF6C2103889
      • FreeLibrary.KERNEL32(?,?,?,00007FF6C2103A7E,?,?,?,00007FF6C2103770,?,?,?,00007FF6C21003A9), ref: 00007FF6C21038F7
      • GetProcAddress.KERNEL32(?,?,?,00007FF6C2103A7E,?,?,?,00007FF6C2103770,?,?,?,00007FF6C21003A9), ref: 00007FF6C2103903
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Library$Load$AddressErrorFreeLastProc
      • String ID: api-ms-
      • API String ID: 2559590344-2084034818
      • Opcode ID: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
      • Instruction ID: aff3188c347dd1b346d95a8085dcb87a7edff20a01e63213809a4b79540af63f
      • Opcode Fuzzy Hash: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
      • Instruction Fuzzy Hash: 3631D221B1ABC291EE25DF02A4441752394BF04FAAF090637DF9DC6B80EFBCE4958344
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AttributesCreateErrorFileLastProcesslstrlen
      • String ID: WinSta0\Default$h
      • API String ID: 591566999-1620045033
      • Opcode ID: 97fd0016f673becf6109ea61c1b2bb0de26f74e5b3e6926f290ade0db5da7716
      • Instruction ID: 98cbbe18fa77c886e06e503753e4afedbfdf54d575b7723ec810d33bdaf464c5
      • Opcode Fuzzy Hash: 97fd0016f673becf6109ea61c1b2bb0de26f74e5b3e6926f290ade0db5da7716
      • Instruction Fuzzy Hash: B2317322A087C242E6708F14B5043BAA392FB95795F014335EADDC6B99EF7CE094C700
      APIs
      • GetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED1F
      • FlsGetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED34
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED55
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED82
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210ED93
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDA4
      • SetLastError.KERNEL32(?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F,?,?,?,00007FF6C21066E3), ref: 00007FF6C210EDBF
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
      • Instruction ID: 467293140d39d49f1cfe17cb69c459a88205c7801dd398fa5029c91371d0c3e3
      • Opcode Fuzzy Hash: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
      • Instruction Fuzzy Hash: 76215C20E0928386F9586F2255461796242AF94FBAF140634EEBEC7FC6DEADE4914300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
      • String ID: CONOUT$
      • API String ID: 3230265001-3130406586
      • Opcode ID: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
      • Instruction ID: 350e69442170d7f6461f8560279712f49f31af9ae7639739b178957d252eb704
      • Opcode Fuzzy Hash: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
      • Instruction Fuzzy Hash: B4117C31B18B4286E3508F56E844329A6A0BB98FEAF000234EF9DC7FA4CFBCD5548740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
      • String ID:
      • API String ID: 4202892810-0
      • Opcode ID: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
      • Instruction ID: 99eb4928f9ef514e00a798c84722fa53bcf7c9c2ea80fbda7c84a9be31576c50
      • Opcode Fuzzy Hash: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
      • Instruction Fuzzy Hash: D3113D6560874282E7109F15F8097696361FB98BA9F004231DFAE83FE4CFBCD4898740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$CloseDeleteOpen
      • String ID: Console$IpDatespecial
      • API String ID: 3183427449-1840232981
      • Opcode ID: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
      • Instruction ID: 2e3e5ab93a04b2c88a32f42437a1f4fd674bff5592ae1fbcad8951a4b0665575
      • Opcode Fuzzy Hash: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
      • Instruction Fuzzy Hash: F1015E76608E8286E7218F24EC147693721FB95B6AF444122DE8D83B54DF7CD299CB04
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
      • String ID:
      • API String ID: 3421218197-3916222277
      • Opcode ID: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
      • Instruction ID: 9fd1e38bdd687bf6687174c9ab89c77ef8163d1a51f7cb653ac812da9590f43e
      • Opcode Fuzzy Hash: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
      • Instruction Fuzzy Hash: B3F01232618B8186DB608F20F44875AB3A0FB98759F500235D7CE86F64DFBCD189CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$recv
      • String ID:
      • API String ID: 316788870-0
      • Opcode ID: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
      • Instruction ID: 8f83908fcedef03639e02d248d8c70054a65e402b9e91f4ba79c1ff5977ec059
      • Opcode Fuzzy Hash: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
      • Instruction Fuzzy Hash: E9315B72B08A4282EB608F28E48436D23A1FB55B5EF560436CE8DC6798DEBDD8C49751
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 3523768491-393685449
      • Opcode ID: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
      • Instruction ID: f13207a16c7e00097dd39aad69d41db43a4fa74d904fe9e8e5b81ab4bba7c82e
      • Opcode Fuzzy Hash: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
      • Instruction Fuzzy Hash: 44E1AC72A087828AE7209F68D4802AD37A0FB45B5DF144136EF8ED7B96CE7CE191C704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
      • String ID:
      • API String ID: 2235205178-0
      • Opcode ID: 590f28aa241335ba61f28d79a4cf37bde6970dd5790133cda3c336355218676e
      • Instruction ID: 8c2d11cfa2dfa298adcf696f46ec6bd6cdc088b95f006dc08895fd6295f02461
      • Opcode Fuzzy Hash: 590f28aa241335ba61f28d79a4cf37bde6970dd5790133cda3c336355218676e
      • Instruction Fuzzy Hash: 99217E32608A8182E750CF25E84426963A0FB88F9DF194532DECDD7B68CFB8D591C740
      APIs
      • GetLastError.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EE97
      • FlsSetValue.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EECD
      • FlsSetValue.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EEFA
      • FlsSetValue.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EF0B
      • FlsSetValue.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EF1C
      • SetLastError.KERNEL32(?,?,0000975800AD59FC,00007FF6C2108DA5,?,?,?,?,00007FF6C21127E6,?,?,00000000,00007FF6C210A69B,?,?,?), ref: 00007FF6C210EF37
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
      • Instruction ID: 4de7274b3f7f7b31d5ece17794bc063653605fe642308213d56c81a2a2f27add
      • Opcode Fuzzy Hash: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
      • Instruction Fuzzy Hash: 91115E20E0968786F5586F22554603962426F84FBAF144634EEBEC7FC6DEACF4914300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
      • Instruction ID: 213e04806cbd0b5e8778fd7c20afbf61f8ea25392ad8facc5be97d1645e9e8eb
      • Opcode Fuzzy Hash: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
      • Instruction Fuzzy Hash: 3BF0C265A1974281EB148F24E4443396320EF49FAAF440639DFAEC6BE4CFBCD189C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseDeleteOpenValue
      • String ID: Console$IpDatespecial
      • API String ID: 849931509-1840232981
      • Opcode ID: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
      • Instruction ID: 2bc9507e2c4539d6c3e60a62a59295f7b8942b4944367f07e0abbb5a209067e1
      • Opcode Fuzzy Hash: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
      • Instruction Fuzzy Hash: 6BF0FF76608DC285EB308F14EC147A97321EB94B6BF400131DE8D97B68DE79E2D98B04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AdjustPointer
      • String ID:
      • API String ID: 1740715915-0
      • Opcode ID: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
      • Instruction ID: e38c8f07300c658f52e5a9e700dba68ad4a70838c440dccb64ee51a471baafae
      • Opcode Fuzzy Hash: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
      • Instruction Fuzzy Hash: 68B18122E0AAC689FA659E1194442396390AF54F8EF098436DFCDC7F95DEBCE462C341
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
      • Instruction ID: 033522bc3cbd4511807c377cf80f07681fcdad783acf284182906d1ec8026057
      • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
      • Instruction Fuzzy Hash: 5E11B222E08B5B01FA541D28D54637911416F75B7AF480634EFEEE6BDE9EBCE8C04202
      APIs
      • FlsGetValue.KERNEL32(?,?,?,00007FF6C2103C9B,?,?,00000000,00007FF6C2103F36,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C210EF6F
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2103C9B,?,?,00000000,00007FF6C2103F36,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C210EF8E
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2103C9B,?,?,00000000,00007FF6C2103F36,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C210EFB6
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2103C9B,?,?,00000000,00007FF6C2103F36,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C210EFC7
      • FlsSetValue.KERNEL32(?,?,?,00007FF6C2103C9B,?,?,00000000,00007FF6C2103F36,?,?,?,?,?,00007FF6C2103EC2), ref: 00007FF6C210EFD8
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
      • Instruction ID: ff974e60f7b57f36fc21d8456ae5c8d213a047d5af678ca86a5c8d95b616135b
      • Opcode Fuzzy Hash: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
      • Instruction Fuzzy Hash: 2D116D10E0928386FA985F26A55213961826F44FBAF144234EEFDC6FD6DEACF4914300
      APIs
      • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F), ref: 00007FF6C210EDF5
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F), ref: 00007FF6C210EE14
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F), ref: 00007FF6C210EE3C
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F), ref: 00007FF6C210EE4D
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6C2117113,?,?,?,00007FF6C210F444,?,?,?,00007FF6C210843F), ref: 00007FF6C210EE5E
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
      • Instruction ID: fb4bb250928e3fa8ba2da8859d89f988f7f2c4a628b38a06100b94b70c579601
      • Opcode Fuzzy Hash: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
      • Instruction Fuzzy Hash: 5F112E10E0928B46F9986E22545207921825F54F7EF281B38EFFEC6FC2DDECB4A15300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterLeave
      • String ID:
      • API String ID: 3168844106-0
      • Opcode ID: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
      • Instruction ID: 9dcee76dad7dbd45920cfb507462c3d777b0173243e1b59299d777257452e720
      • Opcode Fuzzy Hash: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
      • Instruction Fuzzy Hash: 4811CC3262464687EA509F25F4953A96360FB54B5AF451031DBCF86B54CF7CE4CAC740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
      • String ID:
      • API String ID: 1513102227-0
      • Opcode ID: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
      • Instruction ID: 33f85add8429ec29f8b2eb2acea6d0b5c826eae0f160cb9280a80fcf8f58216b
      • Opcode Fuzzy Hash: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
      • Instruction Fuzzy Hash: F1113032505B4281EB108F29E4440287374FB54F6DB244236DBDD82BA4DF79D597C380
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
      • String ID:
      • API String ID: 1535946027-0
      • Opcode ID: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
      • Instruction ID: 3183ed195d52bf2f55772d3102c4b07fca8e6ab404637b859684abd416b396ba
      • Opcode Fuzzy Hash: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
      • Instruction Fuzzy Hash: 2CF0E736A04A4582E7049F69E8551682320FB99F6EF184231DEAEC7BA4DFB8D8C5C350
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CallEncodePointerTranslator
      • String ID: MOC$RCC
      • API String ID: 3544855599-2084237596
      • Opcode ID: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
      • Instruction ID: e41af769a27ae3582ca148ae1187e5afc45ee90fb9ff47ab16ca265c6687101f
      • Opcode Fuzzy Hash: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
      • Instruction Fuzzy Hash: 36919F73A087858AE710CF69E4842AD7BA0FB44B99F10412AEF8D97B55DF7CD1A5CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
      • String ID: csm
      • API String ID: 2395640692-1018135373
      • Opcode ID: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
      • Instruction ID: f021bfe4229d6c18c02ebb2ad4f980cf640ceee215792e510eb7a45f6a548ea9
      • Opcode Fuzzy Hash: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
      • Instruction Fuzzy Hash: 9951AF32B196428ADB14CF15E048A7A3391EB44B9DF164136EE8EC7789EFBCE841C704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
      • String ID: csm$csm
      • API String ID: 3896166516-3733052814
      • Opcode ID: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
      • Instruction ID: a8bd9b6e02c2a0954aa3bf99fc47412eb591293f316fb8b86c1d253e877c4bf8
      • Opcode Fuzzy Hash: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
      • Instruction Fuzzy Hash: BD514B32A082C68AEA649E51944436877A0FB55F9AF144136DFDCC7F99CFB8E8A1C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: FileWrite$ConsoleErrorLastOutput
      • String ID:
      • API String ID: 2718003287-0
      • Opcode ID: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
      • Instruction ID: 9278bbef8a8b8e4aaefec543da0f999d0acbe42a6c23e49828adda8a4c4a89fd
      • Opcode Fuzzy Hash: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
      • Instruction Fuzzy Hash: ECD1CE22B19A8189EB10CF65D4502AC3BB2FB54B9DB144236DF9ED7F99DE78D486C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 73155330-0
      • Opcode ID: 9f626c90efecc73dd731a3342661a9fce9011a5a195b48eaf535096b97dc9d75
      • Instruction ID: 0a77b52402b445ab2964a3f9cc8a77ea03f9b4aebc0ca41107ae93cd460f8587
      • Opcode Fuzzy Hash: 9f626c90efecc73dd731a3342661a9fce9011a5a195b48eaf535096b97dc9d75
      • Instruction Fuzzy Hash: B091F162B44A8245EE14CF26D4442BE6761BB04BE5F568632DFAD87BC5DFBCE0918304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3668304517-0
      • Opcode ID: 606bfdfa486e7f6607c7e08f7eff069c677fe6d288b2685b6771c8305ee7e9ca
      • Instruction ID: 90df843c41a41bffdcc4cb5e001acea40a94fcc7f42525178af4cd359cf6e0fc
      • Opcode Fuzzy Hash: 606bfdfa486e7f6607c7e08f7eff069c677fe6d288b2685b6771c8305ee7e9ca
      • Instruction Fuzzy Hash: 97B1CE62F54B5584FB008FA4C4447AD2372FB08B9DF415222DEAC67BE9DFB8A481C305
      APIs
      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6C211B36F), ref: 00007FF6C211B4A0
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6C211B36F), ref: 00007FF6C211B52B
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ConsoleErrorLastMode
      • String ID:
      • API String ID: 953036326-0
      • Opcode ID: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
      • Instruction ID: 7c53345265f754349bc03ea03e4bd62b24250b5807f83c6c7eacfcd07cd34355
      • Opcode Fuzzy Hash: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
      • Instruction Fuzzy Hash: 7591A162B1865285F7608F6594802BD2BA0BB25F8EF144139DF8ED7FA5DEB8D6C1C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
      • String ID:
      • API String ID: 3936042273-0
      • Opcode ID: b56907e08ba36c9d4b8f3d7cb346202edcdf0dc19a316a1c7c65d1275951c183
      • Instruction ID: 98d76c7529558b48c1ea3d4c4144868a9d66791a47f6db4b7511f40f85f6360d
      • Opcode Fuzzy Hash: b56907e08ba36c9d4b8f3d7cb346202edcdf0dc19a316a1c7c65d1275951c183
      • Instruction Fuzzy Hash: D871BF62B54B8585EA04DF25D4082AE6361FB85F99F568632DFAC83BC5DEB8E480C344
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 4260596558-0
      • Opcode ID: 0d783772210e43a2695af6463465b775912326aee02ff3f9c7600c154f401b30
      • Instruction ID: 4cf100eeec1b086eb8fe454397dad6cc561d9c292d93d8aad3333b7263e9c30f
      • Opcode Fuzzy Hash: 0d783772210e43a2695af6463465b775912326aee02ff3f9c7600c154f401b30
      • Instruction Fuzzy Hash: 0271D662B18A8681EB209F25D04826E6361FB85BA9F454332DEFE837D4DFBCD580C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocInfoProtectQuerySystem
      • String ID:
      • API String ID: 3562403962-0
      • Opcode ID: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
      • Instruction ID: 44a4cdd53ac0fdf0c76bf2e6e46adccd549fc89d3640b16dd4305a990ad32b42
      • Opcode Fuzzy Hash: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
      • Instruction Fuzzy Hash: 45314632714A819EDB20CF31D8547A923A5FB48B89F844025EE8D87B48DF78E646C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterEvent
      • String ID:
      • API String ID: 3394196147-0
      • Opcode ID: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
      • Instruction ID: 8ec7c7d1abbcf516dc3cf547b8b6aec8a56b83cb0019ee0f4a9a988b6e084832
      • Opcode Fuzzy Hash: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
      • Instruction Fuzzy Hash: CB213932704B8193D748CF2AE5802ADB3A4FB48B89F544435DBAD83B25DF78E4A1C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
      • Instruction ID: fc552dfe997a3815f447cbf513f1be2e18ccdc1ee32fc068867f37609a54c845
      • Opcode Fuzzy Hash: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
      • Instruction Fuzzy Hash: 80111F26B15B0589EB00CF60E8542B933A4FB19B59F440931DF6DC6B94DF7CD1948340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ObjectSingleWait$Sleep
      • String ID:
      • API String ID: 2961732021-0
      • Opcode ID: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
      • Instruction ID: 822a6a7ccc934de6d20ef8515d4d67fb1c187047d98d0f2f6bfd76904b33e984
      • Opcode Fuzzy Hash: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
      • Instruction Fuzzy Hash: D1F0B262B04A4486EB409F39D8552283261FB9DF3AF650330CE6DC7BE4EF78C8858350
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: __except_validate_context_record
      • String ID: csm$csm
      • API String ID: 1467352782-3733052814
      • Opcode ID: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
      • Instruction ID: f4d21f9deb2df65ef51c3fea99e3047771c6415567459bd30bed59abdf67954f
      • Opcode Fuzzy Hash: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
      • Instruction Fuzzy Hash: 57718A72A086C186DB608E2590A46BDABA0FB44F8AF148135DF8CD7F89DF7CD5A1C704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EncodePointer
      • String ID: MOC$RCC
      • API String ID: 2118026453-2084237596
      • Opcode ID: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
      • Instruction ID: 50d14258b51633018540b8f630cbfbf86a99f39a6484789bf5760b2a80a487aa
      • Opcode Fuzzy Hash: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
      • Instruction Fuzzy Hash: D6617032908BC585D7609F19E4407AAB7A0FB95B99F044225EFDD83B95DFBCE1A4CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandlewsprintf
      • String ID: %s_bin
      • API String ID: 3088109604-2665034546
      • Opcode ID: 32607a802dd0051346d943f98019fc9552bc7bdaec40320c16938ddbe90bc895
      • Instruction ID: aba7aafa1bb31e048c1ca587fb940bd586f8f4303c1dcda5c582a5cb0f321045
      • Opcode Fuzzy Hash: 32607a802dd0051346d943f98019fc9552bc7bdaec40320c16938ddbe90bc895
      • Instruction Fuzzy Hash: 3751A06AB19AA681EF20DF21C014BB92355EF85B8AF478136DE8D877C1DEBCD485C341
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID: ?
      • API String ID: 1286766494-1684325040
      • Opcode ID: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
      • Instruction ID: 41ea091386519dd6f82dfc8c8871305da4476a8da2a18b569fc2cc0e0d87c436
      • Opcode Fuzzy Hash: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
      • Instruction Fuzzy Hash: 9D41C622A1839246FB249F299411779A660EBA0FA9F144235EFDCC6FD9DFBCD491C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CreateFrameInfo__except_validate_context_record
      • String ID: csm
      • API String ID: 2558813199-1018135373
      • Opcode ID: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
      • Instruction ID: 38e6a485cc6aa94e12d2b4f7e6b12d054df41328e9d09623df17e54ecbbf02fb
      • Opcode Fuzzy Hash: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
      • Instruction Fuzzy Hash: 72513F7261878186E620AF26E08126E77A4F788B99F141135EF8DC7B56CF7CE461CB04
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6C210C256
        • Part of subcall function 00007FF6C210E95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E972
        • Part of subcall function 00007FF6C210E95C: GetLastError.KERNEL32(?,?,?,00007FF6C2116862,?,?,?,00007FF6C2116BDF,?,?,00000000,00007FF6C2117025,?,?,?,00007FF6C2116F57), ref: 00007FF6C210E97C
      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6C20FE051), ref: 00007FF6C210C274
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\f3fBEUL66b.exe
      • API String ID: 3580290477-2325883835
      • Opcode ID: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
      • Instruction ID: f8f60654abd9813360150f01aeedb23d3384e398afaba2c5cbb427eabee05721
      • Opcode Fuzzy Hash: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
      • Instruction Fuzzy Hash: DC416B3AA18B8286EB54DF21A4500B977A5FF45F89B444035EF8EC7F85DEBCE4608700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFileLastWrite
      • String ID: U
      • API String ID: 442123175-4171548499
      • Opcode ID: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
      • Instruction ID: dd6bc1705eb3b48b74a142d11bf466c9dc89d3cce19c40cf3545d949b00f6e5e
      • Opcode Fuzzy Hash: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
      • Instruction Fuzzy Hash: A4419372B18A8191DB208F25E8543BA67A1FB98B99F414031EF8DC7B58DF7CD645C740
      APIs
      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20E1111), ref: 00007FF6C2100340
      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C20E1111), ref: 00007FF6C2100381
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFileHeaderRaise
      • String ID: csm
      • API String ID: 2573137834-1018135373
      • Opcode ID: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
      • Instruction ID: be7cf0575c1628f812766de8a328479753fe7aefe58845b0a3a1fb39dc793bd1
      • Opcode Fuzzy Hash: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
      • Instruction Fuzzy Hash: CE111C32618B8186EB618F25E44025A77E5FB88B89F584230DFCC87B68DF7DD551C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.4117440587.00007FF6C20E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C20E0000, based on PE: true
      • Associated: 00000000.00000002.4117426025.00007FF6C20E0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117473416.00007FF6C211F000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117493131.00007FF6C2135000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117507740.00007FF6C2138000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117521945.00007FF6C213C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.4117538425.00007FF6C2140000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6c20e0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastRead
      • String ID:
      • API String ID: 4100373531-0
      • Opcode ID: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
      • Instruction ID: 6c0171809f777b79395468dcaedd99011b66a91c560a9c943c42781c2a0c6114
      • Opcode Fuzzy Hash: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
      • Instruction Fuzzy Hash: 9C412B72B49B4186EB148F1AD54126A73A0FB58F9AF064436CF8E87B54DFBCE4A1C314