Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f3fBEUL66b.exe

Overview

General Information

Sample name:f3fBEUL66b.exe
renamed because original name is a hash value
Original sample name:77dd16d7ed3758bd83e04514f6e84f58.exe
Analysis ID:1583153
MD5:77dd16d7ed3758bd83e04514f6e84f58
SHA1:d1a4c38fe1626e8c66ff3d30e89c65610d49bc0e
SHA256:7a668e696fe58365c3dff7e74162976e07deb2c766dd173ec4db09ff40eac47f
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry

Classification

  • System is w10x64
  • f3fBEUL66b.exe (PID: 4008 cmdline: "C:\Users\user\Desktop\f3fBEUL66b.exe" MD5: 77DD16D7ED3758BD83E04514F6E84F58)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: f3fBEUL66b.exe PID: 4008JoeSecurity_GhostRatYara detected GhostRatJoe Security

    System Summary

    barindex
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 192.238.134.113, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\f3fBEUL66b.exe, Initiated: true, ProcessId: 4008, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-02T05:09:13.156748+010020528751A Network Trojan was detected192.168.2.449731192.238.134.1134433TCP
    2025-01-02T05:10:20.000600+010020528751A Network Trojan was detected192.168.2.449731192.238.134.1134433TCP
    2025-01-02T05:11:25.422620+010020528751A Network Trojan was detected192.168.2.449731192.238.134.1134433TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: f3fBEUL66b.exeReversingLabs: Detection: 52%
    Source: f3fBEUL66b.exeVirustotal: Detection: 67%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: f3fBEUL66b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: z:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: x:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: v:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: t:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: r:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: p:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: n:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: l:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: j:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: h:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: f:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: b:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: y:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: w:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: u:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: s:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: q:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: o:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: m:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: k:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: i:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: g:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: e:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile opened: [:Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CF410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235CF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F4190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6235F4190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49731 -> 192.238.134.113:4433
    Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-LAX-11US LEASEWEB-USA-LAX-11US
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.113
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C3B00 select,recv,timeGetTime,0_2_00007FF6235C3B00

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: [esc]0_2_00007FF6235CADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D0DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235D0DA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D0DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235D0DA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D0DA0 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235D0DA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CFD10 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235CFD10
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C72D0 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF6235C72D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DC400: wsprintfW,CreateFileW,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,0_2_00007FF6235DC400
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6235CE46D
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6235CE4EE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6235CE3E9
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C15000_2_00007FF6235C1500
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CFD100_2_00007FF6235CFD10
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C63700_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CB4100_2_00007FF6235CB410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CF4100_2_00007FF6235CF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C7A600_2_00007FF6235C7A60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C72D00_2_00007FF6235C72D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F20480_2_00007FF6235F2048
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C80C00_2_00007FF6235C80C0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E8EB00_2_00007FF6235E8EB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DAE600_2_00007FF6235DAE60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DB5E00_2_00007FF6235DB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C94800_2_00007FF6235C9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EF4BC0_2_00007FF6235EF4BC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E64C80_2_00007FF6235E64C8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CD4100_2_00007FF6235CD410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E54080_2_00007FF6235E5408
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F73EC0_2_00007FF6235F73EC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D93300_2_00007FF6235D9330
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F22C40_2_00007FF6235F22C4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F41900_2_00007FF6235F4190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EF9500_2_00007FF6235EF950
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E5A1C0_2_00007FF6235E5A1C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F3A000_2_00007FF6235F3A00
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E51FC0_2_00007FF6235E51FC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F29E40_2_00007FF6235F29E4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E71DC0_2_00007FF6235E71DC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D79D00_2_00007FF6235D79D0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D08800_2_00007FF6235D0880
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E684C0_2_00007FF6235E684C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C99000_2_00007FF6235C9900
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235D2FA00_2_00007FF6235D2FA0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EA7980_2_00007FF6235EA798
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F88240_2_00007FF6235F8824
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E58180_2_00007FF6235E5818
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E4FF80_2_00007FF6235E4FF8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EC7BC0_2_00007FF6235EC7BC
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F5FD40_2_00007FF6235F5FD4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EFFD00_2_00007FF6235EFFD0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DA6800_2_00007FF6235DA680
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C2E500_2_00007FF6235C2E50
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EAF200_2_00007FF6235EAF20
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CADB00_2_00007FF6235CADB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CCD400_2_00007FF6235CCD40
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E560C0_2_00007FF6235E560C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E75E00_2_00007FF6235E75E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235EB5F00_2_00007FF6235EB5F0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235ED5C00_2_00007FF6235ED5C0
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6235DB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6235C9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6235CE46D
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6235CE4EE
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6235CE3E9
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeMutant created: \Sessions\1\BaseNamedObjects\????
    Source: f3fBEUL66b.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: f3fBEUL66b.exeReversingLabs: Detection: 52%
    Source: f3fBEUL66b.exeVirustotal: Detection: 67%
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
    Source: f3fBEUL66b.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: f3fBEUL66b.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: f3fBEUL66b.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CE36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF6235CE36A
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-21600
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeStalling execution: Execution stalls by calling Sleepgraph_0-21077
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeWindow / User API: threadDelayed 9592Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-21761
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 764Thread sleep count: 9592 > 30Jump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exe TID: 764Thread sleep time: -95920s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235CF410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6235CF410
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F4190 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6235F4190
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: f3fBEUL66b.exe, 00000000.00000002.3529550967.00000217F35AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6235DB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DC82C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6235DC82C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C8710 SysAllocString,SysAllocString,GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,SysAllocString,SysAllocString,GetProcessHeap,HeapFree,GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,0_2_00007FF6235C8710
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6235DB5E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DBDF0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF6235DBDF0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235E3D0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6235E3D0C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DEA00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6235DEA00
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DE814 SetUnhandledExceptionFilter,0_2_00007FF6235DE814
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DE66C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6235DE66C

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6235C9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C9480 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6235C9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF6235C9480
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235DB5E0 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6235DB5E0
    Source: f3fBEUL66b.exe, 00000000.00000003.1733356809.00000217F3658000.00000004.00000020.00020000.00000000.sdmp, f3fBEUL66b.exe, 00000000.00000003.1733515225.00000217F3658000.00000004.00000020.00020000.00000000.sdmp, f3fBEUL66b.exe, 00000000.00000002.3529550967.00000217F3658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235FCB60 cpuid 0_2_00007FF6235FCB60
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6235F7CD8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6235F83C4
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6235F8290
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6235F0AD8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6235F797C
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6235F81E0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6235F8088
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,0_2_00007FF6235F0FB0
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6235F7E40
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: EnumSystemLocalesW,0_2_00007FF6235F7DA8
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C6370 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6235C6370
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235F2048 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6235F2048
    Source: C:\Users\user\Desktop\f3fBEUL66b.exeCode function: 0_2_00007FF6235C8A40 GetCurrentProcessId,OpenProcess,OpenProcessToken,CloseHandle,SysStringLen,SysStringLen,CloseHandle,CloseHandle,SysFreeString,SysFreeString,GetCurrentProcessId,wsprintfW,GetVersionExW,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,wsprintfW,0_2_00007FF6235C8A40
    Source: f3fBEUL66b.exe, 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmp, f3fBEUL66b.exe, 00000000.00000000.1658651218.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: f3fBEUL66b.exe PID: 4008, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: f3fBEUL66b.exe PID: 4008, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    12
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Modify Registry
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Windows Service
    1
    Virtualization/Sandbox Evasion
    LSASS Memory151
    Security Software Discovery
    Remote Desktop Protocol121
    Input Capture
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
    Process Injection
    1
    Access Token Manipulation
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares1
    Archive Collected Data
    SteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Side-Loading
    211
    Process Injection
    NTDS3
    Process Discovery
    Distributed Component Object Model3
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Indicator Removal
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials11
    Peripheral Device Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
    File and Directory Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
    System Information Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    f3fBEUL66b.exe53%ReversingLabsWin64.Trojan.SpywareX
    f3fBEUL66b.exe67%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    192.238.134.113
    unknownUnited States
    395954LEASEWEB-USA-LAX-11UStrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1583153
    Start date and time:2025-01-02 05:08:15 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:f3fBEUL66b.exe
    renamed because original name is a hash value
    Original Sample Name:77dd16d7ed3758bd83e04514f6e84f58.exe
    Detection:MAL
    Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 42
    • Number of non-executed functions: 118
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    LEASEWEB-USA-LAX-11USnabarm7.elfGet hashmaliciousUnknownBrowse
    • 23.84.102.105
    52C660192933BE09807FC4895F376764A2BE35AA68567819BB854E83CF5F9E5C.dllGet hashmaliciousUnknownBrowse
    • 192.238.132.206
    mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 23.87.203.7
    la.bot.arm6.elfGet hashmaliciousMiraiBrowse
    • 108.187.71.205
    la.bot.sparc.elfGet hashmaliciousMiraiBrowse
    • 23.87.103.174
    arm5.nn-20241218-1651.elfGet hashmaliciousMirai, OkiruBrowse
    • 23.86.199.44
    loligang.arm7.elfGet hashmaliciousMiraiBrowse
    • 23.86.161.151
    jew.sh4.elfGet hashmaliciousUnknownBrowse
    • 23.104.13.203
    ppc.elfGet hashmaliciousMirai, MoobotBrowse
    • 172.255.161.127
    No context
    No context
    Process:C:\Users\user\Desktop\f3fBEUL66b.exe
    File Type:data
    Category:dropped
    Size (bytes):30
    Entropy (8bit):2.6616157143988106
    Encrypted:false
    SSDEEP:3:tblM6lEjln:tbhEZn
    MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
    SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
    SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
    SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
    Malicious:true
    Reputation:moderate, very likely benign file
    Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.060311148694131
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:f3fBEUL66b.exe
    File size:390'656 bytes
    MD5:77dd16d7ed3758bd83e04514f6e84f58
    SHA1:d1a4c38fe1626e8c66ff3d30e89c65610d49bc0e
    SHA256:7a668e696fe58365c3dff7e74162976e07deb2c766dd173ec4db09ff40eac47f
    SHA512:9496abdd711b43e88d36c5c2aad0c7338296239e3486eebb6b2715395ffaf452b7ab737417e3cb784fdf9c0c14028602ced9fa4fff665abf16cb75d9f47f06bf
    SSDEEP:6144:Qvy/g/Oe2CZNHfXmv9m7tvT7DYewsPJimwi9vrBP2k1u0ZLjNy:1/KlpTXmv9mpvv0iPJPtr99Ny
    TLSH:C1847E49FB9409F8E467C138C9A34916EBB27C5913A09BDF33A4466A2F237D05D3EB11
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..R............M.......M.......M.......M........O.......O.......O..S...M.......M...........3...MN......MN......Rich...........
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x14001e25c
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x676FAD5C [Sat Dec 28 07:48:44 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:1db3bac59c066f9b53b8b3b6b99b874b
    Instruction
    dec eax
    sub esp, 28h
    call 00007F1230BEEBF0h
    dec eax
    add esp, 28h
    jmp 00007F1230BEE447h
    int3
    int3
    dec eax
    sub esp, 28h
    dec ebp
    mov eax, dword ptr [ecx+38h]
    dec eax
    mov ecx, edx
    dec ecx
    mov edx, ecx
    call 00007F1230BEE5E2h
    mov eax, 00000001h
    dec eax
    add esp, 28h
    ret
    int3
    int3
    int3
    inc eax
    push ebx
    inc ebp
    mov ebx, dword ptr [eax]
    dec eax
    mov ebx, edx
    inc ecx
    and ebx, FFFFFFF8h
    dec esp
    mov ecx, ecx
    inc ecx
    test byte ptr [eax], 00000004h
    dec esp
    mov edx, ecx
    je 00007F1230BEE5E5h
    inc ecx
    mov eax, dword ptr [eax+08h]
    dec ebp
    arpl word ptr [eax+04h], dx
    neg eax
    dec esp
    add edx, ecx
    dec eax
    arpl ax, cx
    dec esp
    and edx, ecx
    dec ecx
    arpl bx, ax
    dec edx
    mov edx, dword ptr [eax+edx]
    dec eax
    mov eax, dword ptr [ebx+10h]
    mov ecx, dword ptr [eax+08h]
    dec eax
    mov eax, dword ptr [ebx+08h]
    test byte ptr [ecx+eax+03h], 0000000Fh
    je 00007F1230BEE5DDh
    movzx eax, byte ptr [ecx+eax+03h]
    and eax, FFFFFFF0h
    dec esp
    add ecx, eax
    dec esp
    xor ecx, edx
    dec ecx
    mov ecx, ecx
    pop ebx
    jmp 00007F1230BEE5EAh
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    nop word ptr [eax+eax+00000000h]
    dec eax
    cmp ecx, dword ptr [00036D39h]
    jne 00007F1230BEE5E2h
    dec eax
    rol ecx, 10h
    test cx, FFFFh
    jne 00007F1230BEE5D3h
    ret
    dec eax
    ror ecx, 10h
    jmp 00007F1230BEECEBh
    int3
    int3
    dec eax
    mov dword ptr [esp+00h], ebx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x524000x104.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3450.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc8c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7c00x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6800x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x920.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x3df700x3e0002b6c6c8b93239d65e2449c4cc33eda20False0.5452683971774194data6.461526088950339IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x3f0000x151e80x15200530663d6c229cb4dbaf0a1dc62a8561dFalse0.4157151442307692data4.936178076870312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x550000xaa9c0x7c009ce9d6ecd277af9d66cef31780bbf5efFalse0.10660282258064516DOS executable (block device driver \377\3)1.588705678471102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x600000x34500x3600b6a68cd5b1e86136baf9e34e01cfad8bFalse0.4622395833333333data5.530289196450094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x640000xc8c0xe00a952b87812e4781581800f8699e0d5a4False0.49302455357142855data5.228153224182403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    DLLImport
    KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, HeapFree, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
    USER32.dllGetForegroundWindow, GetLastInputInfo, GetClipboardData, GetWindowTextW, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, CloseClipboard, wsprintfW, ExitWindowsEx, ShowWindow, PostThreadMessageA, GetInputState, GetDC, GetSystemMetrics, EmptyClipboard, MsgWaitForMultipleObjects, DispatchMessageW, PeekMessageW, TranslateMessage, OpenClipboard
    GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
    ADVAPI32.dllRegQueryInfoKeyW, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
    SHELL32.dllSHGetFolderPathW
    ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoCreateInstance, CoUninitialize, CoInitialize
    OLEAUT32.dllSysFreeString, SysAllocString, SysStringLen
    WS2_32.dllselect, WSAStartup, send, socket, connect, recv, htons, setsockopt, WSAIoctl, gethostbyname, WSAGetLastError, WSAEnumNetworkEvents, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSASetLastError, WSACloseEvent, shutdown, gethostname, inet_ntoa, WSACleanup, closesocket, WSACreateEvent
    WINMM.dlltimeGetTime
    gdiplus.dllGdipDisposeImage, GdipCreateBitmapFromHBITMAP, GdipGetImagePixelFormat, GdiplusShutdown, GdipDrawImageI, GdipFree, GdipSaveImageToStream, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipBitmapLockBits, GdipCreateBitmapFromScan0, GdipAlloc, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders, GdipGetImagePaletteSize, GdipCloneImage, GdipBitmapUnlockBits, GdipCreateBitmapFromStream
    dxgi.dllCreateDXGIFactory
    DINPUT8.dllDirectInput8Create
    TimestampSource PortDest PortSource IPDest IP
    Jan 2, 2025 05:09:11.736093998 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:11.741063118 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:11.741139889 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:12.508999109 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:12.513953924 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:12.513966084 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:12.513972998 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:12.513983965 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.050507069 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.094055891 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:13.151724100 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:13.156697989 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.156709909 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.156718969 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.156729937 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:13.156748056 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:13.161488056 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:29.047307014 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:29.052237034 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:29.362479925 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:29.406611919 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:46.812992096 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:09:46.817830086 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:47.128043890 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:09:47.172316074 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:04.188111067 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:04.193089008 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:04.504214048 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:04.547348976 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:20.000600100 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:20.005343914 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:20.320851088 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:20.375580072 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:36.688102961 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:36.692910910 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:37.035748959 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:37.078643084 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:53.079045057 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:10:53.083985090 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:53.393924952 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:10:53.438163042 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:09.141457081 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:09.146411896 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:09.456440926 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:09.500596046 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:25.422620058 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:25.432383060 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:25.737649918 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:25.781897068 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:41.625755072 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:41.630597115 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:41.940706015 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:41.985099077 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:59.471335888 CET497314433192.168.2.4192.238.134.113
    Jan 2, 2025 05:11:59.476286888 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:59.787841082 CET443349731192.238.134.113192.168.2.4
    Jan 2, 2025 05:11:59.828851938 CET497314433192.168.2.4192.238.134.113

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:23:09:05
    Start date:01/01/2025
    Path:C:\Users\user\Desktop\f3fBEUL66b.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\f3fBEUL66b.exe"
    Imagebase:0x7ff6235c0000
    File size:390'656 bytes
    MD5 hash:77DD16D7ED3758BD83E04514F6E84F58
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:7.8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:45.4%
      Total number of Nodes:1142
      Total number of Limit Nodes:49
      execution_graph 22342 7ff6235c54a0 70 API calls 22385 7ff6235c37a0 setsockopt CancelIo closesocket SetEvent 22386 7ff6235cefa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22467 7ff6235c11a0 HeapSize 22343 7ff6235c98a0 83 API calls 22387 7ff6235e03a0 10 API calls 2 library calls 22388 7ff6235ea798 60 API calls 4 library calls 22429 7ff6235ce697 79 API calls 3 library calls 22470 7ff6235c11b0 HeapDestroy 22430 7ff6235eceb0 GetCommandLineA GetCommandLineW 22471 7ff6235fedb0 WSACleanup 22472 7ff6235f09ac 57 API calls _isindst 21937 7ff6235e8aa8 21938 7ff6235e8ac5 21937->21938 21939 7ff6235e8ab6 GetLastError ExitThread 21937->21939 21952 7ff6235eed10 GetLastError 21938->21952 21944 7ff6235e8ae3 21951 7ff6235c72d0 116 API calls 21944->21951 21978 7ff6235c3da0 21944->21978 21985 7ff6235c3b00 21944->21985 21946 7ff6235e8b02 22000 7ff6235e8cbc 19 API calls 21946->22000 21951->21946 21953 7ff6235eed34 FlsGetValue 21952->21953 21954 7ff6235eed51 FlsSetValue 21952->21954 21955 7ff6235eed4b 21953->21955 21972 7ff6235eed41 21953->21972 21956 7ff6235eed63 21954->21956 21954->21972 21955->21954 21958 7ff6235f0a28 memcpy_s 11 API calls 21956->21958 21957 7ff6235eedbd SetLastError 21959 7ff6235eeddd 21957->21959 21960 7ff6235e8aca 21957->21960 21961 7ff6235eed72 21958->21961 22002 7ff6235e4078 47 API calls 2 library calls 21959->22002 21974 7ff6235f161c 21960->21974 21963 7ff6235eed90 FlsSetValue 21961->21963 21964 7ff6235eed80 FlsSetValue 21961->21964 21965 7ff6235eedae 21963->21965 21966 7ff6235eed9c FlsSetValue 21963->21966 21968 7ff6235eed89 21964->21968 22001 7ff6235eeac0 11 API calls memcpy_s 21965->22001 21966->21968 21970 7ff6235ee95c __free_lconv_mon 11 API calls 21968->21970 21970->21972 21971 7ff6235eedb6 21973 7ff6235ee95c __free_lconv_mon 11 API calls 21971->21973 21972->21957 21973->21957 21975 7ff6235e8ad6 21974->21975 21976 7ff6235f162b 21974->21976 21975->21944 21999 7ff6235f1350 5 API calls std::_Lockit::_Lockit 21975->21999 21976->21975 22003 7ff6235f0d68 5 API calls std::_Lockit::_Lockit 21976->22003 21979 7ff6235c3e22 21978->21979 21983 7ff6235c3db4 21978->21983 21979->21946 21980 7ff6235c3e15 21980->21946 21981 7ff6235c3dc8 SleepEx 21981->21983 21982 7ff6235c3df1 timeGetTime 21982->21983 21983->21980 21983->21981 21984 7ff6235c3e30 10 API calls 21983->21984 21984->21982 21994 7ff6235c3b18 21985->21994 21986 7ff6235c3c54 21986->21946 21987 7ff6235c3be0 select 21987->21986 21987->21994 21988 7ff6235c3c08 recv 21988->21994 21989 7ff6235c1500 VirtualAlloc VirtualFree 21989->21994 21990 7ff6235c1730 2 API calls 21990->21994 21991 7ff6235e8d9c 11 API calls memcpy_s 21991->21994 21992 7ff6235c3d04 timeGetTime 21993 7ff6235c1730 2 API calls 21992->21993 21993->21994 21994->21986 21994->21987 21994->21988 21994->21989 21994->21990 21994->21991 21994->21992 22004 7ff6235cdbef 21994->22004 22012 7ff6235cd9c0 21994->22012 22027 7ff6235ce29b 21994->22027 22031 7ff6235c1810 VirtualAlloc VirtualFree memcpy_s 21994->22031 21999->21944 22001->21971 22003->21975 22005 7ff6235ce2c3 22004->22005 22006 7ff6235cdbfb 22004->22006 22005->21994 22007 7ff6235cdc19 22006->22007 22008 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 22006->22008 22007->22005 22032 7ff6235cf410 22007->22032 22008->22007 22010 7ff6235cdc41 22010->22005 22011 7ff6235c3e30 10 API calls 22010->22011 22011->22005 22013 7ff6235cd9df 22012->22013 22014 7ff6235cda2a CloseHandle 22012->22014 22015 7ff6235cda0b 22013->22015 22016 7ff6235cda44 22013->22016 22014->22016 22015->22014 22017 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22016->22017 22018 7ff6235cda49 22017->22018 22020 7ff6235ddfb8 std::_Facet_Register 49 API calls 22018->22020 22026 7ff6235cdaf7 22018->22026 22019 7ff6235cdb41 RegOpenKeyExW 22021 7ff6235cdbb0 22019->22021 22022 7ff6235cdb7c RegQueryValueExW 22019->22022 22023 7ff6235cda83 memcpy_s 22020->22023 22021->21994 22022->22021 22024 7ff6235cda97 GetLastInputInfo GetTickCount wsprintfW 22023->22024 22250 7ff6235c80c0 22024->22250 22026->22019 22026->22021 22028 7ff6235ce2a2 22027->22028 22029 7ff6235ce2c3 22028->22029 22030 7ff6235c3e30 10 API calls 22028->22030 22029->21994 22030->22029 22031->21994 22033 7ff6235ddfb8 std::_Facet_Register 49 API calls 22032->22033 22034 7ff6235cf437 memcpy_s 22033->22034 22035 7ff6235cf44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 22034->22035 22036 7ff6235cf4b4 CreateToolhelp32Snapshot 22035->22036 22037 7ff6235cf4a1 GetWindowTextW 22035->22037 22038 7ff6235cf555 CreateToolhelp32Snapshot 22036->22038 22039 7ff6235cf4d8 memcpy_s 22036->22039 22037->22036 22041 7ff6235cf577 memcpy_s 22038->22041 22042 7ff6235cf5f8 CreateToolhelp32Snapshot 22038->22042 22043 7ff6235cf4e9 Process32FirstW 22039->22043 22047 7ff6235cf58b Process32FirstW 22041->22047 22045 7ff6235cf61a memcpy_s 22042->22045 22046 7ff6235cf6a8 RegOpenKeyExW 22042->22046 22043->22038 22050 7ff6235cf501 22043->22050 22051 7ff6235cf62e Process32FirstW 22045->22051 22052 7ff6235cf913 RegOpenKeyExW 22046->22052 22053 7ff6235cf6fa RegQueryValueExW 22046->22053 22047->22042 22061 7ff6235cf5a9 22047->22061 22049 7ff6235cf544 Process32NextW 22049->22038 22049->22050 22050->22038 22050->22049 22051->22046 22067 7ff6235cf64c 22051->22067 22054 7ff6235cf9f2 RegOpenKeyExW 22052->22054 22055 7ff6235cf951 RegQueryValueExW 22052->22055 22056 7ff6235cf908 RegCloseKey 22053->22056 22065 7ff6235cf734 memcpy_s 22053->22065 22057 7ff6235cfa30 RegQueryValueExW 22054->22057 22058 7ff6235cfad1 7 API calls 22054->22058 22059 7ff6235cf9e7 RegCloseKey 22055->22059 22070 7ff6235cf986 memcpy_s 22055->22070 22056->22052 22062 7ff6235cfac6 RegCloseKey 22057->22062 22072 7ff6235cfa65 memcpy_s 22057->22072 22063 7ff6235cfb91 FindClose 22058->22063 22064 7ff6235cfb89 22058->22064 22059->22054 22060 7ff6235cf5e4 Process32NextW 22060->22042 22060->22061 22061->22042 22061->22060 22062->22058 22086 7ff6235cfd10 7 API calls 22063->22086 22064->22063 22069 7ff6235cf75e RegQueryValueExW 22065->22069 22066 7ff6235cf694 Process32NextW 22066->22046 22066->22067 22067->22046 22067->22066 22069->22056 22071 7ff6235cf791 22069->22071 22073 7ff6235cf9b0 RegQueryValueExW 22070->22073 22106 7ff6235d1310 49 API calls 4 library calls 22071->22106 22076 7ff6235cfa8f RegQueryValueExW 22072->22076 22073->22059 22074 7ff6235cf9df 22073->22074 22074->22059 22076->22062 22078 7ff6235cfabe 22076->22078 22077 7ff6235cfbd1 memcpy_s 22083 7ff6235cfcbe 22077->22083 22085 7ff6235c3e30 10 API calls 22077->22085 22078->22062 22079 7ff6235cf900 22079->22056 22080 7ff6235cfcfe 22081 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22080->22081 22082 7ff6235cfd03 22081->22082 22083->22010 22084 7ff6235cf79d 22084->22056 22084->22079 22084->22080 22085->22083 22087 7ff6235cfdbe GetSystemMetrics 22086->22087 22088 7ff6235cfdaa 22086->22088 22090 7ff6235cfdde GetSystemMetrics 22087->22090 22091 7ff6235cfe28 GetSystemMetrics 22087->22091 22089 7ff6235cfe47 8 API calls 22088->22089 22092 7ff6235cff92 memcpy_s 22089->22092 22090->22089 22091->22089 22093 7ff6235cffa7 GetDIBits 22092->22093 22094 7ff6235cffdf memcpy_s 22093->22094 22095 7ff6235ddfb8 std::_Facet_Register 49 API calls 22094->22095 22096 7ff6235d0052 22095->22096 22107 7ff6235d0220 GlobalAlloc GlobalLock 22096->22107 22099 7ff6235d0089 DeleteObject DeleteObject ReleaseDC 22103 7ff6235d00b3 22099->22103 22100 7ff6235d011c memcpy_s 22101 7ff6235d015d DeleteObject DeleteObject ReleaseDC 22100->22101 22101->22103 22102 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22104 7ff6235d0212 22102->22104 22103->22102 22105 7ff6235d00ed 22103->22105 22105->22077 22106->22084 22155 7ff6235fd3b0 22107->22155 22109 7ff6235d0278 GlobalUnlock CreateStreamOnHGlobal 22110 7ff6235d029f 22109->22110 22111 7ff6235d05f1 GlobalFree 22109->22111 22157 7ff6235c61e0 22110->22157 22112 7ff6235d0081 22111->22112 22112->22099 22112->22100 22116 7ff6235d02fc 22117 7ff6235d0304 GdipCreateBitmapFromStream 22116->22117 22154 7ff6235d0567 22116->22154 22118 7ff6235d0330 GdipDisposeImage 22117->22118 22119 7ff6235d033b 22117->22119 22118->22154 22175 7ff6235cc340 GdipGetImagePixelFormat 22119->22175 22121 7ff6235d05aa 22124 7ff6235c61e0 58 API calls 22121->22124 22122 7ff6235d0586 DeleteObject 22122->22121 22123 7ff6235d0348 GdipDisposeImage 22125 7ff6235d035c CreateStreamOnHGlobal 22123->22125 22123->22154 22126 7ff6235d05af EnterCriticalSection 22124->22126 22127 7ff6235d0379 22125->22127 22125->22154 22128 7ff6235d05c2 EnterCriticalSection 22126->22128 22129 7ff6235d05e7 LeaveCriticalSection 22126->22129 22209 7ff6235cc7b0 22127->22209 22132 7ff6235d05d4 GdiplusShutdown 22128->22132 22133 7ff6235d05da LeaveCriticalSection 22128->22133 22129->22111 22131 7ff6235d0386 GetHGlobalFromStream GlobalLock 22134 7ff6235d03ae GlobalFree 22131->22134 22135 7ff6235d043f GlobalSize 22131->22135 22132->22133 22133->22129 22137 7ff6235d03cf DeleteObject 22134->22137 22138 7ff6235d03f1 22134->22138 22139 7ff6235d0452 memcpy_s 22135->22139 22137->22138 22140 7ff6235c61e0 58 API calls 22138->22140 22223 7ff6235c9fd0 22139->22223 22142 7ff6235d03f6 EnterCriticalSection 22140->22142 22143 7ff6235d042e LeaveCriticalSection 22142->22143 22144 7ff6235d0409 EnterCriticalSection 22142->22144 22143->22112 22145 7ff6235d0421 LeaveCriticalSection 22144->22145 22146 7ff6235d041b GdiplusShutdown 22144->22146 22145->22143 22146->22145 22147 7ff6235d0481 22148 7ff6235d0514 22147->22148 22149 7ff6235d0618 22147->22149 22151 7ff6235d0553 GlobalUnlock 22148->22151 22152 7ff6235d052f DeleteObject 22148->22152 22150 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22149->22150 22153 7ff6235d061d 22150->22153 22151->22154 22152->22151 22154->22121 22154->22122 22156 7ff6235fd3a0 22155->22156 22156->22109 22156->22156 22158 7ff6235c6200 22157->22158 22159 7ff6235c626b EnterCriticalSection LeaveCriticalSection 22157->22159 22237 7ff6235ddccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 22158->22237 22168 7ff6235cc9b0 22159->22168 22169 7ff6235c61e0 58 API calls 22168->22169 22170 7ff6235cc9bb 22169->22170 22171 7ff6235cc9c4 22170->22171 22172 7ff6235cc9cc EnterCriticalSection 22170->22172 22171->22116 22173 7ff6235cca23 LeaveCriticalSection 22172->22173 22174 7ff6235cc9e9 GdiplusStartup 22172->22174 22173->22116 22174->22173 22177 7ff6235cc385 GdipGetImageHeight 22175->22177 22178 7ff6235cc402 22177->22178 22179 7ff6235cc40f GdipGetImageWidth 22177->22179 22178->22179 22180 7ff6235cc424 22179->22180 22238 7ff6235cc160 22180->22238 22182 7ff6235cc445 22183 7ff6235cc461 GdipGetImagePaletteSize 22182->22183 22187 7ff6235cc449 __std_exception_destroy 22182->22187 22201 7ff6235cc5fc 22182->22201 22195 7ff6235cc47a std::_Locinfo::_Locinfo_ctor 22183->22195 22184 7ff6235cc6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 22184->22187 22185 7ff6235cc622 GdipBitmapLockBits 22185->22187 22189 7ff6235cc66a memcpy_s 22185->22189 22186 7ff6235cc6c4 GdipBitmapUnlockBits 22186->22187 22187->22123 22188 7ff6235cc78d memcpy_s 22245 7ff6235e8d9c 11 API calls memcpy_s 22188->22245 22189->22186 22189->22188 22191 7ff6235cc4e7 GdipGetImagePalette 22193 7ff6235cc4fb 22191->22193 22192 7ff6235cc799 22246 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 22192->22246 22193->22187 22199 7ff6235cc5aa SetDIBColorTable 22193->22199 22243 7ff6235c6280 56 API calls 22193->22243 22195->22187 22195->22191 22196 7ff6235cc7a4 22247 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 22196->22247 22200 7ff6235cc5c4 SelectObject 22199->22200 22199->22201 22244 7ff6235c6280 56 API calls 22200->22244 22201->22184 22201->22185 22203 7ff6235cc564 22206 7ff6235cc58e SelectObject 22203->22206 22207 7ff6235cc586 CreateCompatibleDC 22203->22207 22205 7ff6235cc5db 22205->22201 22208 7ff6235cc5f3 DeleteDC 22205->22208 22206->22199 22207->22206 22208->22201 22210 7ff6235cc9b0 61 API calls 22209->22210 22211 7ff6235cc7d4 22210->22211 22212 7ff6235cc992 22211->22212 22213 7ff6235cc7dc GdipGetImageEncodersSize 22211->22213 22212->22131 22213->22212 22214 7ff6235cc7f2 std::_Locinfo::_Locinfo_ctor 22213->22214 22215 7ff6235cc86b GdipGetImageEncoders 22214->22215 22216 7ff6235cc861 __std_exception_destroy 22214->22216 22215->22216 22217 7ff6235cc87f 22215->22217 22216->22131 22217->22216 22218 7ff6235cc923 GdipCreateBitmapFromHBITMAP 22217->22218 22219 7ff6235cc8f1 GdipCreateBitmapFromScan0 22217->22219 22220 7ff6235cc933 GdipSaveImageToStream 22218->22220 22219->22220 22221 7ff6235cc95e GdipDisposeImage 22220->22221 22222 7ff6235cc951 GdipDisposeImage 22220->22222 22221->22216 22222->22216 22224 7ff6235ca0d7 22223->22224 22227 7ff6235ca001 22223->22227 22249 7ff6235c61c0 49 API calls 22224->22249 22229 7ff6235ca007 memcpy_s 22227->22229 22230 7ff6235ca033 22227->22230 22231 7ff6235ca08c 22227->22231 22228 7ff6235ddfb8 std::_Facet_Register 49 API calls 22232 7ff6235ca049 22228->22232 22229->22147 22230->22228 22233 7ff6235ca0d1 22230->22233 22234 7ff6235ddfb8 std::_Facet_Register 49 API calls 22231->22234 22232->22229 22236 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22232->22236 22248 7ff6235c19d0 49 API calls 2 library calls 22233->22248 22234->22229 22236->22233 22241 7ff6235cc19b memcpy_s 22238->22241 22239 7ff6235cc202 CreateDIBSection 22240 7ff6235cc227 GetObjectW 22239->22240 22242 7ff6235cc249 __std_exception_destroy 22239->22242 22240->22242 22241->22239 22241->22242 22242->22182 22243->22203 22244->22205 22245->22192 22246->22196 22248->22224 22251 7ff6235c8164 memcpy_s 22250->22251 22253 7ff6235c80f6 memcpy_s 22250->22253 22252 7ff6235dc400 77 API calls 22251->22252 22255 7ff6235c8185 22252->22255 22287 7ff6235dc400 22253->22287 22255->22255 22256 7ff6235c823b 22255->22256 22257 7ff6235c8337 22255->22257 22258 7ff6235c8138 memcpy_s 22255->22258 22286 7ff6235c820f 22255->22286 22301 7ff6235c9de0 49 API calls 4 library calls 22256->22301 22303 7ff6235c9de0 49 API calls 4 library calls 22257->22303 22258->22026 22261 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22264 7ff6235c86f5 22261->22264 22262 7ff6235c8256 22267 7ff6235c9fd0 49 API calls 22262->22267 22263 7ff6235c8356 22265 7ff6235c9fd0 49 API calls 22263->22265 22266 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22264->22266 22271 7ff6235c8383 22265->22271 22268 7ff6235c86fb 22266->22268 22270 7ff6235c8286 22267->22270 22269 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22268->22269 22272 7ff6235c8701 22269->22272 22302 7ff6235c9d20 47 API calls _invalid_parameter_noinfo_noreturn 22270->22302 22304 7ff6235c9d20 47 API calls _invalid_parameter_noinfo_noreturn 22271->22304 22273 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 22272->22273 22276 7ff6235c8707 22273->22276 22277 7ff6235c8574 OutputDebugStringA 22278 7ff6235c8598 MultiByteToWideChar 22277->22278 22284 7ff6235c8611 memcpy_s 22277->22284 22279 7ff6235ddff4 22278->22279 22280 7ff6235c85df MultiByteToWideChar 22279->22280 22280->22284 22281 7ff6235c855c 22281->22277 22282 7ff6235c82f3 memcpy_s std::_Locinfo::_Locinfo_ctor 22282->22264 22282->22268 22282->22277 22282->22281 22305 7ff6235ca170 49 API calls 4 library calls 22282->22305 22306 7ff6235c9d20 47 API calls _invalid_parameter_noinfo_noreturn 22284->22306 22286->22258 22286->22261 22286->22272 22288 7ff6235dc420 wsprintfW CreateFileW 22287->22288 22289 7ff6235dc46d DeviceIoControl 22288->22289 22290 7ff6235dc629 22288->22290 22291 7ff6235dc620 CloseHandle 22289->22291 22297 7ff6235dc4b8 __std_exception_destroy 22289->22297 22290->22258 22291->22290 22292 7ff6235dc4e2 DeviceIoControl 22293 7ff6235dc613 __std_exception_destroy 22292->22293 22292->22297 22293->22291 22294 7ff6235dc53c DeviceIoControl 22294->22291 22294->22297 22295 7ff6235dc5a0 DeviceIoControl 22295->22293 22295->22297 22296 7ff6235dc640 WideCharToMultiByte WideCharToMultiByte 22296->22297 22297->22291 22297->22292 22297->22294 22297->22295 22297->22296 22307 7ff6235dc2d0 22297->22307 22300 7ff6235dc60f 22300->22290 22301->22262 22302->22282 22303->22263 22304->22282 22305->22282 22306->22286 22308 7ff6235dc2f1 22307->22308 22309 7ff6235dc3e9 CloseHandle 22308->22309 22310 7ff6235dc34f CreateFileA 22308->22310 22309->22288 22309->22300 22310->22309 22311 7ff6235dc388 __std_exception_destroy 22310->22311 22312 7ff6235dc390 DeviceIoControl 22311->22312 22312->22309 22313 7ff6235dc3cb 22312->22313 22316 7ff6235dbef0 22313->22316 22317 7ff6235dc2b0 CloseHandle 22316->22317 22335 7ff6235dbf1d memcpy_s 22316->22335 22318 7ff6235dc286 __std_exception_destroy 22318->22317 22319 7ff6235dbf60 DeviceIoControl 22319->22318 22319->22335 22320 7ff6235dbfac DeviceIoControl 22320->22335 22321 7ff6235dc0ae DeviceIoControl 22321->22335 22322 7ff6235dc028 GlobalAlloc 22323 7ff6235dc040 DeviceIoControl 22322->22323 22322->22335 22325 7ff6235dc09b GlobalFree 22323->22325 22323->22335 22324 7ff6235dc10e GlobalAlloc 22327 7ff6235dc123 DeviceIoControl 22324->22327 22324->22335 22325->22335 22326 7ff6235dc6e0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 22326->22335 22328 7ff6235dc161 22327->22328 22329 7ff6235dc18c GlobalFree 22327->22329 22336 7ff6235dc640 WideCharToMultiByte 22328->22336 22329->22335 22331 7ff6235dc16a GlobalFree 22332 7ff6235dc17b 22331->22332 22331->22335 22334 7ff6235dc2d0 58 API calls 22332->22334 22332->22335 22334->22332 22335->22318 22335->22319 22335->22320 22335->22321 22335->22322 22335->22324 22335->22325 22335->22326 22335->22335 22340 7ff6235dbe90 51 API calls 22335->22340 22337 7ff6235dc6ba __std_exception_destroy 22336->22337 22338 7ff6235dc681 22336->22338 22337->22331 22338->22337 22339 7ff6235dc690 WideCharToMultiByte 22338->22339 22339->22337 22340->22335 22431 7ff6235c1a80 LeaveCriticalSection 22348 7ff6235cc080 64 API calls 22391 7ff6235c9380 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22432 7ff6235d1280 8 API calls 22433 7ff6235cbe80 12 API calls _Wcrtomb 22349 7ff6235c1078 InitializeCriticalSectionEx shared_ptr 22475 7ff6235f4190 54 API calls 6 library calls 22476 7ff6235cbd90 13 API calls 22350 7ff6235f8088 55 API calls 4 library calls 22394 7ff6235ecb88 11 API calls 22478 7ff6235c1160 HeapReAlloc 22480 7ff6235cf160 52 API calls 4 library calls 22352 7ff6235c1058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22438 7ff6235de25c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22353 7ff6235c4470 164 API calls std::_Locinfo::_Locinfo_ctor 22354 7ff6235c1470 VirtualFree 22395 7ff6235ce36a OpenEventLogW ClearEventLogW CloseEventLog 22356 7ff6235e206c 61 API calls 6 library calls 22357 7ff6235c1040 GetTickCount 22441 7ff6235c5640 40 API calls 22484 7ff6235c1140 HeapFree 22442 7ff6235f7e40 57 API calls 4 library calls 22443 7ff6235cde3f 55 API calls 3 library calls 22396 7ff6235d0b40 7 API calls 22486 7ff6235ccd40 88 API calls 3 library calls 22398 7ff6235f573c GetProcessHeap 22399 7ff6235c9f50 49 API calls 22490 7ff6235ded50 LocalFree 22361 7ff6235e284a 57 API calls __CxxCallCatchBlock 22362 7ff6235cdc4d 56 API calls 3 library calls 22446 7ff6235fef24 DecodePointer 22401 7ff6235de824 56 API calls 22447 7ff6235cef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22491 7ff6235dfa24 60 API calls __CxxCallCatchBlock 22403 7ff6235ce01f 71 API calls memcpy_s 22404 7ff6235d0c20 15 API calls memcpy_s 22405 7ff6235cc020 GdipCloneImage GdipAlloc 22492 7ff6235ce217 TerminateThread CloseHandle 22364 7ff6235c1130 HeapAlloc 22494 7ff6235fee30 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22450 7ff6235cb331 17 API calls 22451 7ff6235f0728 80 API calls __free_lconv_mon 22452 7ff6235c5300 115 API calls 22453 7ff6235fcf04 CloseHandle 22497 7ff6235c5200 8 API calls memcpy_s 22498 7ff6235dee00 RtlPcToFileHeader RaiseException _com_raise_error _com_error::_com_error 22499 7ff6235eadfc 7 API calls 22407 7ff6235ddffc 59 API calls 2 library calls 22408 7ff6235c5410 36 API calls 22372 7ff6235fe110 RegCloseKey RegCloseKey 22501 7ff6235de20e GetModuleHandleW BuildCatchObjectHelperInternal 22410 7ff6235cd410 393 API calls 5 library calls 22411 7ff6235d1c10 50 API calls 22503 7ff6235f0608 17 API calls 2 library calls 22504 7ff6235ebe09 63 API calls 22412 7ff6235fa7e4 67 API calls 22455 7ff6235f52e0 60 API calls 4 library calls 22414 7ff6235fcfe0 RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 22415 7ff6235cb3e0 CloseHandle RtlPcToFileHeader RaiseException 21038 7ff6235de0e0 21061 7ff6235ddd80 21038->21061 21041 7ff6235de101 21044 7ff6235de241 21041->21044 21046 7ff6235de11f 21041->21046 21042 7ff6235de237 21081 7ff6235de66c 7 API calls 2 library calls 21042->21081 21082 7ff6235de66c 7 API calls 2 library calls 21044->21082 21047 7ff6235de144 21046->21047 21051 7ff6235de161 __scrt_release_startup_lock 21046->21051 21067 7ff6235ecde4 21046->21067 21048 7ff6235de24c BuildCatchObjectHelperInternal 21050 7ff6235de1ca 21071 7ff6235ec6ec 21050->21071 21051->21050 21078 7ff6235ebfd4 47 API calls 21051->21078 21054 7ff6235de1cf 21077 7ff6235dbdf0 10 API calls 21054->21077 21056 7ff6235de1ec 21079 7ff6235de7c0 GetModuleHandleW 21056->21079 21058 7ff6235de1f3 21058->21048 21080 7ff6235ddf04 7 API calls 21058->21080 21060 7ff6235de20a 21060->21047 21062 7ff6235ddd88 21061->21062 21063 7ff6235ddd94 __scrt_dllmain_crt_thread_attach 21062->21063 21064 7ff6235ddd9d 21063->21064 21065 7ff6235ddda1 21063->21065 21064->21041 21064->21042 21065->21064 21083 7ff6235e03c8 7 API calls 2 library calls 21065->21083 21068 7ff6235ece1a 21067->21068 21069 7ff6235ecde9 21067->21069 21068->21051 21069->21068 21084 7ff6235c1000 WSAStartup 21069->21084 21072 7ff6235ec6fc 21071->21072 21076 7ff6235ec711 21071->21076 21072->21076 21091 7ff6235ec3a8 50 API calls __free_lconv_mon 21072->21091 21074 7ff6235ec71a 21074->21076 21092 7ff6235ec578 12 API calls 3 library calls 21074->21092 21076->21054 21077->21056 21078->21050 21079->21058 21080->21060 21081->21044 21082->21048 21083->21064 21087 7ff6235ddf6c 21084->21087 21090 7ff6235ddf30 50 API calls 21087->21090 21089 7ff6235c103a 21089->21069 21090->21089 21091->21074 21092->21076 21093 7ff6235db5e0 21151 7ff6235e9ebc 21093->21151 21096 7ff6235db653 21099 7ff6235db72f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21096->21099 21100 7ff6235db660 GetCurrentProcess OpenProcessToken 21096->21100 21097 7ff6235db623 21098 7ff6235ddfb8 std::_Facet_Register 49 API calls 21097->21098 21101 7ff6235db62d 21098->21101 21159 7ff6235e8be0 21099->21159 21102 7ff6235db6d4 GetModuleHandleA GetProcAddress 21100->21102 21103 7ff6235db67f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21100->21103 21105 7ff6235e8be0 52 API calls 21101->21105 21102->21099 21106 7ff6235db6f9 GetCurrentProcessId OpenProcess 21102->21106 21103->21102 21109 7ff6235db64a CloseHandle 21105->21109 21106->21099 21109->21096 21112 7ff6235db7cc 21113 7ff6235ddfb8 std::_Facet_Register 49 API calls 21112->21113 21114 7ff6235db7d9 21113->21114 21184 7ff6235cb410 CreateEventW 21114->21184 21116 7ff6235db7e8 21217 7ff6235dae60 RegOpenKeyExW 21116->21217 21119 7ff6235db85a CheckTokenMembership 21121 7ff6235db874 21119->21121 21122 7ff6235db87b FreeSid 21119->21122 21120 7ff6235db888 21123 7ff6235db891 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21120->21123 21129 7ff6235db90c 21120->21129 21121->21122 21122->21120 21123->21129 21124 7ff6235e8a40 47 API calls std::_Locinfo::_Locinfo_ctor 21124->21129 21125 7ff6235e9ebc ProcessCodePage 47 API calls 21126 7ff6235dba23 SleepEx 21125->21126 21127 7ff6235e9ebc ProcessCodePage 47 API calls 21126->21127 21127->21129 21128 7ff6235e9ebc ProcessCodePage 47 API calls 21128->21129 21129->21124 21129->21125 21129->21128 21130 7ff6235dba98 CreateEventA 21129->21130 21135 7ff6235dbbe9 CloseHandle 21129->21135 21136 7ff6235dbbfd 21129->21136 21137 7ff6235dbb3d 21129->21137 21250 7ff6235c3820 ResetEvent timeGetTime socket 21129->21250 21272 7ff6235c6370 21129->21272 21263 7ff6235e8a40 21130->21263 21133 7ff6235dbb49 Sleep 21133->21137 21134 7ff6235dbb7f Sleep 21134->21129 21135->21129 21397 7ff6235e3ff8 21136->21397 21137->21133 21137->21134 21137->21135 21152 7ff6235e9eec 21151->21152 21402 7ff6235e9720 21152->21402 21155 7ff6235e9f40 21158 7ff6235db60b SleepEx 21155->21158 21422 7ff6235e3bec 47 API calls 2 library calls 21155->21422 21158->21096 21158->21097 21160 7ff6235e8c00 21159->21160 21161 7ff6235e8c17 21159->21161 21438 7ff6235e8d9c 11 API calls memcpy_s 21160->21438 21431 7ff6235e8b7c 21161->21431 21164 7ff6235e8c05 21439 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21164->21439 21167 7ff6235db7aa CloseHandle 21177 7ff6235ddfb8 21167->21177 21168 7ff6235e8c2a CreateThread 21168->21167 21169 7ff6235e8c5a GetLastError 21168->21169 21440 7ff6235e8d10 11 API calls 2 library calls 21169->21440 21171 7ff6235e8c67 21172 7ff6235e8c70 CloseHandle 21171->21172 21173 7ff6235e8c76 21171->21173 21172->21173 21174 7ff6235e8c85 21173->21174 21175 7ff6235e8c7f FreeLibrary 21173->21175 21441 7ff6235ee95c 21174->21441 21175->21174 21180 7ff6235ddfc3 21177->21180 21178 7ff6235db7bd 21183 7ff6235c36e0 WSAStartup CreateEventW 21178->21183 21180->21177 21180->21178 21459 7ff6235eccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21180->21459 21460 7ff6235dccb0 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21180->21460 21461 7ff6235c19d0 49 API calls 2 library calls 21180->21461 21183->21112 21185 7ff6235cb457 21184->21185 21215 7ff6235cb7b0 21184->21215 21462 7ff6235c1200 21185->21462 21189 7ff6235cb7bb 21480 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21189->21480 21191 7ff6235cb7c6 21481 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21191->21481 21192 7ff6235cb4d2 HeapCreate 21192->21191 21193 7ff6235cb521 __std_exception_destroy 21192->21193 21195 7ff6235cb560 InitializeCriticalSectionAndSpinCount 21193->21195 21196 7ff6235cb7d1 21195->21196 21197 7ff6235cb57d CreateEventW 21195->21197 21482 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21196->21482 21199 7ff6235cb7dc 21197->21199 21200 7ff6235cb5b8 CreateEventW 21197->21200 21483 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21199->21483 21201 7ff6235cb7e7 21200->21201 21202 7ff6235cb5d8 CreateEventW 21200->21202 21484 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21201->21484 21204 7ff6235cb7f2 21202->21204 21205 7ff6235cb5f8 InitializeCriticalSectionAndSpinCount 21202->21205 21485 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21204->21485 21207 7ff6235cb7fd 21205->21207 21208 7ff6235cb6c1 InitializeCriticalSectionAndSpinCount 21205->21208 21486 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21207->21486 21211 7ff6235cb6d5 timeGetTime CreateEventW CreateEventW 21208->21211 21212 7ff6235cb7a6 21208->21212 21216 7ff6235cb77e 21211->21216 21478 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21212->21478 21479 7ff6235c10f0 RtlPcToFileHeader RaiseException _com_raise_error 21215->21479 21216->21116 21218 7ff6235dae9f RegQueryValueExW 21217->21218 21219 7ff6235daecc memcpy_s 21217->21219 21218->21219 21220 7ff6235daf02 RegQueryValueExW lstrlenW 21219->21220 21248 7ff6235db551 AllocateAndInitializeSid 21219->21248 21489 7ff6235fda50 21220->21489 21223 7ff6235daff8 lstrlenW 21224 7ff6235fda50 memcpy_s 21223->21224 21225 7ff6235db01d lstrlenW lstrlenW 21224->21225 21226 7ff6235db0c8 lstrlenW lstrlenW 21225->21226 21234 7ff6235db04a memcpy_s 21225->21234 21227 7ff6235db15a lstrlenW 21226->21227 21236 7ff6235db0f1 21226->21236 21228 7ff6235fda50 memcpy_s 21227->21228 21230 7ff6235db17f lstrlenW lstrlenW 21228->21230 21229 7ff6235daf79 memcpy_s 21229->21223 21231 7ff6235db1ac memcpy_s 21230->21231 21232 7ff6235db228 lstrlenW 21230->21232 21231->21232 21233 7ff6235fda50 memcpy_s 21232->21233 21235 7ff6235db24d lstrlenW lstrlenW 21233->21235 21234->21226 21237 7ff6235db2f8 lstrlenW lstrlenW 21235->21237 21245 7ff6235db27a memcpy_s 21235->21245 21236->21227 21238 7ff6235db38a lstrlenW 21237->21238 21244 7ff6235db321 21237->21244 21239 7ff6235fda50 memcpy_s 21238->21239 21240 7ff6235db3af lstrlenW lstrlenW 21239->21240 21241 7ff6235db458 lstrlenW 21240->21241 21247 7ff6235db3dc memcpy_s 21240->21247 21242 7ff6235fda50 memcpy_s 21241->21242 21243 7ff6235db47d lstrlenW lstrlenW 21242->21243 21246 7ff6235db528 lstrlenW lstrlenW 21243->21246 21249 7ff6235db4aa memcpy_s 21243->21249 21244->21238 21245->21237 21246->21248 21247->21241 21248->21119 21248->21120 21249->21246 21251 7ff6235c3ad9 21250->21251 21252 7ff6235c3893 lstrlenW WideCharToMultiByte 21250->21252 21251->21129 21253 7ff6235ddff4 21252->21253 21254 7ff6235c38d4 lstrlenW WideCharToMultiByte gethostbyname 21253->21254 21255 7ff6235c391d 21254->21255 21255->21251 21256 7ff6235c392e htons connect 21255->21256 21256->21251 21257 7ff6235c3971 setsockopt setsockopt setsockopt setsockopt 21256->21257 21258 7ff6235c3a37 WSAIoctl 21257->21258 21259 7ff6235c3a86 21257->21259 21258->21259 21260 7ff6235e8be0 52 API calls 21259->21260 21261 7ff6235c3ab0 21260->21261 21262 7ff6235e8be0 52 API calls 21261->21262 21262->21251 21264 7ff6235e8a4d 21263->21264 21267 7ff6235e8a57 21263->21267 21264->21267 21270 7ff6235e8a73 21264->21270 21266 7ff6235e8a5f 21492 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21266->21492 21491 7ff6235e8d9c 11 API calls memcpy_s 21267->21491 21269 7ff6235e8a6b 21269->21129 21270->21269 21493 7ff6235e8d9c 11 API calls memcpy_s 21270->21493 21273 7ff6235c639d std::_Locinfo::_Locinfo_ctor 21272->21273 21274 7ff6235ddfb8 std::_Facet_Register 49 API calls 21273->21274 21276 7ff6235c63aa memcpy_s 21274->21276 21275 7ff6235c63de memcpy_s 21278 7ff6235c63f6 gethostname gethostbyname 21275->21278 21276->21275 21277 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21276->21277 21277->21275 21279 7ff6235c64cf 8 API calls 21278->21279 21280 7ff6235c6432 inet_ntoa 21278->21280 21281 7ff6235c65be GetProcAddress 21279->21281 21282 7ff6235c66dc GetSystemInfo wsprintfW 21279->21282 21633 7ff6235e91f8 47 API calls 2 library calls 21280->21633 21284 7ff6235c66d3 FreeLibrary 21281->21284 21285 7ff6235c65d7 21281->21285 21286 7ff6235c6720 GetDriveTypeW 21282->21286 21284->21282 21494 7ff6235c3670 21285->21494 21288 7ff6235c6741 GetDiskFreeSpaceExW 21286->21288 21289 7ff6235c6778 21286->21289 21287 7ff6235c6455 21634 7ff6235e91f8 47 API calls 2 library calls 21287->21634 21288->21289 21289->21286 21291 7ff6235c677f GlobalMemoryStatusEx 21289->21291 21293 7ff6235c3670 50 API calls 21291->21293 21295 7ff6235c67e2 21293->21295 21294 7ff6235c6620 21498 7ff6235c9300 GetModuleHandleW GetProcAddress 21294->21498 21297 7ff6235c3670 50 API calls 21295->21297 21296 7ff6235c6480 inet_ntoa 21635 7ff6235e91f8 47 API calls 2 library calls 21296->21635 21300 7ff6235c6806 21297->21300 21299 7ff6235c646d 21299->21279 21299->21296 21636 7ff6235e91f8 47 API calls 2 library calls 21299->21636 21502 7ff6235c8f60 CreateDXGIFactory 21300->21502 21304 7ff6235c6819 GetForegroundWindow 21306 7ff6235c6824 GetWindowTextW 21304->21306 21307 7ff6235c683a lstrlenW 21304->21307 21306->21307 21514 7ff6235c8e30 21307->21514 21309 7ff6235c66c0 RegCloseKey 21312 7ff6235ddf84 21309->21312 21310 7ff6235c66a2 21310->21309 21314 7ff6235e94e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21310->21314 21312->21284 21313 7ff6235c687a 21315 7ff6235c687f GetLocalTime wsprintfW 21313->21315 21316 7ff6235c68a3 21313->21316 21314->21309 21315->21316 21317 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21316->21317 21318 7ff6235c68bb lstrlenW 21317->21318 21319 7ff6235c8e30 6 API calls 21318->21319 21320 7ff6235c68df 21319->21320 21321 7ff6235c68f8 GetModuleHandleW GetProcAddress 21320->21321 21322 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21320->21322 21323 7ff6235c6931 GetSystemInfo 21321->21323 21324 7ff6235c692d GetNativeSystemInfo 21321->21324 21322->21321 21325 7ff6235c6937 wsprintfW 21323->21325 21324->21325 21523 7ff6235c8c30 21325->21523 21328 7ff6235c6986 GetCurrentProcessId 21329 7ff6235c6ade CoInitializeEx CoCreateInstance 21328->21329 21330 7ff6235c699c OpenProcess 21328->21330 21331 7ff6235c6c0f 21329->21331 21360 7ff6235c6b15 21329->21360 21332 7ff6235c6ad7 21330->21332 21333 7ff6235c69bd K32GetProcessImageFileNameW 21330->21333 21336 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21331->21336 21332->21329 21334 7ff6235c6ace CloseHandle 21333->21334 21335 7ff6235c69db GetLogicalDriveStringsW 21333->21335 21334->21332 21337 7ff6235c6abe lstrcpyW 21335->21337 21352 7ff6235c69f5 21335->21352 21338 7ff6235c6c2b memcpy_s 21336->21338 21337->21334 21340 7ff6235c6c46 RegOpenKeyExW 21338->21340 21339 7ff6235c6a10 lstrcmpiW 21341 7ff6235c6a32 lstrcmpiW 21339->21341 21339->21352 21342 7ff6235c6c75 RegQueryInfoKeyW 21340->21342 21343 7ff6235c6dd2 lstrlenW 21340->21343 21344 7ff6235c6a46 QueryDosDeviceW 21341->21344 21341->21352 21345 7ff6235c6e02 21342->21345 21367 7ff6235c6cd5 memcpy_s 21342->21367 21343->21345 21346 7ff6235c6de4 21343->21346 21344->21334 21347 7ff6235c6a80 lstrlenW 21344->21347 21552 7ff6235c7a60 21345->21552 21543 7ff6235e94e8 21346->21543 21637 7ff6235e934c 53 API calls 3 library calls 21347->21637 21350 7ff6235c6bfe CoUninitialize 21350->21331 21352->21337 21352->21339 21354 7ff6235c6f0d lstrcpyW lstrcatW 21352->21354 21354->21334 21355 7ff6235e94e8 std::_Locinfo::_Locinfo_ctor 47 API calls 21356 7ff6235c6e21 GetTickCount 21355->21356 21570 7ff6235e8e3c GetSystemTimeAsFileTime 21356->21570 21357 7ff6235c6dc7 RegCloseKey 21357->21343 21360->21331 21360->21350 21363 7ff6235c6bb6 SysFreeString 21360->21363 21363->21360 21364 7ff6235c6d34 RegEnumKeyExW lstrlenW 21366 7ff6235c6d77 lstrlenW 21364->21366 21364->21367 21365 7ff6235c6eff 21577 7ff6235c72d0 21365->21577 21366->21367 21367->21343 21367->21357 21367->21364 21368 7ff6235e8dc4 47 API calls std::_Locinfo::_Locinfo_ctor 21367->21368 21368->21367 21370 7ff6235c6f51 lstrlenW 21371 7ff6235c8e30 6 API calls 21370->21371 21372 7ff6235c6f8a 21371->21372 21373 7ff6235c6f93 6 API calls 21372->21373 21374 7ff6235c7067 CreateToolhelp32Snapshot 21372->21374 21375 7ff6235c7018 lstrlenW RegSetValueExW 21373->21375 21376 7ff6235c705a RegCloseKey 21373->21376 21377 7ff6235c7081 memcpy_s 21374->21377 21378 7ff6235c7108 CreateToolhelp32Snapshot 21374->21378 21375->21376 21380 7ff6235c704d RegCloseKey 21375->21380 21376->21374 21381 7ff6235c7095 Process32FirstW 21377->21381 21382 7ff6235c71b8 CreateToolhelp32Snapshot 21378->21382 21383 7ff6235c712b memcpy_s 21378->21383 21380->21376 21381->21378 21390 7ff6235c70b3 21381->21390 21385 7ff6235c7264 21382->21385 21386 7ff6235c71db memcpy_s 21382->21386 21387 7ff6235c713f Process32FirstW 21383->21387 21617 7ff6235c3e30 GetCurrentThreadId 21385->21617 21391 7ff6235c71ef Process32FirstW 21386->21391 21387->21382 21393 7ff6235c715d 21387->21393 21388 7ff6235c729c 21388->21129 21389 7ff6235c70f4 Process32NextW 21389->21378 21389->21390 21390->21378 21390->21389 21391->21385 21395 7ff6235c720d 21391->21395 21392 7ff6235c71a4 Process32NextW 21392->21382 21392->21393 21393->21382 21393->21392 21394 7ff6235c7250 Process32NextW 21394->21385 21394->21395 21395->21385 21395->21394 21936 7ff6235e3e70 47 API calls 2 library calls 21397->21936 21399 7ff6235e4011 21400 7ff6235e4028 _invalid_parameter_noinfo_noreturn 17 API calls 21399->21400 21401 7ff6235e4026 21400->21401 21403 7ff6235e976a 21402->21403 21404 7ff6235e9758 21402->21404 21406 7ff6235e97b4 21403->21406 21408 7ff6235e9778 21403->21408 21423 7ff6235e8d9c 11 API calls memcpy_s 21404->21423 21409 7ff6235e97cf ProcessCodePage 21406->21409 21426 7ff6235e8400 47 API calls ProcessCodePage 21406->21426 21407 7ff6235e975d 21424 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21407->21424 21425 7ff6235e3f0c 47 API calls _invalid_parameter_noinfo_noreturn 21408->21425 21413 7ff6235e9b55 21409->21413 21427 7ff6235e8d9c 11 API calls memcpy_s 21409->21427 21419 7ff6235e9768 21413->21419 21429 7ff6235e8d9c 11 API calls memcpy_s 21413->21429 21416 7ff6235e9b4a 21428 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21416->21428 21417 7ff6235e9de6 21430 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21417->21430 21419->21155 21421 7ff6235e3bec 47 API calls 2 library calls 21419->21421 21421->21155 21422->21158 21423->21407 21424->21419 21425->21419 21426->21409 21427->21416 21428->21413 21429->21417 21430->21419 21447 7ff6235f0a28 21431->21447 21434 7ff6235ee95c __free_lconv_mon 11 API calls 21435 7ff6235e8ba8 21434->21435 21436 7ff6235e8bb1 GetModuleHandleExW 21435->21436 21437 7ff6235e8bad 21435->21437 21436->21437 21437->21167 21437->21168 21438->21164 21439->21167 21440->21171 21442 7ff6235ee961 RtlFreeHeap 21441->21442 21446 7ff6235ee990 21441->21446 21443 7ff6235ee97c GetLastError 21442->21443 21442->21446 21444 7ff6235ee989 __free_lconv_mon 21443->21444 21458 7ff6235e8d9c 11 API calls memcpy_s 21444->21458 21446->21167 21448 7ff6235f0a39 21447->21448 21454 7ff6235f0a47 memcpy_s 21447->21454 21449 7ff6235f0a8a 21448->21449 21448->21454 21457 7ff6235e8d9c 11 API calls memcpy_s 21449->21457 21450 7ff6235f0a6e HeapAlloc 21451 7ff6235f0a88 21450->21451 21450->21454 21453 7ff6235e8b9e 21451->21453 21453->21434 21454->21449 21454->21450 21456 7ff6235eccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21454->21456 21456->21454 21457->21453 21458->21446 21459->21180 21461->21180 21463 7ff6235c1221 21462->21463 21464 7ff6235c1270 21462->21464 21487 7ff6235ddccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21463->21487 21465 7ff6235c12f3 21464->21465 21488 7ff6235ddccc AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21464->21488 21465->21189 21465->21192 21490 7ff6235daf50 lstrlenW lstrlenW 21489->21490 21490->21223 21490->21229 21491->21266 21492->21269 21493->21266 21495 7ff6235c3695 21494->21495 21638 7ff6235e892c 21495->21638 21499 7ff6235c9341 GetSystemInfo 21498->21499 21500 7ff6235c933d GetNativeSystemInfo 21498->21500 21501 7ff6235c6642 RegOpenKeyExW RegQueryValueExW 21499->21501 21500->21501 21501->21309 21501->21310 21504 7ff6235c92a3 21502->21504 21508 7ff6235c8fba 21502->21508 21503 7ff6235c92d5 21503->21304 21504->21503 21505 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21504->21505 21507 7ff6235c92f6 21505->21507 21509 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21507->21509 21513 7ff6235c9035 21508->21513 21652 7ff6235ca4c0 49 API calls memcpy_s 21508->21652 21510 7ff6235c92fc 21509->21510 21511 7ff6235c3670 50 API calls 21511->21513 21513->21504 21513->21507 21513->21511 21653 7ff6235ca4c0 49 API calls memcpy_s 21513->21653 21515 7ff6235fda50 memcpy_s 21514->21515 21516 7ff6235c8e71 RegOpenKeyExW 21515->21516 21517 7ff6235c8e9c 21516->21517 21518 7ff6235c8ea6 21516->21518 21519 7ff6235c8f28 RegCloseKey RegCloseKey 21517->21519 21518->21519 21520 7ff6235c8eb4 RegQueryValueExW 21518->21520 21519->21313 21520->21519 21521 7ff6235c8ef3 lstrcmpW 21520->21521 21521->21517 21522 7ff6235c8f10 lstrcpyW 21521->21522 21522->21519 21524 7ff6235ddff4 21523->21524 21525 7ff6235c8c48 GetCurrentProcessId wsprintfW 21524->21525 21654 7ff6235c8a40 GetCurrentProcessId OpenProcess 21525->21654 21527 7ff6235c8c70 memcpy_s 21528 7ff6235c8c84 GetVersionExW 21527->21528 21529 7ff6235c8df2 21528->21529 21530 7ff6235c8c9f 21528->21530 21531 7ff6235c8df9 wsprintfW 21529->21531 21530->21529 21532 7ff6235c8cb5 GetCurrentProcess OpenProcessToken 21530->21532 21536 7ff6235c8e09 21531->21536 21532->21529 21533 7ff6235c8ce1 GetTokenInformation 21532->21533 21534 7ff6235c8d9c CloseHandle 21533->21534 21535 7ff6235c8d16 GetLastError 21533->21535 21534->21529 21542 7ff6235c8dae 21534->21542 21535->21534 21537 7ff6235c8d21 LocalAlloc 21535->21537 21536->21328 21538 7ff6235c8d43 GetTokenInformation 21537->21538 21539 7ff6235c8d94 21537->21539 21540 7ff6235c8d72 GetSidSubAuthorityCount GetSidSubAuthority 21538->21540 21541 7ff6235c8d8b LocalFree 21538->21541 21539->21534 21540->21541 21541->21539 21542->21531 21542->21536 21547 7ff6235e9505 21543->21547 21544 7ff6235e950a 21545 7ff6235e9520 21544->21545 21774 7ff6235e8d9c 11 API calls memcpy_s 21544->21774 21545->21345 21547->21544 21547->21545 21550 7ff6235e9556 21547->21550 21548 7ff6235e9514 21775 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21548->21775 21550->21545 21776 7ff6235e8d9c 11 API calls memcpy_s 21550->21776 21560 7ff6235c7a93 memcpy_s 21552->21560 21553 7ff6235c7b7c CoCreateInstance 21554 7ff6235c7da1 lstrlenW 21553->21554 21566 7ff6235c7bad memcpy_s 21553->21566 21555 7ff6235c6e07 21554->21555 21556 7ff6235c7dae lstrcatW 21554->21556 21555->21355 21556->21555 21557 7ff6235c7ae4 CreateToolhelp32Snapshot 21559 7ff6235c7afa Process32FirstW 21557->21559 21557->21560 21558 7ff6235c7d8f 21558->21554 21559->21560 21561 7ff6235c7b4d CloseHandle 21559->21561 21560->21553 21560->21557 21562 7ff6235c7b3f Process32NextW 21560->21562 21563 7ff6235c7de5 CloseHandle 21560->21563 21561->21560 21562->21560 21562->21561 21563->21560 21564 7ff6235c7df5 lstrcatW lstrcatW 21563->21564 21564->21560 21565 7ff6235c7c35 wsprintfW RegOpenKeyExW 21565->21566 21566->21558 21566->21565 21567 7ff6235c7cf7 RegQueryValueExW 21566->21567 21568 7ff6235c7d60 RegCloseKey 21567->21568 21569 7ff6235c7d40 lstrcatW lstrcatW 21567->21569 21568->21566 21569->21568 21571 7ff6235c6e32 21570->21571 21572 7ff6235e91b0 21571->21572 21777 7ff6235f1a1c 21572->21777 21575 7ff6235c6e52 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 21575->21365 21578 7ff6235c7330 21577->21578 21578->21578 21580 7ff6235c7346 memcpy_s 21578->21580 21893 7ff6235ca300 49 API calls 4 library calls 21578->21893 21582 7ff6235c7392 memcpy_s 21580->21582 21894 7ff6235ca300 49 API calls 4 library calls 21580->21894 21584 7ff6235c7401 memcpy_s 21582->21584 21895 7ff6235ca300 49 API calls 4 library calls 21582->21895 21586 7ff6235c7474 memcpy_s 21584->21586 21896 7ff6235ca300 49 API calls 4 library calls 21584->21896 21588 7ff6235c74cf memcpy_s 21586->21588 21897 7ff6235ca300 49 API calls 4 library calls 21586->21897 21590 7ff6235c7550 memcpy_s 21588->21590 21898 7ff6235ca300 49 API calls 4 library calls 21588->21898 21592 7ff6235c75c0 memcpy_s 21590->21592 21899 7ff6235ca300 49 API calls 4 library calls 21590->21899 21887 7ff6235d9be0 21592->21887 21595 7ff6235c76b6 21596 7ff6235c772d 21595->21596 21597 7ff6235c7758 21595->21597 21599 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21595->21599 21596->21370 21598 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21597->21598 21600 7ff6235c775e CreateMutexExW GetLastError 21598->21600 21599->21597 21601 7ff6235c77c9 21600->21601 21602 7ff6235c7799 21600->21602 21604 7ff6235c7870 9 API calls 21601->21604 21605 7ff6235c77e0 lstrlenW 21601->21605 21603 7ff6235c77a0 Sleep CreateMutexW GetLastError 21602->21603 21603->21601 21603->21603 21606 7ff6235c7924 DeleteFileW 21604->21606 21607 7ff6235c792d ReleaseMutex DirectInput8Create 21604->21607 21609 7ff6235c8e30 6 API calls 21605->21609 21606->21607 21608 7ff6235c7a00 21607->21608 21613 7ff6235c7963 21607->21613 21608->21370 21610 7ff6235c783e 21609->21610 21611 7ff6235c7842 lstrcmpW 21610->21611 21612 7ff6235c7858 SleepEx 21610->21612 21611->21604 21611->21612 21612->21604 21612->21605 21613->21608 21614 7ff6235c7a1f GetTickCount GetKeyState 21613->21614 21900 7ff6235cadb0 37 API calls 2 library calls 21614->21900 21618 7ff6235c3e5c 21617->21618 21917 7ff6235c1670 21618->21917 21620 7ff6235c3e9b 21621 7ff6235c1670 2 API calls 21620->21621 21622 7ff6235c3ec4 21621->21622 21924 7ff6235c1500 21622->21924 21624 7ff6235c3efa 21629 7ff6235c3f06 21624->21629 21631 7ff6235c3f1a 21624->21631 21625 7ff6235c3fa1 21930 7ff6235c1730 21625->21930 21626 7ff6235c3f80 send 21626->21625 21626->21629 21628 7ff6235c3f30 send 21628->21631 21629->21625 21629->21626 21630 7ff6235c3fba GetCurrentThreadId 21632 7ff6235c3fca 21630->21632 21631->21625 21631->21628 21631->21629 21632->21388 21633->21287 21634->21299 21635->21299 21636->21299 21637->21352 21639 7ff6235e8965 21638->21639 21642 7ff6235e89a8 21639->21642 21648 7ff6235e4280 50 API calls 3 library calls 21639->21648 21644 7ff6235e89e7 21642->21644 21649 7ff6235e3f0c 47 API calls _invalid_parameter_noinfo_noreturn 21642->21649 21643 7ff6235e8a0d 21646 7ff6235c36b4 21643->21646 21651 7ff6235e3bec 47 API calls 2 library calls 21643->21651 21644->21643 21650 7ff6235e3bec 47 API calls 2 library calls 21644->21650 21646->21294 21648->21642 21649->21644 21650->21643 21651->21646 21652->21508 21653->21513 21655 7ff6235c8a71 OpenProcessToken 21654->21655 21656 7ff6235c8a99 21654->21656 21657 7ff6235c8aaf 21655->21657 21658 7ff6235c8a90 CloseHandle 21655->21658 21656->21527 21693 7ff6235c8710 21657->21693 21658->21656 21660 7ff6235c8acd 21661 7ff6235c8b03 21660->21661 21662 7ff6235c8ae1 SysStringLen 21660->21662 21663 7ff6235c8ae9 21660->21663 21664 7ff6235c8b4c memcpy_s 21661->21664 21665 7ff6235ddfb8 std::_Facet_Register 49 API calls 21661->21665 21662->21663 21663->21661 21667 7ff6235c8af9 SysStringLen 21663->21667 21666 7ff6235c8b5a CloseHandle CloseHandle 21664->21666 21668 7ff6235c8b1e 21665->21668 21669 7ff6235c8b88 21666->21669 21672 7ff6235c8baa 21666->21672 21667->21661 21668->21664 21674 7ff6235c8c20 21668->21674 21671 7ff6235c8ba1 SysFreeString 21669->21671 21669->21672 21670 7ff6235c8be5 SysFreeString 21673 7ff6235c8bee 21670->21673 21671->21672 21672->21670 21672->21673 21673->21527 21675 7ff6235c8c48 GetCurrentProcessId wsprintfW 21674->21675 21676 7ff6235c8a40 87 API calls 21675->21676 21677 7ff6235c8c70 memcpy_s 21676->21677 21678 7ff6235c8c84 GetVersionExW 21677->21678 21679 7ff6235c8df2 21678->21679 21680 7ff6235c8c9f 21678->21680 21681 7ff6235c8df9 wsprintfW 21679->21681 21680->21679 21683 7ff6235c8cb5 GetCurrentProcess OpenProcessToken 21680->21683 21682 7ff6235c8e09 21681->21682 21682->21527 21683->21679 21684 7ff6235c8ce1 GetTokenInformation 21683->21684 21685 7ff6235c8d9c CloseHandle 21684->21685 21686 7ff6235c8d16 GetLastError 21684->21686 21685->21679 21692 7ff6235c8dae 21685->21692 21686->21685 21687 7ff6235c8d21 LocalAlloc 21686->21687 21688 7ff6235c8d43 GetTokenInformation 21687->21688 21689 7ff6235c8d94 21687->21689 21690 7ff6235c8d72 GetSidSubAuthorityCount GetSidSubAuthority 21688->21690 21691 7ff6235c8d8b LocalFree 21688->21691 21689->21685 21690->21691 21691->21689 21692->21681 21692->21682 21694 7ff6235c8750 21693->21694 21695 7ff6235c8794 21694->21695 21770 7ff6235c6300 21694->21770 21698 7ff6235c6300 SysFreeString 21695->21698 21712 7ff6235c87f1 21695->21712 21730 7ff6235c89ff 21695->21730 21697 7ff6235c875d 21699 7ff6235ddfb8 std::_Facet_Register 49 API calls 21697->21699 21701 7ff6235c87ba 21698->21701 21702 7ff6235c8767 21699->21702 21700 7ff6235c880e GetTokenInformation 21704 7ff6235c8833 GetLastError 21700->21704 21705 7ff6235c886c GetTokenInformation 21700->21705 21706 7ff6235ddfb8 std::_Facet_Register 49 API calls 21701->21706 21702->21695 21703 7ff6235c8774 SysAllocString 21702->21703 21703->21695 21703->21730 21707 7ff6235c8842 GetProcessHeap HeapAlloc 21704->21707 21704->21730 21708 7ff6235c889a LookupAccountSidW 21705->21708 21729 7ff6235c88f7 21705->21729 21709 7ff6235c87c4 21706->21709 21707->21705 21707->21730 21711 7ff6235c88d4 GetLastError 21708->21711 21716 7ff6235c891b 21708->21716 21709->21712 21713 7ff6235c87d1 SysAllocString 21709->21713 21710 7ff6235c89eb GetProcessHeap HeapFree 21710->21730 21714 7ff6235c88e1 21711->21714 21715 7ff6235c88fc 21711->21715 21712->21700 21712->21730 21713->21712 21713->21730 21717 7ff6235e8a40 std::_Locinfo::_Locinfo_ctor 47 API calls 21714->21717 21715->21660 21718 7ff6235c896e 21716->21718 21719 7ff6235c6300 SysFreeString 21716->21719 21717->21729 21721 7ff6235c6300 SysFreeString 21718->21721 21718->21729 21718->21730 21720 7ff6235c8935 21719->21720 21722 7ff6235ddfb8 std::_Facet_Register 49 API calls 21720->21722 21724 7ff6235c899c 21721->21724 21723 7ff6235c893f 21722->21723 21723->21718 21725 7ff6235c894c SysAllocString 21723->21725 21726 7ff6235ddfb8 std::_Facet_Register 49 API calls 21724->21726 21725->21718 21725->21730 21727 7ff6235c89a6 21726->21727 21728 7ff6235c89b3 SysAllocString 21727->21728 21727->21729 21728->21729 21728->21730 21729->21710 21729->21730 21731 7ff6235c8a40 GetCurrentProcessId OpenProcess 21730->21731 21732 7ff6235c8a71 OpenProcessToken 21731->21732 21733 7ff6235c8a99 21731->21733 21734 7ff6235c8aaf 21732->21734 21735 7ff6235c8a90 CloseHandle 21732->21735 21733->21660 21736 7ff6235c8710 74 API calls 21734->21736 21735->21733 21737 7ff6235c8acd 21736->21737 21738 7ff6235c8b03 21737->21738 21739 7ff6235c8ae1 SysStringLen 21737->21739 21740 7ff6235c8ae9 21737->21740 21741 7ff6235c8b4c memcpy_s 21738->21741 21742 7ff6235ddfb8 std::_Facet_Register 49 API calls 21738->21742 21739->21740 21740->21738 21744 7ff6235c8af9 SysStringLen 21740->21744 21743 7ff6235c8b5a CloseHandle CloseHandle 21741->21743 21745 7ff6235c8b1e 21742->21745 21746 7ff6235c8b88 21743->21746 21749 7ff6235c8baa 21743->21749 21744->21738 21745->21741 21751 7ff6235c8c20 21745->21751 21748 7ff6235c8ba1 SysFreeString 21746->21748 21746->21749 21747 7ff6235c8be5 SysFreeString 21750 7ff6235c8bee 21747->21750 21748->21749 21749->21747 21749->21750 21750->21660 21752 7ff6235c8c48 GetCurrentProcessId wsprintfW 21751->21752 21753 7ff6235c8a40 74 API calls 21752->21753 21754 7ff6235c8c70 memcpy_s 21753->21754 21755 7ff6235c8c84 GetVersionExW 21754->21755 21756 7ff6235c8df2 21755->21756 21757 7ff6235c8c9f 21755->21757 21758 7ff6235c8df9 wsprintfW 21756->21758 21757->21756 21760 7ff6235c8cb5 GetCurrentProcess OpenProcessToken 21757->21760 21759 7ff6235c8e09 21758->21759 21759->21660 21760->21756 21761 7ff6235c8ce1 GetTokenInformation 21760->21761 21762 7ff6235c8d9c CloseHandle 21761->21762 21763 7ff6235c8d16 GetLastError 21761->21763 21762->21756 21769 7ff6235c8dae 21762->21769 21763->21762 21764 7ff6235c8d21 LocalAlloc 21763->21764 21765 7ff6235c8d43 GetTokenInformation 21764->21765 21766 7ff6235c8d94 21764->21766 21767 7ff6235c8d72 GetSidSubAuthorityCount GetSidSubAuthority 21765->21767 21768 7ff6235c8d8b LocalFree 21765->21768 21766->21762 21767->21768 21768->21766 21769->21758 21769->21759 21771 7ff6235c6315 21770->21771 21772 7ff6235c6339 21770->21772 21771->21772 21773 7ff6235c632c SysFreeString 21771->21773 21772->21697 21773->21772 21774->21548 21775->21545 21776->21548 21817 7ff6235eee88 GetLastError 21777->21817 21779 7ff6235f1a27 21782 7ff6235e91c7 21779->21782 21785 7ff6235f1a4b 21779->21785 21834 7ff6235ef070 21779->21834 21782->21575 21786 7ff6235e8eb0 21782->21786 21784 7ff6235ee95c __free_lconv_mon 11 API calls 21784->21785 21785->21782 21841 7ff6235e8d9c 11 API calls memcpy_s 21785->21841 21787 7ff6235e8ee1 21786->21787 21788 7ff6235e8ec6 21786->21788 21787->21788 21789 7ff6235e8efa 21787->21789 21862 7ff6235e8d9c 11 API calls memcpy_s 21788->21862 21791 7ff6235e8f00 21789->21791 21794 7ff6235e8f1d 21789->21794 21864 7ff6235e8d9c 11 API calls memcpy_s 21791->21864 21792 7ff6235e8ecb 21863 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21792->21863 21845 7ff6235f25dc 21794->21845 21800 7ff6235e9197 21858 7ff6235e4028 IsProcessorFeaturePresent 21800->21858 21803 7ff6235e91ac 21806 7ff6235f1a1c 12 API calls 21803->21806 21810 7ff6235e91c7 21806->21810 21808 7ff6235e8f61 21812 7ff6235e8f7a 21808->21812 21813 7ff6235e8fda 21808->21813 21809 7ff6235e91dc 21809->21575 21810->21809 21811 7ff6235e8eb0 61 API calls 21810->21811 21811->21809 21816 7ff6235e8ed7 21812->21816 21877 7ff6235f2620 47 API calls _isindst 21812->21877 21813->21816 21878 7ff6235f2620 47 API calls _isindst 21813->21878 21816->21575 21818 7ff6235eeec9 FlsSetValue 21817->21818 21823 7ff6235eeeac 21817->21823 21819 7ff6235eeedb 21818->21819 21824 7ff6235eeeb9 21818->21824 21821 7ff6235f0a28 memcpy_s 5 API calls 21819->21821 21820 7ff6235eef35 SetLastError 21820->21779 21822 7ff6235eeeea 21821->21822 21825 7ff6235eef08 FlsSetValue 21822->21825 21826 7ff6235eeef8 FlsSetValue 21822->21826 21823->21818 21823->21824 21824->21820 21828 7ff6235eef14 FlsSetValue 21825->21828 21829 7ff6235eef26 21825->21829 21827 7ff6235eef01 21826->21827 21830 7ff6235ee95c __free_lconv_mon 5 API calls 21827->21830 21828->21827 21842 7ff6235eeac0 11 API calls memcpy_s 21829->21842 21830->21824 21832 7ff6235eef2e 21833 7ff6235ee95c __free_lconv_mon 5 API calls 21832->21833 21833->21820 21835 7ff6235ef0bb 21834->21835 21839 7ff6235ef07f memcpy_s 21834->21839 21844 7ff6235e8d9c 11 API calls memcpy_s 21835->21844 21837 7ff6235ef0a2 HeapAlloc 21838 7ff6235ef0b9 21837->21838 21837->21839 21838->21784 21839->21835 21839->21837 21843 7ff6235eccd0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21839->21843 21841->21782 21842->21832 21843->21839 21844->21838 21846 7ff6235f25eb 21845->21846 21847 7ff6235e8f22 21845->21847 21879 7ff6235eae44 EnterCriticalSection 21846->21879 21852 7ff6235f1704 21847->21852 21849 7ff6235f25f3 21850 7ff6235f2604 21849->21850 21851 7ff6235f244c 61 API calls 21849->21851 21851->21850 21853 7ff6235e8f37 21852->21853 21854 7ff6235f170d 21852->21854 21853->21800 21865 7ff6235f1734 21853->21865 21880 7ff6235e8d9c 11 API calls memcpy_s 21854->21880 21856 7ff6235f1712 21881 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21856->21881 21859 7ff6235e403b 21858->21859 21882 7ff6235e3d0c 14 API calls 3 library calls 21859->21882 21861 7ff6235e4056 GetCurrentProcess TerminateProcess 21862->21792 21863->21816 21864->21816 21866 7ff6235f173d 21865->21866 21870 7ff6235e8f48 21865->21870 21883 7ff6235e8d9c 11 API calls memcpy_s 21866->21883 21868 7ff6235f1742 21884 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21868->21884 21870->21800 21871 7ff6235f1764 21870->21871 21872 7ff6235e8f59 21871->21872 21873 7ff6235f176d 21871->21873 21872->21800 21872->21808 21885 7ff6235e8d9c 11 API calls memcpy_s 21873->21885 21875 7ff6235f1772 21886 7ff6235e3fd8 47 API calls _invalid_parameter_noinfo_noreturn 21875->21886 21877->21816 21878->21816 21880->21856 21881->21853 21882->21861 21883->21868 21884->21870 21885->21875 21886->21872 21888 7ff6235d9c0d 21887->21888 21901 7ff6235d9e00 21888->21901 21890 7ff6235d9f50 49 API calls 21891 7ff6235d9d0f 21890->21891 21891->21890 21892 7ff6235c765d MultiByteToWideChar MultiByteToWideChar 21891->21892 21892->21595 21893->21580 21894->21582 21895->21584 21896->21586 21897->21588 21898->21590 21899->21592 21902 7ff6235d9f45 21901->21902 21906 7ff6235d9e29 21901->21906 21916 7ff6235c61c0 49 API calls 21902->21916 21905 7ff6235ddfb8 std::_Facet_Register 49 API calls 21913 7ff6235d9e74 memcpy_s 21905->21913 21907 7ff6235d9e81 21906->21907 21908 7ff6235d9ebd 21906->21908 21906->21913 21907->21905 21909 7ff6235d9f3f 21907->21909 21910 7ff6235ddfb8 std::_Facet_Register 49 API calls 21908->21910 21915 7ff6235c19d0 49 API calls 2 library calls 21909->21915 21910->21913 21911 7ff6235e3ff8 _invalid_parameter_noinfo_noreturn 47 API calls 21911->21909 21913->21911 21914 7ff6235d9f07 memcpy_s 21913->21914 21914->21891 21915->21902 21918 7ff6235c167e 21917->21918 21919 7ff6235c1686 21917->21919 21918->21620 21920 7ff6235c16ac VirtualAlloc 21919->21920 21921 7ff6235c16d6 memcpy_s 21920->21921 21922 7ff6235c1704 21921->21922 21923 7ff6235c16f6 VirtualFree 21921->21923 21922->21620 21923->21922 21925 7ff6235c152a 21924->21925 21926 7ff6235c155b VirtualAlloc 21925->21926 21928 7ff6235c15b5 memcpy_s 21925->21928 21927 7ff6235c1587 memcpy_s 21926->21927 21927->21928 21929 7ff6235c15a7 VirtualFree 21927->21929 21928->21624 21929->21928 21931 7ff6235c174b 21930->21931 21932 7ff6235c17fb 21931->21932 21933 7ff6235c177c VirtualAlloc 21931->21933 21932->21630 21934 7ff6235c17a8 memcpy_s 21933->21934 21935 7ff6235c17be VirtualFree 21934->21935 21935->21630 21936->21399 22506 7ff6235f15d8 FreeLibrary 22416 7ff6235ceff2 187 API calls 22417 7ff6235c3ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22418 7ff6235f73ec 54 API calls 5 library calls 22508 7ff6235f09e8 12 API calls 22419 7ff6235ce3e9 14 API calls 22378 7ff6235de0c4 48 API calls 2 library calls 22422 7ff6235cbfc0 GdipDisposeImage GdipFree 22461 7ff6235d12c0 HeapFree HeapDestroy HeapCreate HeapDestroy __std_exception_destroy 22510 7ff6235d1dc0 48 API calls 22511 7ff6235fd1bc 57 API calls 2 library calls 22424 7ff6235f5fd4 56 API calls 2 library calls 22382 7ff6235c18d0 47 API calls Concurrency::cancel_current_task 22383 7ff6235dc8d4 DeleteCriticalSection __std_exception_destroy 22513 7ff6235fedd0 DeleteDC DeleteDC DeleteDC DeleteDC 22384 7ff6235cbcd0 LCMapStringEx __crtLCMapStringW 22425 7ff6235cbbd0 GetStringTypeW 22514 7ff6235dd1d0 7 API calls __std_exception_destroy 22426 7ff6235ce3c7 ExitProcess 22466 7ff6235ce2c8 143 API calls memcpy_s

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 7ff6235c6370-7ff6235c63c4 call 7ff6235de600 call 7ff6235ddfb8 call 7ff6235fda50 7 7ff6235c63de-7ff6235c642c call 7ff6235fda50 gethostname gethostbyname 0->7 8 7ff6235c63c6-7ff6235c63d9 call 7ff6235e8a40 0->8 12 7ff6235c64cf-7ff6235c65b8 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 7->12 13 7ff6235c6432-7ff6235c647c inet_ntoa call 7ff6235e91f8 * 2 7->13 8->7 14 7ff6235c65be-7ff6235c65d1 GetProcAddress 12->14 15 7ff6235c66dc-7ff6235c6717 GetSystemInfo wsprintfW 12->15 13->12 29 7ff6235c647e 13->29 17 7ff6235c66d3-7ff6235c66d6 FreeLibrary 14->17 18 7ff6235c65d7-7ff6235c6665 call 7ff6235c3670 call 7ff6235ddff4 call 7ff6235c9300 14->18 19 7ff6235c6720-7ff6235c673f GetDriveTypeW 15->19 17->15 47 7ff6235c6667 18->47 48 7ff6235c666d-7ff6235c66a0 RegOpenKeyExW RegQueryValueExW 18->48 21 7ff6235c6741-7ff6235c6775 GetDiskFreeSpaceExW 19->21 22 7ff6235c6778-7ff6235c677d 19->22 21->22 22->19 25 7ff6235c677f-7ff6235c6822 GlobalMemoryStatusEx call 7ff6235c3670 * 2 call 7ff6235c8f60 GetForegroundWindow 22->25 45 7ff6235c6824-7ff6235c6834 GetWindowTextW 25->45 46 7ff6235c683a-7ff6235c687d lstrlenW call 7ff6235c8e30 25->46 32 7ff6235c6480-7ff6235c64cd inet_ntoa call 7ff6235e91f8 * 2 29->32 32->12 45->46 56 7ff6235c687f-7ff6235c689d GetLocalTime wsprintfW 46->56 57 7ff6235c68a3-7ff6235c68e2 call 7ff6235e8a40 lstrlenW call 7ff6235c8e30 46->57 47->48 49 7ff6235c66c0-7ff6235c66ce RegCloseKey call 7ff6235ddf84 48->49 50 7ff6235c66a2-7ff6235c66a4 48->50 49->17 50->49 52 7ff6235c66a6-7ff6235c66bb call 7ff6235e94e8 50->52 52->49 56->57 62 7ff6235c68e4-7ff6235c68f3 call 7ff6235e8a40 57->62 63 7ff6235c68f8-7ff6235c692b GetModuleHandleW GetProcAddress 57->63 62->63 65 7ff6235c6931 GetSystemInfo 63->65 66 7ff6235c692d-7ff6235c692f GetNativeSystemInfo 63->66 67 7ff6235c6937-7ff6235c6943 65->67 66->67 68 7ff6235c6951 67->68 69 7ff6235c6945-7ff6235c694f 67->69 70 7ff6235c6956-7ff6235c6996 wsprintfW call 7ff6235c8c30 GetCurrentProcessId 68->70 69->68 69->70 73 7ff6235c6ade-7ff6235c6b0f CoInitializeEx CoCreateInstance 70->73 74 7ff6235c699c-7ff6235c69b7 OpenProcess 70->74 75 7ff6235c6c0f 73->75 76 7ff6235c6b15-7ff6235c6b2a 73->76 77 7ff6235c6ad7 74->77 78 7ff6235c69bd-7ff6235c69d5 K32GetProcessImageFileNameW 74->78 81 7ff6235c6c16-7ff6235c6c6f call 7ff6235e8a40 call 7ff6235fda50 RegOpenKeyExW 75->81 83 7ff6235c6b30-7ff6235c6b32 76->83 77->73 79 7ff6235c6ace-7ff6235c6ad1 CloseHandle 78->79 80 7ff6235c69db-7ff6235c69ef GetLogicalDriveStringsW 78->80 79->77 84 7ff6235c6abe-7ff6235c6ac8 lstrcpyW 80->84 85 7ff6235c69f5-7ff6235c69fe 80->85 95 7ff6235c6c75-7ff6235c6ccf RegQueryInfoKeyW 81->95 96 7ff6235c6dd2-7ff6235c6de2 lstrlenW 81->96 83->75 87 7ff6235c6b38-7ff6235c6b65 83->87 84->79 85->84 88 7ff6235c6a04-7ff6235c6a0b 85->88 106 7ff6235c6bfe-7ff6235c6c0d CoUninitialize 87->106 107 7ff6235c6b6b 87->107 90 7ff6235c6a10-7ff6235c6a30 lstrcmpiW 88->90 93 7ff6235c6aae-7ff6235c6ab8 90->93 94 7ff6235c6a32-7ff6235c6a44 lstrcmpiW 90->94 93->84 93->90 94->93 97 7ff6235c6a46-7ff6235c6a7e QueryDosDeviceW 94->97 98 7ff6235c6cd5-7ff6235c6ce7 95->98 99 7ff6235c6e02-7ff6235c6efd call 7ff6235c7a60 call 7ff6235e94e8 GetTickCount call 7ff6235e8e3c call 7ff6235e91b0 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 95->99 96->99 100 7ff6235c6de4-7ff6235c6dfd call 7ff6235e94e8 96->100 97->79 102 7ff6235c6a80-7ff6235c6aa8 lstrlenW call 7ff6235e934c 97->102 98->96 103 7ff6235c6ced-7ff6235c6cf0 98->103 134 7ff6235c6eff-7ff6235c6f0b 99->134 135 7ff6235c6f36 99->135 100->99 102->93 113 7ff6235c6f0d-7ff6235c6f31 lstrcpyW lstrcatW 102->113 103->96 110 7ff6235c6cf6-7ff6235c6d0f call 7ff6235fda50 103->110 106->75 106->81 112 7ff6235c6b70-7ff6235c6b93 107->112 121 7ff6235c6d15 110->121 122 7ff6235c6dc7-7ff6235c6dcc RegCloseKey 110->122 119 7ff6235c6b95-7ff6235c6bb4 112->119 120 7ff6235c6bcd-7ff6235c6bf8 112->120 113->79 131 7ff6235c6bc2-7ff6235c6bc7 119->131 132 7ff6235c6bb6-7ff6235c6bbc SysFreeString 119->132 120->106 120->112 124 7ff6235c6d20-7ff6235c6d75 call 7ff6235fda50 RegEnumKeyExW lstrlenW 121->124 122->96 137 7ff6235c6db9-7ff6235c6dc1 124->137 138 7ff6235c6d77-7ff6235c6d87 lstrlenW 124->138 131->120 132->131 139 7ff6235c6f3b-7ff6235c6f8d call 7ff6235c72d0 lstrlenW call 7ff6235c8e30 134->139 135->139 137->122 137->124 138->137 140 7ff6235c6d89-7ff6235c6db4 call 7ff6235e8dc4 * 2 138->140 148 7ff6235c6f93-7ff6235c7016 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 139->148 149 7ff6235c7067-7ff6235c707b CreateToolhelp32Snapshot 139->149 140->137 150 7ff6235c7018-7ff6235c704b lstrlenW RegSetValueExW 148->150 151 7ff6235c705a-7ff6235c7061 RegCloseKey 148->151 152 7ff6235c7081-7ff6235c70b1 call 7ff6235fda50 Process32FirstW 149->152 153 7ff6235c7108 149->153 150->151 155 7ff6235c704d-7ff6235c7054 RegCloseKey 150->155 151->149 152->153 160 7ff6235c70b3-7ff6235c70ba 152->160 154 7ff6235c710a-7ff6235c7125 CreateToolhelp32Snapshot 153->154 158 7ff6235c71b8 154->158 159 7ff6235c712b-7ff6235c715b call 7ff6235fda50 Process32FirstW 154->159 155->151 161 7ff6235c71ba-7ff6235c71d5 CreateToolhelp32Snapshot 158->161 159->158 169 7ff6235c715d-7ff6235c7168 159->169 163 7ff6235c70c0-7ff6235c70cf 160->163 164 7ff6235c727f-7ff6235c7299 call 7ff6235c3e30 161->164 165 7ff6235c71db-7ff6235c720b call 7ff6235fda50 Process32FirstW 161->165 167 7ff6235c70d0-7ff6235c70da 163->167 170 7ff6235c729c-7ff6235c72c0 call 7ff6235ddf84 164->170 165->164 178 7ff6235c720d-7ff6235c7218 165->178 171 7ff6235c70f4-7ff6235c7106 Process32NextW 167->171 172 7ff6235c70dc-7ff6235c70e4 167->172 174 7ff6235c7170-7ff6235c717e 169->174 171->153 171->163 176 7ff6235c7266-7ff6235c726b 172->176 177 7ff6235c70ea-7ff6235c70f2 172->177 179 7ff6235c7180-7ff6235c718a 174->179 176->154 177->167 177->171 181 7ff6235c7220-7ff6235c722e 178->181 182 7ff6235c71a4-7ff6235c71b6 Process32NextW 179->182 183 7ff6235c718c-7ff6235c7194 179->183 186 7ff6235c7230-7ff6235c723a 181->186 182->158 182->174 184 7ff6235c7270-7ff6235c7275 183->184 185 7ff6235c719a-7ff6235c71a2 183->185 184->161 185->179 185->182 187 7ff6235c7250-7ff6235c7262 Process32NextW 186->187 188 7ff6235c723c-7ff6235c7244 186->188 187->181 191 7ff6235c7264 187->191 189 7ff6235c7246-7ff6235c724e 188->189 190 7ff6235c727a 188->190 189->186 189->187 190->164 191->164
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
      • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $02e6e16e-c851-4d99-a47c-2e46c0c70650$A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$kernel32.dll$ntdll.dll$x64$x86
      • API String ID: 4136965836-3200011401
      • Opcode ID: b17bfef3c5afee729e7b4b2efb39d02ac95a7c3167d527ac3f9fa9ca5236cf69
      • Instruction ID: 64a839dd9fe7419d2199685663a746d62281941a30d6dfd23e3d3a5e7563891d
      • Opcode Fuzzy Hash: b17bfef3c5afee729e7b4b2efb39d02ac95a7c3167d527ac3f9fa9ca5236cf69
      • Instruction Fuzzy Hash: 97925F36A08B8286EF20DF25DC456E923A4FB85758F844172DE4EA7BA4EF3CD645C701

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 193 7ff6235db5e0-7ff6235db621 call 7ff6235e9ebc SleepEx 196 7ff6235db653-7ff6235db65a 193->196 197 7ff6235db623-7ff6235db64d call 7ff6235ddfb8 call 7ff6235e8be0 CloseHandle 193->197 199 7ff6235db72f-7ff6235db858 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff6235e8be0 CloseHandle call 7ff6235ddfb8 call 7ff6235c36e0 call 7ff6235ddfb8 call 7ff6235cb410 call 7ff6235dae60 AllocateAndInitializeSid 196->199 200 7ff6235db660-7ff6235db67d GetCurrentProcess OpenProcessToken 196->200 197->196 219 7ff6235db85a-7ff6235db872 CheckTokenMembership 199->219 220 7ff6235db888-7ff6235db88f 199->220 202 7ff6235db6d4-7ff6235db6f7 GetModuleHandleA GetProcAddress 200->202 203 7ff6235db67f-7ff6235db6ce LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 200->203 202->199 206 7ff6235db6f9-7ff6235db72a GetCurrentProcessId OpenProcess 202->206 203->202 206->199 221 7ff6235db874 219->221 222 7ff6235db87b-7ff6235db882 FreeSid 219->222 223 7ff6235db891-7ff6235db906 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 220->223 224 7ff6235db90c 220->224 221->222 222->220 223->224 225 7ff6235db913-7ff6235db926 224->225 226 7ff6235db954-7ff6235db978 call 7ff6235e8a40 * 2 225->226 227 7ff6235db928-7ff6235db952 call 7ff6235e8a40 * 2 225->227 236 7ff6235db97e-7ff6235db9a7 226->236 227->236 237 7ff6235db9ec-7ff6235db9f6 236->237 238 7ff6235db9a9-7ff6235db9e5 call 7ff6235e8a40 * 2 236->238 239 7ff6235dba06-7ff6235dba5b call 7ff6235e9ebc SleepEx call 7ff6235e9ebc call 7ff6235c3820 237->239 240 7ff6235db9f8-7ff6235dba00 237->240 238->237 239->225 251 7ff6235dba61-7ff6235dbb25 call 7ff6235e9ebc CreateEventA call 7ff6235e8a40 call 7ff6235c6370 239->251 240->239 258 7ff6235dbb2a-7ff6235dbb2d 251->258 259 7ff6235dbb2f-7ff6235dbb3b 258->259 260 7ff6235dbb3d 258->260 265 7ff6235dbb8b-7ff6235dbba1 259->265 261 7ff6235dbb40-7ff6235dbb47 260->261 263 7ff6235dbb72-7ff6235dbb79 261->263 264 7ff6235dbb49-7ff6235dbb59 Sleep 261->264 267 7ff6235dbb7f-7ff6235dbb8a Sleep 263->267 264->261 266 7ff6235dbb5b-7ff6235dbb62 264->266 268 7ff6235dbba3-7ff6235dbbbb 265->268 269 7ff6235dbbe9-7ff6235dbbf8 CloseHandle 265->269 266->263 270 7ff6235dbb64-7ff6235dbb70 266->270 267->265 271 7ff6235dbbd2-7ff6235dbbe2 call 7ff6235ddf84 268->271 272 7ff6235dbbbd-7ff6235dbbd0 268->272 269->225 270->267 271->269 272->271 273 7ff6235dbbfd-7ff6235dbc24 call 7ff6235e3ff8 IsDebuggerPresent 272->273 279 7ff6235dbc31-7ff6235dbc54 LoadLibraryW 273->279 280 7ff6235dbc26-7ff6235dbc30 273->280 281 7ff6235dbc60-7ff6235dbc7e GetProcAddress 279->281 282 7ff6235dbc56-7ff6235dbc5b 279->282 283 7ff6235dbc93-7ff6235dbd45 call 7ff6235fda50 GetLocalTime wsprintfW CreateFileW 281->283 284 7ff6235dbc80-7ff6235dbc8e FreeLibrary 281->284 285 7ff6235dbdce-7ff6235dbde8 282->285 289 7ff6235dbd55-7ff6235dbdb0 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 283->289 290 7ff6235dbd47-7ff6235dbd53 FreeLibrary 283->290 286 7ff6235dbdc6 284->286 286->285 291 7ff6235dbdb6-7ff6235dbdbe 289->291 290->291 291->286
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressCurrentFreeLibraryProc$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturnwsprintf
      • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$192.238.134.113$192.238.134.113$192.238.134.113$192.238.134.113$4433$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
      • API String ID: 2641691789-2327769729
      • Opcode ID: ff9f3d62963463a023575eae3f258ff63909172a07c88f7eb98f74ee8f8a178a
      • Instruction ID: 52af0123853e0578524daec42930afbace95883ac0e6498538a515f30cba174b
      • Opcode Fuzzy Hash: ff9f3d62963463a023575eae3f258ff63909172a07c88f7eb98f74ee8f8a178a
      • Instruction Fuzzy Hash: 31225E72A08B828AFF60DF25EC462A973A5FB89754F400275D98DA7BA4DF3CD144D702

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 294 7ff6235cf410-7ff6235cf49f call 7ff6235ddfb8 call 7ff6235fda50 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 299 7ff6235cf4b4-7ff6235cf4d6 CreateToolhelp32Snapshot 294->299 300 7ff6235cf4a1-7ff6235cf4ae GetWindowTextW 294->300 301 7ff6235cf555 299->301 302 7ff6235cf4d8-7ff6235cf4ff call 7ff6235fda50 Process32FirstW 299->302 300->299 303 7ff6235cf557-7ff6235cf571 CreateToolhelp32Snapshot 301->303 302->301 308 7ff6235cf501-7ff6235cf508 302->308 305 7ff6235cf577-7ff6235cf5a7 call 7ff6235fda50 Process32FirstW 303->305 306 7ff6235cf5f8 303->306 305->306 317 7ff6235cf5a9 305->317 309 7ff6235cf5fa-7ff6235cf614 CreateToolhelp32Snapshot 306->309 311 7ff6235cf510-7ff6235cf517 308->311 312 7ff6235cf61a-7ff6235cf64a call 7ff6235fda50 Process32FirstW 309->312 313 7ff6235cf6a8 309->313 315 7ff6235cf520-7ff6235cf52a 311->315 312->313 327 7ff6235cf64c-7ff6235cf657 312->327 318 7ff6235cf6aa-7ff6235cf6f4 RegOpenKeyExW 313->318 319 7ff6235cf544-7ff6235cf553 Process32NextW 315->319 320 7ff6235cf52c-7ff6235cf534 315->320 322 7ff6235cf5b0-7ff6235cf5ba 317->322 323 7ff6235cf913-7ff6235cf94b RegOpenKeyExW 318->323 324 7ff6235cf6fa-7ff6235cf72e RegQueryValueExW 318->324 319->301 319->311 325 7ff6235cf7f2-7ff6235cf7f4 320->325 326 7ff6235cf53a-7ff6235cf542 320->326 330 7ff6235cf5c0-7ff6235cf5ca 322->330 328 7ff6235cf9f2-7ff6235cfa2a RegOpenKeyExW 323->328 329 7ff6235cf951-7ff6235cf984 RegQueryValueExW 323->329 331 7ff6235cf734-7ff6235cf78b call 7ff6235ddff4 call 7ff6235fda50 RegQueryValueExW 324->331 332 7ff6235cf908-7ff6235cf90d RegCloseKey 324->332 325->303 326->315 326->319 336 7ff6235cf660-7ff6235cf66a 327->336 334 7ff6235cfa30-7ff6235cfa63 RegQueryValueExW 328->334 335 7ff6235cfad1-7ff6235cfb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 328->335 337 7ff6235cf986-7ff6235cf9dd call 7ff6235ddff4 call 7ff6235fda50 RegQueryValueExW 329->337 338 7ff6235cf9e7-7ff6235cf9ec RegCloseKey 329->338 339 7ff6235cf5e4-7ff6235cf5f6 Process32NextW 330->339 340 7ff6235cf5cc-7ff6235cf5d4 330->340 331->332 364 7ff6235cf791-7ff6235cf7b9 call 7ff6235d1310 331->364 332->323 342 7ff6235cfa65-7ff6235cfabc call 7ff6235ddff4 call 7ff6235fda50 RegQueryValueExW 334->342 343 7ff6235cfac6-7ff6235cfacb RegCloseKey 334->343 345 7ff6235cfb91-7ff6235cfbdc FindClose call 7ff6235cfd10 335->345 346 7ff6235cfb89 335->346 344 7ff6235cf670-7ff6235cf67a 336->344 337->338 367 7ff6235cf9df 337->367 338->328 339->306 339->322 348 7ff6235cf5da-7ff6235cf5e2 340->348 349 7ff6235cf7f9-7ff6235cf7fb 340->349 342->343 374 7ff6235cfabe 342->374 343->335 352 7ff6235cf694-7ff6235cf6a6 Process32NextW 344->352 353 7ff6235cf67c-7ff6235cf684 344->353 362 7ff6235cfbde-7ff6235cfbe2 345->362 363 7ff6235cfbf8-7ff6235cfc20 call 7ff6235ddff4 345->363 346->345 348->330 348->339 349->309 352->313 352->336 358 7ff6235cf800-7ff6235cf802 353->358 359 7ff6235cf68a-7ff6235cf692 353->359 358->318 359->344 359->352 362->363 368 7ff6235cfbe4-7ff6235cfbf1 362->368 375 7ff6235cfc23-7ff6235cfc7c 363->375 376 7ff6235cf845-7ff6235cf855 364->376 377 7ff6235cf7bf-7ff6235cf7ca 364->377 367->338 368->363 374->343 375->375 380 7ff6235cfc7e-7ff6235cfcac call 7ff6235fd3b0 375->380 378 7ff6235cf8cd-7ff6235cf8d1 376->378 379 7ff6235cf857-7ff6235cf85e 376->379 381 7ff6235cf7d0-7ff6235cf7d9 377->381 378->332 382 7ff6235cf8d3-7ff6235cf8e5 378->382 383 7ff6235cf862-7ff6235cf86b 379->383 394 7ff6235cfcbe-7ff6235cfcc1 380->394 395 7ff6235cfcae-7ff6235cfcbb call 7ff6235c3e30 380->395 381->376 385 7ff6235cf7db 381->385 386 7ff6235cf900-7ff6235cf903 call 7ff6235ddf84 382->386 387 7ff6235cf8e7-7ff6235cf8fa 382->387 383->378 388 7ff6235cf86d 383->388 390 7ff6235cf7e0-7ff6235cf7e4 385->390 386->332 387->386 391 7ff6235cfcfe-7ff6235cfd03 call 7ff6235e3ff8 387->391 393 7ff6235cf870-7ff6235cf874 388->393 396 7ff6235cf7e6-7ff6235cf7ee 390->396 397 7ff6235cf807-7ff6235cf80a 390->397 400 7ff6235cf88b-7ff6235cf88e 393->400 401 7ff6235cf876-7ff6235cf87e 393->401 403 7ff6235cfcc3-7ff6235cfcc6 call 7ff6235ddf84 394->403 404 7ff6235cfccb-7ff6235cfcf4 call 7ff6235ddf84 394->404 395->394 396->390 402 7ff6235cf7f0 396->402 397->376 398 7ff6235cf80c-7ff6235cf81c 397->398 406 7ff6235cf820-7ff6235cf826 398->406 400->378 409 7ff6235cf890-7ff6235cf89d 400->409 401->393 408 7ff6235cf880 401->408 402->376 403->404 412 7ff6235cf882-7ff6235cf886 406->412 413 7ff6235cf828-7ff6235cf834 406->413 408->378 414 7ff6235cf8a0-7ff6235cf8a6 409->414 412->381 413->406 417 7ff6235cf836-7ff6235cf83f 413->417 415 7ff6235cfcf5-7ff6235cfcf9 414->415 416 7ff6235cf8ac-7ff6235cf8b8 414->416 415->383 416->414 418 7ff6235cf8ba-7ff6235cf8c3 416->418 417->376 419 7ff6235cf8c5 417->419 418->378 418->419 419->378
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
      • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
      • API String ID: 3029130142-1423135667
      • Opcode ID: 9bbdac635c2dd5f4b36431d8b351f7093702bbf9f8214aaf6c10cd77f9a08fa0
      • Instruction ID: 3de5db53bba82c63879b07807e861d89ca6f36632b0c661d0cbf228952e34240
      • Opcode Fuzzy Hash: 9bbdac635c2dd5f4b36431d8b351f7093702bbf9f8214aaf6c10cd77f9a08fa0
      • Instruction Fuzzy Hash: 4D329032A08B8682EF208F24D8066BD77A0FB85B88F445172DE5DB7A95EF7CE544C701
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$QueryValue$Open
      • String ID: 10443$192.238.134.113$192.238.134.113$192.238.134.113$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
      • API String ID: 1772312705-4199381161
      • Opcode ID: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
      • Instruction ID: 686b46c9b77c27b26eaf09e74544741afb666146166644165ca2e54244ab1be2
      • Opcode Fuzzy Hash: e9763d1a573506a6c5f52fab13ecf1f8c208e4fec7a72f7b0df219955d443a2f
      • Instruction Fuzzy Hash: 4022D161E18A6B82FE249B18EC5667D63A2FF95784F844071C94EF2A91EF7CE1458302

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 572 7ff6235c72d0-7ff6235c7326 573 7ff6235c7330-7ff6235c7339 572->573 573->573 574 7ff6235c733b-7ff6235c7344 573->574 575 7ff6235c7362-7ff6235c7367 call 7ff6235ca300 574->575 576 7ff6235c7346-7ff6235c7360 call 7ff6235fd3b0 574->576 579 7ff6235c736c 575->579 576->579 581 7ff6235c7373-7ff6235c737b 579->581 581->581 582 7ff6235c737d-7ff6235c7390 581->582 583 7ff6235c73c5-7ff6235c73d5 call 7ff6235ca300 582->583 584 7ff6235c7392-7ff6235c73c3 call 7ff6235fd3b0 582->584 588 7ff6235c73da 583->588 584->588 589 7ff6235c73e1-7ff6235c73ea 588->589 589->589 590 7ff6235c73ec-7ff6235c73ff 589->590 591 7ff6235c7401-7ff6235c7432 call 7ff6235fd3b0 590->591 592 7ff6235c7434-7ff6235c7444 call 7ff6235ca300 590->592 595 7ff6235c7449-7ff6235c744d 591->595 592->595 597 7ff6235c7454-7ff6235c745d 595->597 597->597 598 7ff6235c745f-7ff6235c7472 597->598 599 7ff6235c7474-7ff6235c74a5 call 7ff6235fd3b0 598->599 600 7ff6235c74a7-7ff6235c74b4 call 7ff6235ca300 598->600 604 7ff6235c74b9-7ff6235c74cd 599->604 600->604 605 7ff6235c74cf-7ff6235c7503 call 7ff6235fd3b0 604->605 606 7ff6235c7505-7ff6235c751f call 7ff6235ca300 604->606 609 7ff6235c7524-7ff6235c752f 605->609 606->609 611 7ff6235c7530-7ff6235c7539 609->611 611->611 612 7ff6235c753b-7ff6235c754e 611->612 613 7ff6235c7550-7ff6235c7581 call 7ff6235fd3b0 612->613 614 7ff6235c7583-7ff6235c7590 call 7ff6235ca300 612->614 618 7ff6235c7595-7ff6235c7599 613->618 614->618 619 7ff6235c75a0-7ff6235c75a9 618->619 619->619 620 7ff6235c75ab-7ff6235c75be 619->620 621 7ff6235c75c0-7ff6235c75f1 call 7ff6235fd3b0 620->621 622 7ff6235c75f3-7ff6235c7600 call 7ff6235ca300 620->622 625 7ff6235c7605-7ff6235c76b4 call 7ff6235d9250 call 7ff6235d9be0 MultiByteToWideChar * 2 621->625 622->625 631 7ff6235c76e3-7ff6235c76fd 625->631 632 7ff6235c76b6-7ff6235c76c7 625->632 635 7ff6235c76ff-7ff6235c7716 631->635 636 7ff6235c7732-7ff6235c7752 631->636 633 7ff6235c76de call 7ff6235ddf84 632->633 634 7ff6235c76c9-7ff6235c76dc 632->634 633->631 634->633 637 7ff6235c7759-7ff6235c7797 call 7ff6235e3ff8 CreateMutexExW GetLastError 634->637 639 7ff6235c7718-7ff6235c772b 635->639 640 7ff6235c772d call 7ff6235ddf84 635->640 647 7ff6235c77c9-7ff6235c77d0 637->647 648 7ff6235c7799 637->648 639->640 642 7ff6235c7753-7ff6235c7758 call 7ff6235e3ff8 639->642 640->636 642->637 650 7ff6235c7870-7ff6235c7922 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 647->650 651 7ff6235c77d6 647->651 649 7ff6235c77a0-7ff6235c77c7 Sleep CreateMutexW GetLastError 648->649 649->647 649->649 653 7ff6235c7924-7ff6235c7927 DeleteFileW 650->653 654 7ff6235c792d-7ff6235c795d ReleaseMutex DirectInput8Create 650->654 652 7ff6235c77e0-7ff6235c7840 lstrlenW call 7ff6235c8e30 651->652 660 7ff6235c7842-7ff6235c7856 lstrcmpW 652->660 661 7ff6235c7858-7ff6235c786a SleepEx 652->661 653->654 655 7ff6235c7a00-7ff6235c7a1e 654->655 656 7ff6235c7963-7ff6235c7983 654->656 656->655 662 7ff6235c7985-7ff6235c799b 656->662 660->650 660->661 661->650 661->652 662->655 664 7ff6235c799d-7ff6235c79b5 662->664 664->655 666 7ff6235c79b7-7ff6235c79ed 664->666 666->655 668 7ff6235c79ef-7ff6235c79fe 666->668 668->655 670 7ff6235c7a1f-7ff6235c7a51 GetTickCount GetKeyState call 7ff6235cadb0 668->670
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
      • String ID: <$X64$\DisplaySessionContainers.log$key$open
      • API String ID: 143101810-941791203
      • Opcode ID: f76fe1e3af8c1626c0839f141aa352af69c2a58d8fadc86e79eac3175ccb6e0d
      • Instruction ID: 39c31376b0c3e8e2a36275624bf87bc77f7002adaaf4fdaf503de51bea22027b
      • Opcode Fuzzy Hash: f76fe1e3af8c1626c0839f141aa352af69c2a58d8fadc86e79eac3175ccb6e0d
      • Instruction Fuzzy Hash: BD22C632A18B8296EF10DB25E8012AE73A5FB85B98F504271DE9DA3BD8DF3CD144C741

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 673 7ff6235cfd10-7ff6235cfda8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 674 7ff6235cfdbe-7ff6235cfddc GetSystemMetrics 673->674 675 7ff6235cfdaa-7ff6235cfdb9 673->675 677 7ff6235cfdde-7ff6235cfe26 GetSystemMetrics 674->677 678 7ff6235cfe28-7ff6235cfe43 GetSystemMetrics 674->678 676 7ff6235cfe47-7ff6235d0083 GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff6235ddff4 call 7ff6235fda50 GetDIBits call 7ff6235ddff4 call 7ff6235fda50 call 7ff6235fd3b0 call 7ff6235ddfb8 call 7ff6235d0220 675->676 693 7ff6235d011c-7ff6235d014c call 7ff6235ddff4 676->693 694 7ff6235d0089-7ff6235d00c3 DeleteObject * 2 ReleaseDC call 7ff6235ddf84 * 2 676->694 677->676 678->676 699 7ff6235d014e 693->699 700 7ff6235d0151-7ff6235d0182 call 7ff6235fd3b0 DeleteObject * 2 ReleaseDC call 7ff6235ddf84 693->700 705 7ff6235d00f5-7ff6235d0117 call 7ff6235ddf84 694->705 706 7ff6235d00c5-7ff6235d00d2 694->706 699->700 715 7ff6235d0187-7ff6235d0199 call 7ff6235ddf84 700->715 716 7ff6235d01ea-7ff6235d020c 705->716 709 7ff6235d00d4-7ff6235d00e7 706->709 710 7ff6235d00f0 call 7ff6235ddf84 706->710 711 7ff6235d020d-7ff6235d0212 call 7ff6235e3ff8 709->711 712 7ff6235d00ed 709->712 710->705 712->710 721 7ff6235d019b-7ff6235d01a8 715->721 722 7ff6235d01c7-7ff6235d01e7 call 7ff6235ddf84 715->722 723 7ff6235d01c2 call 7ff6235ddf84 721->723 724 7ff6235d01aa-7ff6235d01bd 721->724 722->716 723->722 724->711 726 7ff6235d01bf 724->726 726->723
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: MetricsObjectSystem$Delete$CreateCriticalGlobalSection$EnterRelease$BitmapCapsCompatibleConcurrency::cancel_current_taskDeviceGdipStreamStretch$AllocBitsDesktopDisposeFromGdiplusImageLeaveLockModeSelectShutdownUnlockWindow_invalid_parameter_noinfo_noreturn
      • String ID: $($6$gfff$gfff
      • API String ID: 1610826097-2922166585
      • Opcode ID: 2c18c53c0be2d662d746d61cea65be54ad576e71b11c79782397f3a75276bebe
      • Instruction ID: be32782cce5002f6afe2a8e24dbe6637e88ee32bf2efcafdbe7b91c303a7bd84
      • Opcode Fuzzy Hash: 2c18c53c0be2d662d746d61cea65be54ad576e71b11c79782397f3a75276bebe
      • Instruction Fuzzy Hash: 30D10672A1878582EB159F35E81636AB3A1FF8AB84F008235DE4EB7B55DF3CD4808741

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 729 7ff6235c8a40-7ff6235c8a6f GetCurrentProcessId OpenProcess 730 7ff6235c8a71-7ff6235c8a8e OpenProcessToken 729->730 731 7ff6235c8a99-7ff6235c8aae 729->731 732 7ff6235c8aaf-7ff6235c8ad7 call 7ff6235c8710 730->732 733 7ff6235c8a90-7ff6235c8a93 CloseHandle 730->733 736 7ff6235c8b0a 732->736 737 7ff6235c8ad9-7ff6235c8adf 732->737 733->731 740 7ff6235c8b0f-7ff6235c8b12 736->740 738 7ff6235c8ae1-7ff6235c8ae7 SysStringLen 737->738 739 7ff6235c8ae9 737->739 741 7ff6235c8aec-7ff6235c8aef 738->741 739->741 742 7ff6235c8b14-7ff6235c8b29 call 7ff6235ddfb8 740->742 743 7ff6235c8b4c-7ff6235c8b86 call 7ff6235fd3b0 CloseHandle * 2 740->743 741->736 745 7ff6235c8af1-7ff6235c8af7 741->745 753 7ff6235c8b3b 742->753 754 7ff6235c8b2b-7ff6235c8b39 742->754 751 7ff6235c8bce-7ff6235c8bd6 743->751 752 7ff6235c8b88-7ff6235c8b92 743->752 748 7ff6235c8b03-7ff6235c8b08 745->748 749 7ff6235c8af9-7ff6235c8b01 SysStringLen 745->749 748->740 749->740 758 7ff6235c8c0d-7ff6235c8c1f 751->758 759 7ff6235c8bd8-7ff6235c8be3 751->759 756 7ff6235c8b94-7ff6235c8b9f 752->756 757 7ff6235c8bc9 752->757 755 7ff6235c8b3e-7ff6235c8b46 753->755 754->755 755->743 762 7ff6235c8c20-7ff6235c8c99 call 7ff6235deca0 call 7ff6235ddff4 GetCurrentProcessId wsprintfW call 7ff6235c8a40 call 7ff6235fda50 GetVersionExW 755->762 763 7ff6235c8ba1-7ff6235c8ba7 SysFreeString 756->763 764 7ff6235c8baa-7ff6235c8bb1 756->764 757->751 760 7ff6235c8be5-7ff6235c8beb SysFreeString 759->760 761 7ff6235c8bee-7ff6235c8bf5 759->761 760->761 765 7ff6235c8c00-7ff6235c8c08 call 7ff6235ddf84 761->765 766 7ff6235c8bf7-7ff6235c8bfc call 7ff6235ddf84 761->766 784 7ff6235c8df2 762->784 785 7ff6235c8c9f-7ff6235c8ca4 762->785 763->764 767 7ff6235c8bb3-7ff6235c8bb8 call 7ff6235ddf84 764->767 768 7ff6235c8bbc-7ff6235c8bc4 call 7ff6235ddf84 764->768 765->758 766->765 767->768 768->757 786 7ff6235c8df9-7ff6235c8e03 wsprintfW 784->786 785->784 787 7ff6235c8caa-7ff6235c8caf 785->787 788 7ff6235c8e09-7ff6235c8e20 call 7ff6235ddf84 786->788 787->784 789 7ff6235c8cb5-7ff6235c8cdb GetCurrentProcess OpenProcessToken 787->789 789->784 791 7ff6235c8ce1-7ff6235c8d10 GetTokenInformation 789->791 792 7ff6235c8d9c-7ff6235c8dac CloseHandle 791->792 793 7ff6235c8d16-7ff6235c8d1f GetLastError 791->793 792->784 796 7ff6235c8dae-7ff6235c8db4 792->796 793->792 795 7ff6235c8d21-7ff6235c8d41 LocalAlloc 793->795 797 7ff6235c8d43-7ff6235c8d70 GetTokenInformation 795->797 798 7ff6235c8d94 795->798 799 7ff6235c8db6-7ff6235c8dbc 796->799 800 7ff6235c8de9-7ff6235c8df0 796->800 801 7ff6235c8d72-7ff6235c8d89 GetSidSubAuthorityCount GetSidSubAuthority 797->801 802 7ff6235c8d8b-7ff6235c8d8e LocalFree 797->802 798->792 803 7ff6235c8dbe-7ff6235c8dc4 799->803 804 7ff6235c8de0-7ff6235c8de7 799->804 800->786 801->802 802->798 805 7ff6235c8dc6-7ff6235c8dcc 803->805 806 7ff6235c8dd7-7ff6235c8dde 803->806 804->786 805->788 807 7ff6235c8dce-7ff6235c8dd5 805->807 806->786 807->786
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$CloseHandleStringToken$CurrentFreeOpen$AuthorityInformationLocalwsprintf$AllocCountErrorLastVersion
      • String ID: -N/$NO/$None/%s$VenNetwork
      • API String ID: 166307840-819860926
      • Opcode ID: 2f4f0c352e8847fd7525cd0cddb264fb330a96b85be20a458fd84ca8cfda45ef
      • Instruction ID: c41c82ae0b7f3832ca3d526d94d224b7f01351da65ba0c7906f5702b66d02c30
      • Opcode Fuzzy Hash: 2f4f0c352e8847fd7525cd0cddb264fb330a96b85be20a458fd84ca8cfda45ef
      • Instruction Fuzzy Hash: FEB15E36A0974282FE209B21EC522B963A4FF85B88F044875DE4EB7B94DF3CE445D742

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 962 7ff6235c8710-7ff6235c874e 963 7ff6235c8755-7ff6235c8772 call 7ff6235c6300 call 7ff6235ddfb8 962->963 964 7ff6235c8750-7ff6235c8753 962->964 977 7ff6235c8774-7ff6235c878e SysAllocString 963->977 978 7ff6235c8796 963->978 964->963 965 7ff6235c87a5-7ff6235c87ab 964->965 967 7ff6235c87b2-7ff6235c87cf call 7ff6235c6300 call 7ff6235ddfb8 965->967 968 7ff6235c87ad-7ff6235c87b0 965->968 995 7ff6235c87f3 967->995 996 7ff6235c87d1-7ff6235c87eb SysAllocString 967->996 968->967 970 7ff6235c8802-7ff6235c8808 968->970 973 7ff6235c880e-7ff6235c8831 GetTokenInformation 970->973 974 7ff6235c89ff 970->974 979 7ff6235c8833-7ff6235c883c GetLastError 973->979 980 7ff6235c886c-7ff6235c8894 GetTokenInformation 973->980 988 7ff6235c8a06-7ff6235c8a10 call 7ff6235deca0 974->988 982 7ff6235c8794 977->982 983 7ff6235c8a11-7ff6235c8a1b call 7ff6235deca0 977->983 985 7ff6235c8799-7ff6235c879f 978->985 979->974 984 7ff6235c8842-7ff6235c8866 GetProcessHeap HeapAlloc 979->984 986 7ff6235c889a-7ff6235c88d2 LookupAccountSidW 980->986 987 7ff6235c89e6-7ff6235c89e9 980->987 982->985 1004 7ff6235c8a1c-7ff6235c8a26 call 7ff6235deca0 983->1004 984->974 984->980 985->965 985->988 991 7ff6235c88d4-7ff6235c88df GetLastError 986->991 992 7ff6235c891b-7ff6235c8921 986->992 987->974 990 7ff6235c89eb-7ff6235c89f9 GetProcessHeap HeapFree 987->990 988->983 990->974 997 7ff6235c88e1-7ff6235c88f7 call 7ff6235e8a40 991->997 998 7ff6235c88fc-7ff6235c891a 991->998 1001 7ff6235c8923-7ff6235c892b 992->1001 1002 7ff6235c892d-7ff6235c894a call 7ff6235c6300 call 7ff6235ddfb8 992->1002 1005 7ff6235c87f6-7ff6235c87fc 995->1005 1003 7ff6235c87f1 996->1003 996->1004 997->987 1001->1002 1007 7ff6235c897f-7ff6235c8985 1001->1007 1023 7ff6235c8970 1002->1023 1024 7ff6235c894c-7ff6235c8968 SysAllocString 1002->1024 1003->1005 1017 7ff6235c8a27-7ff6235c8a31 call 7ff6235deca0 1004->1017 1005->970 1005->988 1010 7ff6235c8994-7ff6235c89b1 call 7ff6235c6300 call 7ff6235ddfb8 1007->1010 1011 7ff6235c8987-7ff6235c8992 1007->1011 1031 7ff6235c89b3-7ff6235c89d2 SysAllocString 1010->1031 1032 7ff6235c89d6 1010->1032 1011->1010 1015 7ff6235c89e1 1011->1015 1015->987 1026 7ff6235c8a32-7ff6235c8a6f call 7ff6235deca0 GetCurrentProcessId OpenProcess 1017->1026 1028 7ff6235c8973-7ff6235c8979 1023->1028 1024->1017 1027 7ff6235c896e 1024->1027 1037 7ff6235c8a71-7ff6235c8a8e OpenProcessToken 1026->1037 1038 7ff6235c8a99-7ff6235c8aae 1026->1038 1027->1028 1028->988 1028->1007 1031->1026 1034 7ff6235c89d4 1031->1034 1035 7ff6235c89d9-7ff6235c89df 1032->1035 1034->1035 1035->988 1035->1015 1039 7ff6235c8aaf-7ff6235c8ad7 call 7ff6235c8710 1037->1039 1040 7ff6235c8a90-7ff6235c8a93 CloseHandle 1037->1040 1043 7ff6235c8b0a 1039->1043 1044 7ff6235c8ad9-7ff6235c8adf 1039->1044 1040->1038 1047 7ff6235c8b0f-7ff6235c8b12 1043->1047 1045 7ff6235c8ae1-7ff6235c8ae7 SysStringLen 1044->1045 1046 7ff6235c8ae9 1044->1046 1048 7ff6235c8aec-7ff6235c8aef 1045->1048 1046->1048 1049 7ff6235c8b14-7ff6235c8b29 call 7ff6235ddfb8 1047->1049 1050 7ff6235c8b4c-7ff6235c8b86 call 7ff6235fd3b0 CloseHandle * 2 1047->1050 1048->1043 1052 7ff6235c8af1-7ff6235c8af7 1048->1052 1060 7ff6235c8b3b 1049->1060 1061 7ff6235c8b2b-7ff6235c8b39 1049->1061 1058 7ff6235c8bce-7ff6235c8bd6 1050->1058 1059 7ff6235c8b88-7ff6235c8b92 1050->1059 1055 7ff6235c8b03-7ff6235c8b08 1052->1055 1056 7ff6235c8af9-7ff6235c8b01 SysStringLen 1052->1056 1055->1047 1056->1047 1065 7ff6235c8c0d-7ff6235c8c1f 1058->1065 1066 7ff6235c8bd8-7ff6235c8be3 1058->1066 1063 7ff6235c8b94-7ff6235c8b9f 1059->1063 1064 7ff6235c8bc9 1059->1064 1062 7ff6235c8b3e-7ff6235c8b46 1060->1062 1061->1062 1062->1050 1069 7ff6235c8c20-7ff6235c8c99 call 7ff6235deca0 call 7ff6235ddff4 GetCurrentProcessId wsprintfW call 7ff6235c8a40 call 7ff6235fda50 GetVersionExW 1062->1069 1070 7ff6235c8ba1-7ff6235c8ba7 SysFreeString 1063->1070 1071 7ff6235c8baa-7ff6235c8bb1 1063->1071 1064->1058 1067 7ff6235c8be5-7ff6235c8beb SysFreeString 1066->1067 1068 7ff6235c8bee-7ff6235c8bf5 1066->1068 1067->1068 1072 7ff6235c8c00-7ff6235c8c08 call 7ff6235ddf84 1068->1072 1073 7ff6235c8bf7-7ff6235c8bfc call 7ff6235ddf84 1068->1073 1091 7ff6235c8df2 1069->1091 1092 7ff6235c8c9f-7ff6235c8ca4 1069->1092 1070->1071 1074 7ff6235c8bb3-7ff6235c8bb8 call 7ff6235ddf84 1071->1074 1075 7ff6235c8bbc-7ff6235c8bc4 call 7ff6235ddf84 1071->1075 1072->1065 1073->1072 1074->1075 1075->1064 1093 7ff6235c8df9-7ff6235c8e03 wsprintfW 1091->1093 1092->1091 1094 7ff6235c8caa-7ff6235c8caf 1092->1094 1095 7ff6235c8e09-7ff6235c8e20 call 7ff6235ddf84 1093->1095 1094->1091 1096 7ff6235c8cb5-7ff6235c8cdb GetCurrentProcess OpenProcessToken 1094->1096 1096->1091 1098 7ff6235c8ce1-7ff6235c8d10 GetTokenInformation 1096->1098 1099 7ff6235c8d9c-7ff6235c8dac CloseHandle 1098->1099 1100 7ff6235c8d16-7ff6235c8d1f GetLastError 1098->1100 1099->1091 1103 7ff6235c8dae-7ff6235c8db4 1099->1103 1100->1099 1102 7ff6235c8d21-7ff6235c8d41 LocalAlloc 1100->1102 1104 7ff6235c8d43-7ff6235c8d70 GetTokenInformation 1102->1104 1105 7ff6235c8d94 1102->1105 1106 7ff6235c8db6-7ff6235c8dbc 1103->1106 1107 7ff6235c8de9-7ff6235c8df0 1103->1107 1108 7ff6235c8d72-7ff6235c8d89 GetSidSubAuthorityCount GetSidSubAuthority 1104->1108 1109 7ff6235c8d8b-7ff6235c8d8e LocalFree 1104->1109 1105->1099 1110 7ff6235c8dbe-7ff6235c8dc4 1106->1110 1111 7ff6235c8de0-7ff6235c8de7 1106->1111 1107->1093 1108->1109 1109->1105 1112 7ff6235c8dc6-7ff6235c8dcc 1110->1112 1113 7ff6235c8dd7-7ff6235c8dde 1110->1113 1111->1093 1112->1095 1114 7ff6235c8dce-7ff6235c8dd5 1112->1114 1113->1093 1114->1093
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AllocProcess$HeapString$Token$ErrorInformationLastOpen$AccountCloseCurrentFreeHandleLookup
      • String ID: NONE_MAPPED
      • API String ID: 1410310566-2950899194
      • Opcode ID: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
      • Instruction ID: 4e044e175b8f61479cb8a6838e549cd59e52653818d409b6018c2b2303d445ba
      • Opcode Fuzzy Hash: 153f7837cc86bcbbc492fb4a375331227a21e9cb239b2b2f7dd34d1ee50442fc
      • Instruction Fuzzy Hash: E6A17132609B4682FE659B11EC12279A2E4EF85B84F584875DE4DB7BD0EF3CE845C312

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1115 7ff6235c7a60-7ff6235c7aac call 7ff6235fda50 call 7ff6235dff40 1120 7ff6235c7ab2-7ff6235c7ac6 1115->1120 1121 7ff6235c7b7c-7ff6235c7ba7 CoCreateInstance 1115->1121 1124 7ff6235c7ad0-7ff6235c7af8 call 7ff6235fda50 CreateToolhelp32Snapshot 1120->1124 1122 7ff6235c7da1-7ff6235c7dac lstrlenW 1121->1122 1123 7ff6235c7bad-7ff6235c7bf9 1121->1123 1126 7ff6235c7dbf-7ff6235c7dc6 1122->1126 1127 7ff6235c7dae-7ff6235c7dbe lstrcatW 1122->1127 1132 7ff6235c7d8f-7ff6235c7d99 1123->1132 1133 7ff6235c7bff-7ff6235c7c1b 1123->1133 1134 7ff6235c7b56-7ff6235c7b76 call 7ff6235dff40 1124->1134 1135 7ff6235c7afa-7ff6235c7b10 Process32FirstW 1124->1135 1130 7ff6235c7dce-7ff6235c7de4 1126->1130 1131 7ff6235c7dc8 1126->1131 1127->1126 1131->1130 1132->1122 1137 7ff6235c7d9b 1132->1137 1133->1132 1143 7ff6235c7c21-7ff6235c7cdd call 7ff6235fda50 wsprintfW RegOpenKeyExW 1133->1143 1134->1121 1134->1124 1138 7ff6235c7b12-7ff6235c7b1c 1135->1138 1139 7ff6235c7b4d-7ff6235c7b50 CloseHandle 1135->1139 1137->1122 1142 7ff6235c7b20-7ff6235c7b2a 1138->1142 1139->1134 1144 7ff6235c7b34-7ff6235c7b39 1142->1144 1145 7ff6235c7b2c-7ff6235c7b32 1142->1145 1151 7ff6235c7ce3-7ff6235c7d3e call 7ff6235fda50 RegQueryValueExW 1143->1151 1152 7ff6235c7d6d-7ff6235c7d7f 1143->1152 1146 7ff6235c7b3f-7ff6235c7b4b Process32NextW 1144->1146 1147 7ff6235c7de5-7ff6235c7def CloseHandle 1144->1147 1145->1142 1145->1144 1146->1138 1146->1139 1147->1134 1149 7ff6235c7df5-7ff6235c7e13 lstrcatW * 2 1147->1149 1149->1134 1156 7ff6235c7d60-7ff6235c7d67 RegCloseKey 1151->1156 1157 7ff6235c7d40-7ff6235c7d5a lstrcatW * 2 1151->1157 1155 7ff6235c7d87-7ff6235c7d89 1152->1155 1155->1132 1155->1143 1156->1152 1157->1156
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
      • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
      • API String ID: 582347850-1583895642
      • Opcode ID: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
      • Instruction ID: 5c1f6858eda687d44cb501bed3fd5ca0ace5f0c13b8cd8d52797e7e95f14333e
      • Opcode Fuzzy Hash: 172064aca06d7bab2ac812725ebad370c198c4fa5686a0e3f00f667ec9231332
      • Instruction Fuzzy Hash: 49A18332A08B828AEB60CF35EC416AA77A1FB85B98F544171DE4DA7B98DF3CD544C701

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1205 7ff6235cb410-7ff6235cb451 CreateEventW 1206 7ff6235cb7b1-7ff6235cb7bb call 7ff6235c10f0 1205->1206 1207 7ff6235cb457-7ff6235cb4c6 call 7ff6235c1200 1205->1207 1212 7ff6235cb7bc-7ff6235cb7c6 call 7ff6235c10f0 1206->1212 1207->1212 1213 7ff6235cb4cc-7ff6235cb51b HeapCreate 1207->1213 1217 7ff6235cb7c7-7ff6235cb7d1 call 7ff6235c10f0 1212->1217 1213->1217 1218 7ff6235cb521-7ff6235cb549 1213->1218 1224 7ff6235cb7d2-7ff6235cb7dc call 7ff6235c10f0 1217->1224 1220 7ff6235cb560-7ff6235cb577 InitializeCriticalSectionAndSpinCount 1218->1220 1221 7ff6235cb54b-7ff6235cb55a call 7ff6235e3bd8 1218->1221 1220->1224 1225 7ff6235cb57d-7ff6235cb5b2 CreateEventW 1220->1225 1221->1220 1228 7ff6235cb7dd-7ff6235cb7e7 call 7ff6235c10f0 1224->1228 1225->1228 1229 7ff6235cb5b8-7ff6235cb5d2 CreateEventW 1225->1229 1230 7ff6235cb7e8-7ff6235cb7f2 call 7ff6235c10f0 1228->1230 1229->1230 1231 7ff6235cb5d8-7ff6235cb5f2 CreateEventW 1229->1231 1234 7ff6235cb7f3-7ff6235cb7fd call 7ff6235c10f0 1230->1234 1231->1234 1235 7ff6235cb5f8-7ff6235cb6bb InitializeCriticalSectionAndSpinCount 1231->1235 1238 7ff6235cb7fe-7ff6235cb826 call 7ff6235c10f0 1234->1238 1235->1238 1239 7ff6235cb6c1-7ff6235cb6cf InitializeCriticalSectionAndSpinCount 1235->1239 1249 7ff6235cb832-7ff6235cb83a 1238->1249 1250 7ff6235cb828-7ff6235cb82d call 7ff6235ddf84 1238->1250 1243 7ff6235cb6d5-7ff6235cb7a5 timeGetTime CreateEventW * 2 call 7ff6235ddff4 * 2 1239->1243 1244 7ff6235cb7a6-7ff6235cb7b0 call 7ff6235c10f0 1239->1244 1244->1206 1250->1249
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
      • String ID: <$<
      • API String ID: 2446585644-213342407
      • Opcode ID: d796c4475e9fa8e1e86eef5c02ee225e2c55a59838e1fea022d1642caceff4b5
      • Instruction ID: e42a17c09067a1fc158723ed1ac46fe2500d83873187eb4e7ad6d64118b59569
      • Opcode Fuzzy Hash: d796c4475e9fa8e1e86eef5c02ee225e2c55a59838e1fea022d1642caceff4b5
      • Instruction Fuzzy Hash: 12B14C72605B818AEB448F35E8963A933A9FB44B08F58453CCF4C6B795DF38A164C729
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
      • String ID: \\.\HCD%d
      • API String ID: 2324936672-2696249065
      • Opcode ID: fba3a6acf6e72ed7b72618c4283ac656f0c243164c030697ae0719591fc402df
      • Instruction ID: 33d61edc8bc53793247b2e15d33df21efdae473c43c4df8f473df9eaf04ef9ec
      • Opcode Fuzzy Hash: fba3a6acf6e72ed7b72618c4283ac656f0c243164c030697ae0719591fc402df
      • Instruction Fuzzy Hash: 1D517C32A08B8586EF609F10F8417AAB7A4FB85794F042174DA8EA7B95DF3CD415CB41
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
      • String ID:
      • API String ID: 2277684705-0
      • Opcode ID: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
      • Instruction ID: 0d915dd834cb085e2468a2a6ec8b09b26b0c79fc669a335f1963073459e8aa57
      • Opcode Fuzzy Hash: 1f499c150cbe33159222533ec4b742c736879ee302e7e86ebc66b87cb5efa357
      • Instruction Fuzzy Hash: B7011635A18B0282EB149B31FC1A52A22A2FF89B51B4041B5C90EF2BB4EF3CA0458206
      APIs
      • _get_daylight.LIBCMT ref: 00007FF6235F208D
        • Part of subcall function 00007FF6235F1704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F1718
        • Part of subcall function 00007FF6235EE95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE972
        • Part of subcall function 00007FF6235EE95C: GetLastError.KERNEL32(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE97C
        • Part of subcall function 00007FF6235E4028: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6235E3FD7,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235E4031
        • Part of subcall function 00007FF6235E4028: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6235E3FD7,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235E4056
        • Part of subcall function 00007FF6235FA1B4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235FA0FF
      • _get_daylight.LIBCMT ref: 00007FF6235F207C
        • Part of subcall function 00007FF6235F1764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F1778
      • _get_daylight.LIBCMT ref: 00007FF6235F22F2
      • _get_daylight.LIBCMT ref: 00007FF6235F2303
      • _get_daylight.LIBCMT ref: 00007FF6235F2314
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6235F2554), ref: 00007FF6235F233B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
      • String ID: Eastern Standard Time$Eastern Summer Time
      • API String ID: 4070488512-239921721
      • Opcode ID: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
      • Instruction ID: 265cbcc3cbb4225f14002e0725e6f58129375a2eb0afb1f648b580bce911653d
      • Opcode Fuzzy Hash: 5190737fcedb8824ad4a2f5adc1dd419c442ee6d8cf329e1688e58de2abb36f5
      • Instruction Fuzzy Hash: 35D1D076A1824286EF20AF26DC521B967A1FF85B84F408175EE4DF7A85DF3CE441C782
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
      • String ID:
      • API String ID: 3155671162-0
      • Opcode ID: ada6dbc8d5a54c1d03fe828c81b952750c404f4c930501da61a70443052744b7
      • Instruction ID: 7c171a03107955756c817cc7224c07dbdd57bd25f95115deec9d3d794320806f
      • Opcode Fuzzy Hash: ada6dbc8d5a54c1d03fe828c81b952750c404f4c930501da61a70443052744b7
      • Instruction Fuzzy Hash: 0C02AD22F18B8285EF00DB61E8523AD23A1AB45798F004676EE5DB7BD9DF3CE485D341
      APIs
      • _get_daylight.LIBCMT ref: 00007FF6235F22F2
        • Part of subcall function 00007FF6235F1764: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F1778
      • _get_daylight.LIBCMT ref: 00007FF6235F2303
        • Part of subcall function 00007FF6235F1704: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F1718
      • _get_daylight.LIBCMT ref: 00007FF6235F2314
        • Part of subcall function 00007FF6235F1734: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F1748
        • Part of subcall function 00007FF6235EE95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE972
        • Part of subcall function 00007FF6235EE95C: GetLastError.KERNEL32(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE97C
      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6235F2554), ref: 00007FF6235F233B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
      • String ID: Eastern Standard Time$Eastern Summer Time
      • API String ID: 3458911817-239921721
      • Opcode ID: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
      • Instruction ID: e4e4ea388e692640b5cc82aabcf9d17c5745a3f7ac635ff1ffafbf6a5f9be0c7
      • Opcode Fuzzy Hash: 2133f9b6c4e90f95ebb1c2c4b763d73db315d9997485f014e8f6b7b9b98ca04f
      • Instruction Fuzzy Hash: BF51AE76A1864286FF20DF62DC921A9B760BB49784F404176EE8DF3B95DF7CE4018782
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1405656091-0
      • Opcode ID: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
      • Instruction ID: 09e9ae8af175c63c8ca3cdba9258e7d494222053abb6f9e17b3da1c64a3925ce
      • Opcode Fuzzy Hash: 94003a780ed234a965d2311ace6d53ea410cbd1e40622ac1b689e0d0deb2975f
      • Instruction Fuzzy Hash: A791D5B2F043468BEF588F25CD022B963A1EB54B88F449139DA0DEB789EF3CE5418741
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFreeTimerecvselecttime
      • String ID:
      • API String ID: 1996171534-0
      • Opcode ID: 2935555a22fa52e62a83a0f83548e4e7340cb669a6483980d0d32167c7629015
      • Instruction ID: a88969151cf9a7204623293615bcd0c1ba1916be6cb86cd52ea9fee040edee8e
      • Opcode Fuzzy Hash: 2935555a22fa52e62a83a0f83548e4e7340cb669a6483980d0d32167c7629015
      • Instruction Fuzzy Hash: 1C719D72A08A8581EB209F28D8152AD73A0FB95B8CF159635CF4DA3795DF3CE484C745
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
      • Instruction ID: f808d2cfcf17dfcc3331bdddd72b3be36820add191761f7e249163ea8a60dd2a
      • Opcode Fuzzy Hash: bdec6c309521b78e3869a161020c8be31cfe41798d2485b5db3fb8b25cd2d730
      • Instruction Fuzzy Hash: 7141F832708A418AEB09CF2AE851679A795FB54FC8F044539EE0EE7785EF38D946C740

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 808 7ff6235d0220-7ff6235d0299 GlobalAlloc GlobalLock call 7ff6235fd3b0 GlobalUnlock CreateStreamOnHGlobal 811 7ff6235d029f-7ff6235d02fe call 7ff6235c61e0 EnterCriticalSection LeaveCriticalSection call 7ff6235cc9b0 808->811 812 7ff6235d05f1-7ff6235d05fa GlobalFree 808->812 818 7ff6235d0304-7ff6235d032e GdipCreateBitmapFromStream 811->818 819 7ff6235d056e-7ff6235d0584 811->819 813 7ff6235d05fd-7ff6235d0617 812->813 820 7ff6235d0330-7ff6235d0336 GdipDisposeImage 818->820 821 7ff6235d033b-7ff6235d0356 call 7ff6235cc340 GdipDisposeImage 818->821 824 7ff6235d05aa-7ff6235d05c0 call 7ff6235c61e0 EnterCriticalSection 819->824 825 7ff6235d0586-7ff6235d05a4 DeleteObject 819->825 820->819 821->819 828 7ff6235d035c-7ff6235d0373 CreateStreamOnHGlobal 821->828 831 7ff6235d05c2-7ff6235d05d2 EnterCriticalSection 824->831 832 7ff6235d05e7-7ff6235d05eb LeaveCriticalSection 824->832 825->824 828->819 830 7ff6235d0379-7ff6235d03a8 call 7ff6235cc7b0 GetHGlobalFromStream GlobalLock 828->830 837 7ff6235d03ae-7ff6235d03cd GlobalFree 830->837 838 7ff6235d043f-7ff6235d0488 GlobalSize call 7ff6235ddff4 call 7ff6235fd3b0 call 7ff6235c9fd0 830->838 835 7ff6235d05d4 GdiplusShutdown 831->835 836 7ff6235d05da-7ff6235d05e1 LeaveCriticalSection 831->836 832->812 835->836 836->832 842 7ff6235d03cf-7ff6235d03eb DeleteObject 837->842 843 7ff6235d03f1-7ff6235d0407 call 7ff6235c61e0 EnterCriticalSection 837->843 852 7ff6235d04de 838->852 853 7ff6235d048a-7ff6235d0492 838->853 842->843 850 7ff6235d042e-7ff6235d043a LeaveCriticalSection 843->850 851 7ff6235d0409-7ff6235d0419 EnterCriticalSection 843->851 850->813 854 7ff6235d0421-7ff6235d0428 LeaveCriticalSection 851->854 855 7ff6235d041b GdiplusShutdown 851->855 858 7ff6235d04e2-7ff6235d04e6 852->858 856 7ff6235d04c4-7ff6235d04dc 853->856 857 7ff6235d0494-7ff6235d04a1 853->857 854->850 855->854 856->858 859 7ff6235d04a3-7ff6235d04b6 857->859 860 7ff6235d04bf call 7ff6235ddf84 857->860 861 7ff6235d04e8-7ff6235d04f9 858->861 862 7ff6235d0519-7ff6235d052d call 7ff6235ddf84 858->862 864 7ff6235d04bc 859->864 865 7ff6235d0618-7ff6235d061f call 7ff6235e3ff8 859->865 860->856 867 7ff6235d0514 call 7ff6235ddf84 861->867 868 7ff6235d04fb-7ff6235d050e 861->868 872 7ff6235d0553-7ff6235d0561 GlobalUnlock 862->872 873 7ff6235d052f-7ff6235d054d DeleteObject 862->873 864->860 867->862 868->865 868->867 875 7ff6235d0567 872->875 873->872 875->819
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 953580087-0
      • Opcode ID: 3ce228b2e6512ff9c91a5f2ff2817171e9ad90a018f9af23587c8ebbaf042eaa
      • Instruction ID: edcc086c57539e17d13e59514a496d3c74c725ced655b386908778f6bb8ee389
      • Opcode Fuzzy Hash: 3ce228b2e6512ff9c91a5f2ff2817171e9ad90a018f9af23587c8ebbaf042eaa
      • Instruction Fuzzy Hash: 76C15736B08B428AEF00DF61E8152AD23B5FF45B98B004175CE5EB7A99DF38E459C345

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 876 7ff6235cc340-7ff6235cc383 GdipGetImagePixelFormat 877 7ff6235cc385 876->877 878 7ff6235cc387-7ff6235cc3a4 876->878 877->878 879 7ff6235cc3a6-7ff6235cc3b3 878->879 880 7ff6235cc3b9-7ff6235cc3c4 878->880 879->880 881 7ff6235cc3db-7ff6235cc400 GdipGetImageHeight 880->881 882 7ff6235cc3c6-7ff6235cc3d4 880->882 883 7ff6235cc402-7ff6235cc40c 881->883 884 7ff6235cc40f-7ff6235cc422 GdipGetImageWidth 881->884 882->881 883->884 885 7ff6235cc424 884->885 886 7ff6235cc426-7ff6235cc447 call 7ff6235cc160 884->886 885->886 889 7ff6235cc453-7ff6235cc45b 886->889 890 7ff6235cc449-7ff6235cc44e 886->890 892 7ff6235cc461-7ff6235cc478 GdipGetImagePaletteSize 889->892 893 7ff6235cc60d-7ff6235cc61c 889->893 891 7ff6235cc773-7ff6235cc78c 890->891 894 7ff6235cc47a 892->894 895 7ff6235cc47c-7ff6235cc487 892->895 896 7ff6235cc6e2-7ff6235cc74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 893->896 897 7ff6235cc622-7ff6235cc64e GdipBitmapLockBits 893->897 894->895 900 7ff6235cc4ba-7ff6235cc4c6 call 7ff6235e4070 895->900 901 7ff6235cc489-7ff6235cc492 call 7ff6235cb2e0 895->901 902 7ff6235cc753-7ff6235cc756 896->902 898 7ff6235cc650-7ff6235cc65a 897->898 899 7ff6235cc66a-7ff6235cc686 897->899 898->902 904 7ff6235cc6c4-7ff6235cc6db GdipBitmapUnlockBits 899->904 905 7ff6235cc688-7ff6235cc68b 899->905 915 7ff6235cc4cd-7ff6235cc4d4 900->915 916 7ff6235cc4c8-7ff6235cc4cb 900->916 901->900 919 7ff6235cc494-7ff6235cc49b 901->919 907 7ff6235cc770 902->907 908 7ff6235cc758 902->908 904->902 912 7ff6235cc6dd-7ff6235cc6e0 904->912 910 7ff6235cc6ad-7ff6235cc6c2 905->910 911 7ff6235cc68d-7ff6235cc690 905->911 907->891 914 7ff6235cc760-7ff6235cc76e call 7ff6235e3bd8 908->914 910->904 910->905 917 7ff6235cc794-7ff6235cc7af call 7ff6235e8d9c call 7ff6235e3fd8 call 7ff6235c10f0 911->917 918 7ff6235cc696-7ff6235cc69f 911->918 912->902 914->907 922 7ff6235cc4d7-7ff6235cc4da 915->922 916->922 924 7ff6235cc6a5-7ff6235cc6a8 call 7ff6235fd3b0 918->924 925 7ff6235cc78d-7ff6235cc78f call 7ff6235fda50 918->925 926 7ff6235cc49d 919->926 927 7ff6235cc4a7-7ff6235cc4b8 call 7ff6235de600 919->927 929 7ff6235cc4dc-7ff6235cc4e2 922->929 930 7ff6235cc4e7-7ff6235cc4f9 GdipGetImagePalette 922->930 924->910 925->917 926->927 927->922 929->902 934 7ff6235cc4ff-7ff6235cc50a 930->934 935 7ff6235cc4fb 930->935 939 7ff6235cc65f-7ff6235cc665 934->939 940 7ff6235cc510-7ff6235cc515 934->940 935->934 939->902 942 7ff6235cc555-7ff6235cc55d 940->942 943 7ff6235cc517 940->943 946 7ff6235cc55f-7ff6235cc56a call 7ff6235c6280 942->946 947 7ff6235cc5aa-7ff6235cc5c2 SetDIBColorTable 942->947 945 7ff6235cc520-7ff6235cc553 943->945 945->942 945->945 953 7ff6235cc570-7ff6235cc57d 946->953 948 7ff6235cc5c4-7ff6235cc5de SelectObject call 7ff6235c6280 947->948 949 7ff6235cc607 947->949 957 7ff6235cc5e0-7ff6235cc5ea 948->957 949->893 955 7ff6235cc58e-7ff6235cc5a6 SelectObject 953->955 956 7ff6235cc57f-7ff6235cc584 953->956 955->947 956->953 958 7ff6235cc586-7ff6235cc588 CreateCompatibleDC 956->958 959 7ff6235cc5fc-7ff6235cc603 957->959 960 7ff6235cc5ec-7ff6235cc5f1 957->960 958->955 959->949 960->957 961 7ff6235cc5f3-7ff6235cc5f6 DeleteDC 960->961 961->959
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
      • String ID: &
      • API String ID: 4034434136-3042966939
      • Opcode ID: 239e805813e04336424a29340b1b3b4cd56234119952a51b41bc6ad9426f54d6
      • Instruction ID: 2d9592a194e30a07d24c9259f8479198e0f0bce723c00558e6ae6a5481887c16
      • Opcode Fuzzy Hash: 239e805813e04336424a29340b1b3b4cd56234119952a51b41bc6ad9426f54d6
      • Instruction Fuzzy Hash: 87D1BD72604B828AEB608F25D9456BD37A4FB04B98F018475DF1EB7B94DF38E942C741

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
      • String ID: 0u
      • API String ID: 3082052849-3203441087
      • Opcode ID: 9bb4aa29c9e6661a1d5a7a947209a0091e729a32abab4caebb3e9084a2693f54
      • Instruction ID: 2e04c61bda02fe404c892af7219f452a4c363861e89316398e95ebf017a5404f
      • Opcode Fuzzy Hash: 9bb4aa29c9e6661a1d5a7a947209a0091e729a32abab4caebb3e9084a2693f54
      • Instruction Fuzzy Hash: 62716072608B8186DB20CF21F84476AB7A5FB85798F004239EE8E67B94DF3DD119CB05

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
      • String ID: VenNetwork
      • API String ID: 4155081256-3057682757
      • Opcode ID: 3ae0895a5e42d8c7213368631a9542ba106a9abfd0f70956460d22f64f12b84e
      • Instruction ID: 9cebdf75f21e14f4b05846095e3acca7ae9fc3092a5f12aa2e7abe780e6a5a12
      • Opcode Fuzzy Hash: 3ae0895a5e42d8c7213368631a9542ba106a9abfd0f70956460d22f64f12b84e
      • Instruction Fuzzy Hash: F4414D36A0CB8282EF619B21EC567BA2360FB96B45F444475CA4EB3B94DF3CD445D702

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1256 7ff6235dbef0-7ff6235dbf17 1257 7ff6235dc2b0-7ff6235dc2c1 CloseHandle 1256->1257 1258 7ff6235dbf1d-7ff6235dbf37 1256->1258 1259 7ff6235dbf40-7ff6235dbf5a call 7ff6235e4070 1258->1259 1262 7ff6235dc290-7ff6235dc2a8 1259->1262 1263 7ff6235dbf60-7ff6235dbf9c DeviceIoControl 1259->1263 1262->1257 1264 7ff6235dbfa2-7ff6235dbfa6 1263->1264 1265 7ff6235dc288-7ff6235dc28b call 7ff6235e3bd8 1263->1265 1266 7ff6235dc27a-7ff6235dc280 1264->1266 1267 7ff6235dbfac-7ff6235dc00b DeviceIoControl 1264->1267 1265->1262 1266->1259 1271 7ff6235dc286 1266->1271 1269 7ff6235dc0a4-7ff6235dc0a8 1267->1269 1270 7ff6235dc011-7ff6235dc018 1267->1270 1273 7ff6235dc195-7ff6235dc1ed call 7ff6235fda50 call 7ff6235dc6e0 * 2 1269->1273 1274 7ff6235dc0ae-7ff6235dc0f5 DeviceIoControl 1269->1274 1270->1269 1272 7ff6235dc01e-7ff6235dc026 1270->1272 1271->1262 1272->1269 1275 7ff6235dc028-7ff6235dc03e GlobalAlloc 1272->1275 1292 7ff6235dc1f2-7ff6235dc219 call 7ff6235dbe90 1273->1292 1274->1273 1277 7ff6235dc0fb-7ff6235dc108 1274->1277 1275->1269 1278 7ff6235dc040-7ff6235dc084 DeviceIoControl 1275->1278 1277->1273 1280 7ff6235dc10e-7ff6235dc121 GlobalAlloc 1277->1280 1281 7ff6235dc09b-7ff6235dc09e GlobalFree 1278->1281 1282 7ff6235dc086-7ff6235dc08c 1278->1282 1280->1273 1284 7ff6235dc123-7ff6235dc15f DeviceIoControl 1280->1284 1281->1269 1282->1281 1287 7ff6235dc08e-7ff6235dc099 1282->1287 1285 7ff6235dc161-7ff6235dc179 call 7ff6235dc640 GlobalFree 1284->1285 1286 7ff6235dc18c-7ff6235dc18f GlobalFree 1284->1286 1285->1273 1293 7ff6235dc17b-7ff6235dc18a call 7ff6235dc2d0 1285->1293 1286->1273 1287->1269 1287->1281 1297 7ff6235dc220-7ff6235dc227 1292->1297 1293->1273 1297->1297 1299 7ff6235dc229-7ff6235dc22d 1297->1299 1300 7ff6235dc234-7ff6235dc23c 1299->1300 1300->1300 1301 7ff6235dc23e-7ff6235dc248 1300->1301 1301->1262 1302 7ff6235dc24a-7ff6235dc24d 1301->1302 1303 7ff6235dc250-7ff6235dc258 1302->1303 1303->1303 1304 7ff6235dc25a-7ff6235dc25e 1303->1304 1305 7ff6235dc260-7ff6235dc26e 1304->1305 1305->1305 1306 7ff6235dc270-7ff6235dc275 1305->1306 1306->1266
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlDeviceGlobal$Free$Alloc
      • String ID: - External Hub$%s-%s|
      • API String ID: 3253977144-729331614
      • Opcode ID: a64a8a154bc7d147da862556ab1e51a765a2c970b97e8182b802ad51ffa46e8a
      • Instruction ID: bc8b06142d6cc0e90d42fb904e0a3bb57b7be012fdd6be8f13c97dbc6637315b
      • Opcode Fuzzy Hash: a64a8a154bc7d147da862556ab1e51a765a2c970b97e8182b802ad51ffa46e8a
      • Instruction Fuzzy Hash: 9CB19A72A08B8585EB60CF60A8413AEB7A0FB85794F444275DB8DB7B94DF3CD545C701

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
      • String ID: %d min$Console$IpDatespecial
      • API String ID: 357503962-2712035571
      • Opcode ID: f10f92fbc072fe067106cb54d6c34107b9c6c4e7fb02d7e9705fa94ab09b83a4
      • Instruction ID: 7d33377bb761467bd2ab3d5630899d324c1067446614078733148a883d25ed89
      • Opcode Fuzzy Hash: f10f92fbc072fe067106cb54d6c34107b9c6c4e7fb02d7e9705fa94ab09b83a4
      • Instruction Fuzzy Hash: 3951DE32608E8285EF208F28EC463B933A4FB44B59F448172CA4DA7798EF3CD189C705
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
      • String ID: &
      • API String ID: 370471037-3042966939
      • Opcode ID: 28b2eeaec2d98f14f4e8f3b60e7ba4f1bea8e24f035ccc537625c12df49cfb7a
      • Instruction ID: 0ac3f5be1ad1d3e437baee30821acc9e4541697c7eae54e8ecedca9b91cb893a
      • Opcode Fuzzy Hash: 28b2eeaec2d98f14f4e8f3b60e7ba4f1bea8e24f035ccc537625c12df49cfb7a
      • Instruction Fuzzy Hash: DF518132A08B4286EF119B219C025B963A1FB45BA8F4446B1DE5DB7BE4DF3CE943C341
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoSystem$AddressHandleModuleNativeProc
      • String ID: GetNativeSystemInfo$kernel32.dll
      • API String ID: 3433367815-192647395
      • Opcode ID: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
      • Instruction ID: 156977813321a98c6cc0f461c49c9cff0404fc1c2b9cc9cd059a3e1980f4cd0d
      • Opcode Fuzzy Hash: 06b04ae401ee5d5c7cc9b92bd00cef418c8d008ef26561d2b8b72a7f6fbba0c7
      • Instruction Fuzzy Hash: D9F09615E18B8283FE60A710DC023B93361FFA9B04F905775E98EB1A94EF5CE2D4C601
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Close$OpenQueryValuelstrcmp
      • String ID:
      • API String ID: 4288439342-0
      • Opcode ID: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
      • Instruction ID: 83385638f06a9d1e12de2c2047411d5fbdaacafa1aa359e63a4818cf4b3dc888
      • Opcode Fuzzy Hash: 9757e75af8232627abeb9f8389a1c3797a9351f61d8f1bccc733d4b1246574e8
      • Instruction Fuzzy Hash: 2D318631618B8182EB60CB25EC8966A73A4FB85B94F504271DE5DA3BD8DF3DD804CB01
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
      • String ID: %s%s %d %d $%s%s %d*%d
      • API String ID: 2331002265-1924168580
      • Opcode ID: e8d6461351b0342cbb6652825b90b278b984841a945ce86b9280404ee83501b8
      • Instruction ID: db9e9bb6c1e19f91b7977c745d74ca8ce9e282c2ccc8e58c1251fa93963625a2
      • Opcode Fuzzy Hash: e8d6461351b0342cbb6652825b90b278b984841a945ce86b9280404ee83501b8
      • Instruction Fuzzy Hash: FFA18E32B04B8585EB10CF65D8452EE77B5FB89B98F504622EE9DA7B98CF38D081C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2067211477-0
      • Opcode ID: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
      • Instruction ID: a365cf055ad4f5c238c47dc5974f75fc3352e610164ac606274c5fbc6d743ab9
      • Opcode Fuzzy Hash: 2bf2d8e4056023ef3a5b5264bbcf8491965b7124c54493676a6e58e8f064e49f
      • Instruction Fuzzy Hash: 05216235A0AB5285EE14DF65EC12079A3A0BF89F90F0445B5DE5EB7B95DF3CE4408601
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ControlCreateDeviceFile
      • String ID: L$\\.\
      • API String ID: 107608037-1891537229
      • Opcode ID: 21bc0f6301598303c13827e0319026f3a4049949566ec9a53abc1aeea47cf04e
      • Instruction ID: c2a726f7fcdaf3e95069de55b2b279948dc3771a9475f2afefdd43a9b679bb0c
      • Opcode Fuzzy Hash: 21bc0f6301598303c13827e0319026f3a4049949566ec9a53abc1aeea47cf04e
      • Instruction Fuzzy Hash: EC31B46260D78581EB508F11B85137A7B94EB85BE4F084374EBAE6BBC6CF3CD5058701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentThreadsend
      • String ID:
      • API String ID: 302076607-0
      • Opcode ID: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
      • Instruction ID: e307a380ff8ee15f188c057a353ed5862ac9bbfe932e7cce951f339a5d9d8386
      • Opcode Fuzzy Hash: 1d5fac0907bdd9d84bc34d83d8396e4accfe818cb4c73ff339665f4c5f5d32ef
      • Instruction Fuzzy Hash: AA51B332A04B4687EB148F25E84536AB7B0FB45B88F048875CB4DA7B95DF3CE592C345
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
      • String ID:
      • API String ID: 3058672631-0
      • Opcode ID: 62bbaa5f944f4d7b3208405c1483dc30ee100de22e3906a95e19890dc0bb8ba5
      • Instruction ID: 60e543cf339bd35c0a9a540a5533cd8e24b538c5206627e59705de47534ff002
      • Opcode Fuzzy Hash: 62bbaa5f944f4d7b3208405c1483dc30ee100de22e3906a95e19890dc0bb8ba5
      • Instruction Fuzzy Hash: 1231A531A0C78285EF20CB11E8453AAA3A1EB8A790F544175EF9DA7B89DF3DD445CB01
      APIs
        • Part of subcall function 00007FF6235C61E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF6235C6231
        • Part of subcall function 00007FF6235C61E0: GetLastError.KERNEL32 ref: 00007FF6235C623B
      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6235CC7D4), ref: 00007FF6235CC9DA
      • GdiplusStartup.GDIPLUS ref: 00007FF6235CCA0F
      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6235CC7D4), ref: 00007FF6235CCA27
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
      • String ID:
      • API String ID: 2723390537-0
      • Opcode ID: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
      • Instruction ID: e0d73f0363d465544815f395fce1b11049f85d8d70e4dbc11558b1378433fd89
      • Opcode Fuzzy Hash: c1fce392dff7f0e0a1fd8d320c51b28cecfe9cf3d04554c50c1a4421144027e9
      • Instruction Fuzzy Hash: 6B015232908B81C6EB509F15E80536AB7E5F785B45F481065EB8EA3B94CF3CD155CB41
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: SleepTimetime
      • String ID:
      • API String ID: 346578373-0
      • Opcode ID: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
      • Instruction ID: b794f765b3ba29150413389fdfd525b96e2d12c65115ec2e08ea6c33a21015db
      • Opcode Fuzzy Hash: a07444b426276808b022deff05d84a514b99e0a0f66664c5b3036afdf0babcf4
      • Instruction Fuzzy Hash: 63018022B1864587EB644B24E98937C27A0F745788F441674C75EA7AD0CF3CD4E5C706
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorExitLastThread
      • String ID:
      • API String ID: 1611280651-0
      • Opcode ID: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
      • Instruction ID: dc3c8235b71ec3be9db65534b7da1d96ea97fef6e17fb761d0f7c30b8684d7f5
      • Opcode Fuzzy Hash: 41641528019013f9ff929c92362d335c34901b889fac2650327ddb4de509bf94
      • Instruction Fuzzy Hash: 12F09021E1AB0242EF04BBB09C0B07D12A0AF56F10F1804B4DD0DF7792DF3CA4458302
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task
      • String ID:
      • API String ID: 118556049-0
      • Opcode ID: 8afa6a4327cd587ea362fe0c4f5b4bf1e5e9001c34c8a508c9f4177e13cca725
      • Instruction ID: 7a7403794ff3c795e3de862cefafe3f4b1eea26fa61f43b897d5b3691dbca884
      • Opcode Fuzzy Hash: 8afa6a4327cd587ea362fe0c4f5b4bf1e5e9001c34c8a508c9f4177e13cca725
      • Instruction Fuzzy Hash: FBE0B641E1D20F45FD2922A62C2747900800F5A7B1E282BB2EA7EF82C2AF1CA5558153
      APIs
      • RtlFreeHeap.NTDLL(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE972
      • GetLastError.KERNEL32(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE97C
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
      • Instruction ID: 92a287f075fd423a1b6a64b469e6e1e4d4bd7ae1e591c418516d52cc2961b93f
      • Opcode Fuzzy Hash: a2b1b4d253dc9b48524949a201526306b0bcc39bf10aa9e0b1341fdbb23a067c
      • Instruction Fuzzy Hash: 1BE08C10F1970242FF586BF2AC4B03826A0AF85F00F0054B4CD4DF7391DF3CA8404212
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
      • Instruction ID: 4117824edbef12e6ea82ed289f486b4b695c88acfbbf091246a70206726d1921
      • Opcode Fuzzy Hash: 17a02dcf2f47f10d7a08db77411b6b44ca6662cc7d290d042544fe107c4b0b33
      • Instruction Fuzzy Hash: BE21A931718A4186DB24CB2AF84112AB7B1FB85B84B144535EB9EE3B58EF3CE5818744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocFree
      • String ID:
      • API String ID: 2087232378-0
      • Opcode ID: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
      • Instruction ID: b1f10b3a3c03b46c74ee48fcef386297a80331f697683afb83c35b60ff592100
      • Opcode Fuzzy Hash: 4c8156205564e744c18fa944b02d568327434d479cf77dfe2f9176b33a9ea29c
      • Instruction Fuzzy Hash: 2111EC31B24A4141DB048F36E841129A3A5FF95BC4B144571ED4EF7798EF3CD992C780
      APIs
        • Part of subcall function 00007FF6235DDD80: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF6235DDD94
      • __scrt_release_startup_lock.LIBCMT ref: 00007FF6235DE177
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
      • String ID:
      • API String ID: 2217363868-0
      • Opcode ID: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
      • Instruction ID: 5abf3c1047360e3d20512f0ab03f6f14a31752be6f33d60f4c81a8c30d3ad25c
      • Opcode Fuzzy Hash: df8c2cae6130cff53013dc258be4a77fac826802f49534194485c90f58f48bf0
      • Instruction Fuzzy Hash: 90315B21A0C64B41FE11AB659D533B963A1AF82B84F4400F9DA4EFB3E7CF2CE4448243
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Startup
      • String ID:
      • API String ID: 724789610-0
      • Opcode ID: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
      • Instruction ID: 19ee98008202e2e78e6a2b75aa5eebce7af204a2500f22eaf4bcc930d743139d
      • Opcode Fuzzy Hash: 2276b2cfde0ec166953e0ec75e850ce31f8cbc4b3846b0cdc97fb7f8133b5954
      • Instruction Fuzzy Hash: E7E08636B05645CAEB11EF24EC4A0A47364FB59700F404172E98CD7B95DF2CE115CF01
      APIs
      • HeapAlloc.KERNEL32(?,?,?,00007FF6235F27CD,?,?,00000000,00007FF6235EA69B,?,?,?,00007FF6235EC873,?,?,?,00007FF6235EC769), ref: 00007FF6235EF0AE
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AllocHeap
      • String ID:
      • API String ID: 4292702814-0
      • Opcode ID: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
      • Instruction ID: dfebc6261205e45322efbe123a3134f807b7ef9c7e0a95ad7e9972374cd1ed0d
      • Opcode Fuzzy Hash: 016c47a342e12657c725cebeaa7b4028c5a2c41f1cbc7a3001cbfc12b323d78a
      • Instruction Fuzzy Hash: 8EF0F851A0974242FE646BA25D4367512815F85BA2F0A06B0DD2FF63C1EF7CE4819227
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
      • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
      • API String ID: 3040193174-4212407401
      • Opcode ID: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
      • Instruction ID: 36f0b74f71216cd9df3a99610c6f3aef83727a69a2ae5d85a172baa53183cb9f
      • Opcode Fuzzy Hash: 6fd3f4fde48d0361eb2d5c202ab323ad8a247f6fe0c7ba3ad29a459755052d7c
      • Instruction Fuzzy Hash: 18A15E32A04B8285EB219F21EC557E923A4FB89788F404175DE4DB7BA4EF3CD245C705
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
      • String ID: [$[$%s%s$%s%s$%s%s$[esc]
      • API String ID: 3669393114-972647286
      • Opcode ID: fffc5d82002a8ed72db2a007b73f01bf304c84ff01a829126f2514e0b534c1bd
      • Instruction ID: 5fe271d4972e76dcd7578be7e31315fcd09b842b704ff75a2d759539496f29d3
      • Opcode Fuzzy Hash: fffc5d82002a8ed72db2a007b73f01bf304c84ff01a829126f2514e0b534c1bd
      • Instruction Fuzzy Hash: 21D18D36A0CB4282FF109B65EC4A2B963A4FF85744F404572D94EB2BA4DF7CE548D742
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrlen$CreateEventLocalTimewsprintf
      • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
      • API String ID: 2157945651-1225219777
      • Opcode ID: ffa54dc6aacd8b7c489ab2f030bdae777e95d9fe9fee655a7fecff1d3dc8717e
      • Instruction ID: 501b26f40ff63bf26ecb37c87fa53e07661afe0622b8dc2adde40f6f1eec5f34
      • Opcode Fuzzy Hash: ffa54dc6aacd8b7c489ab2f030bdae777e95d9fe9fee655a7fecff1d3dc8717e
      • Instruction Fuzzy Hash: F2F1D362A1869286EF209F25DC423BD23E1FB45B98F004672DA4EF7AD5DF7CA581C701
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
      • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
      • API String ID: 2977986460-1099148085
      • Opcode ID: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
      • Instruction ID: e78c3f0f82054ecaceca633a4b68d1fbef42c4c18775cc2c1460a99527304642
      • Opcode Fuzzy Hash: 067ce2f794736821cf202725aa30ed0aa3c92a2ab4f8812fc9fc05c1c4d827d7
      • Instruction Fuzzy Hash: 3741C025A0974282EF20DB11BC1677A67A0FB8AB94F484170DD9E67B94EF3CD444CB41
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
      • String ID:
      • API String ID: 1851032462-0
      • Opcode ID: 7627f68610b1894b460692bd5adc3dbaa890ec027b034b53a83515536de8aba5
      • Instruction ID: 3889251a7a7f51d47e8aceec3cb8c04fc9afe61548fa37e819c6c68e0416892e
      • Opcode Fuzzy Hash: 7627f68610b1894b460692bd5adc3dbaa890ec027b034b53a83515536de8aba5
      • Instruction Fuzzy Hash: FED1E362B0878A82EF109F65E8022AD63A1FF89B94F104175EA5DB7BD9DF3CE441C701
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
      • String ID: %s %s$%s%s$02e6e16e-c851-4d99-a47c-2e46c0c70650$@$Windows\System32\svchost.exe$h$nlyloadinmyself$plugmark
      • API String ID: 4033188109-2064863529
      • Opcode ID: 39cb0ed868284d1e7928880f05503a86ba10bcdc2c17875e8f87faef0a13c5dc
      • Instruction ID: 3ef134e4529b70517c83a2d352bb31b804f72350f6f4097955da69a56908f5e3
      • Opcode Fuzzy Hash: 39cb0ed868284d1e7928880f05503a86ba10bcdc2c17875e8f87faef0a13c5dc
      • Instruction Fuzzy Hash: D112A162B08A8282EB20CF25D8452BD77A1FB95B88F448576DF4DA7B96DF3CD185C301
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
      • Instruction ID: 8d48bab0fffe0a3e7302714e766bb312b9bc217679b46a5e82347c05d6d46121
      • Opcode Fuzzy Hash: 40da0a47c9c7c1cc3a1aa31b778f4d13c03be2ed2b90204a7f89449c4a5765b5
      • Instruction Fuzzy Hash: 7C312D35908F8282EB208F25FC153AA6364FB86B5AF104475DA4EB7AA4CF3DD189C705
      APIs
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA6C5
      • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA74A
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA79F
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA7BE
      • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA821
      • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA842
      • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA856
      • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA873
      • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA88F
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DA8AC
      • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235CD242), ref: 00007FF6235DAB92
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
      • String ID:
      • API String ID: 1282860858-0
      • Opcode ID: bc094b2e2349ffbc07eff65132924311638ab0ecebfd180c525b8fe56df94986
      • Instruction ID: 769492e65b552be008d7e7a9ea16f1e8e9ca386439a47b249fa8f82f868c14be
      • Opcode Fuzzy Hash: bc094b2e2349ffbc07eff65132924311638ab0ecebfd180c525b8fe56df94986
      • Instruction Fuzzy Hash: 4AD19F32B19A4A86EF608F16E85677A73A1EF45B84F054075DE4EB7B80EF3CE4418302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
      • Instruction ID: d8d20577fccc83676e32f2f78ae1279a43637d7b6c6e0a7ea9f2e756fd481b16
      • Opcode Fuzzy Hash: a792fc21bd502bb1f53feba3e0ea592908ea8fd6b5dd88df7bff687d3cdc374e
      • Instruction Fuzzy Hash: C5313C35608F8282EB208F25FC153AA6364FB86B5AF104076D94EB7AA4DF3DD189C705
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 1423298842-3733053543
      • Opcode ID: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
      • Instruction ID: 19caa1370020ab5b39216cb058e4b0de3b9d4c5d84c5a8b0eea2601bc08e78a7
      • Opcode Fuzzy Hash: c4512c4a51b1fe7d902806900a56825f16f8507878c75a96d79f3f5efe7084bf
      • Instruction Fuzzy Hash: 60311C35608F8282EB208F25FC153AA6364FB86B5AF104075D94EB7AA4DF3DD189C705
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
      • Instruction ID: 81aa9b350c14a56582d1cfd7481e3f0105ca9b30a35974d97a0dd0ded17f693c
      • Opcode Fuzzy Hash: 8a8cdf450ad9da4e3e91848c83b2fc9670f44cdb81e1e9276785e569651f6bed
      • Instruction Fuzzy Hash: BCB2D272A186828BEB648E64D9427FD37A1FB55388F505175DE0DB7A84DF3CAA00CB42
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Close$OpenQueryValuelstrcpy
      • String ID: %08X
      • API String ID: 2032971926-3773563069
      • Opcode ID: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
      • Instruction ID: 6a9cabadd5fb9b90b4b621395ed031bf34d7f330baf66822631de55586a14ef8
      • Opcode Fuzzy Hash: 32c954eb57fda164b81f0150aeb248f5c32c45763a12c98c87c6a1606aaef6c8
      • Instruction Fuzzy Hash: C7516172608AC281EB70CB15E8457ABB3A1FF85754F804135DB9DA3A98DF3CD549CB09
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
      • TranslateName.LIBCMT ref: 00007FF6235F79E6
      • TranslateName.LIBCMT ref: 00007FF6235F7A21
      • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF6235ED778), ref: 00007FF6235F7A68
      • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF6235ED778), ref: 00007FF6235F7AA0
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F7C5D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
      • String ID: utf8
      • API String ID: 3069159798-905460609
      • Opcode ID: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
      • Instruction ID: 51504353add50202b1c2e2f8b5b135ae6d3e066f2557fb0b5d69ebb7b6b09d3b
      • Opcode Fuzzy Hash: ed249922890c5a667d77dbf9e0f0f5ff4edc5bc12cc14daec0a02a097362d650
      • Instruction Fuzzy Hash: AF918A32A0874282EF24AF61DC022B923A5EB46BC0F4585B5DE8CB7785EF3DE551C342
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED55
      • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF6235F8534
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED82
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED93
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDA4
      • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF6235ED771), ref: 00007FF6235F851B
      • ProcessCodePage.LIBCMT ref: 00007FF6235F855E
      • IsValidCodePage.KERNEL32 ref: 00007FF6235F8570
      • IsValidLocale.KERNEL32 ref: 00007FF6235F8586
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F85E2
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F85FE
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
      • String ID:
      • API String ID: 2591520935-0
      • Opcode ID: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
      • Instruction ID: a7a8a12237501ad6537ba34b5b4000f960643d24338a0885ee7c73683d17ebcb
      • Opcode Fuzzy Hash: 22d8bcddac7133f8b6f7a06d5e5334a0f8ea8210c2b9d064d69f21135d6cdb9b
      • Instruction Fuzzy Hash: 01717A22B08B029AFF509F60DC566B923A4BF06B48F6444B5CE0DB3B95EF3CA445C352
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 3140674995-0
      • Opcode ID: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
      • Instruction ID: da369609e8753de1991605f95e6aad94a0081cd2d5fd1b5e7a1e41285d75d8a3
      • Opcode Fuzzy Hash: 045e81cc47e066d153aaaf5b50bd9fe289779446efb159575806e036ae1ed661
      • Instruction Fuzzy Hash: 3D313C72609B8286EB608F60EC417FD73A4FB85744F44407ADA4EA7B98EF38D648C715
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Event$ClearCloseOpen
      • String ID: Application$Security$System
      • API String ID: 1391105993-2169399579
      • Opcode ID: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
      • Instruction ID: d2780398d5acbd2e0f98e0359d762874cccd7006cc5df0a9699ad1e54fa30938
      • Opcode Fuzzy Hash: 1bb91c5c2b3888595093d95bda04c9b415b5dc93057c8244563c58f3f028a90d
      • Instruction Fuzzy Hash: 53F03126A09F4281EE158B15FC02265A3A8FF89BA5F045475CD4EA3764EF3DE0968705
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
      • Instruction ID: d36e2ea9d0b95d2f34cf83cd00c93231f6ba2955e55512f3efa4312fcd7313ed
      • Opcode Fuzzy Hash: fa8f028e9fcd13a2b73484911b7de9c78ca1ddcb2e97266c57a75bc76a24fdd2
      • Instruction Fuzzy Hash: 96318F32608B8186DB60CF25EC412AE73A4FB89B54F540176EE8DA7B98DF3CD545CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: FileFindFirst_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2227656907-0
      • Opcode ID: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
      • Instruction ID: 66ac8f4aa1cba6157ebc7d0ee937df1827bce4fbac32f01a67ad25342382d931
      • Opcode Fuzzy Hash: 68b5c0f69695cefe4d2b1cac7d4572eefde3aab897b1af24f4d9a3b1cd0a2181
      • Instruction Fuzzy Hash: 30B1D662B1869241EE60DB21EC062BE63A1FB46BD4F445171EE5DB7BC9DF3CE4418302
      APIs
      Strings
      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6235DC8AF
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: DebugDebuggerErrorLastOutputPresentString
      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
      • API String ID: 389471666-631824599
      • Opcode ID: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
      • Instruction ID: b492db7000ec387ba1120b4cd9a77c99f72a8807d4421e77c457f4259e448e93
      • Opcode Fuzzy Hash: 6ee909605b01ed677f0d258b83eb54f87cb27d04152a024ec70f484db7e8edcc
      • Instruction Fuzzy Hash: 1C116A32A18B4296FB049B22EA463B933A0FB04745F404175CA4DE2A90EF7CE075C711
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
      • Instruction ID: cd7be3f5232b954bc446ca1dd2507cfabae263405a53ed04311f687cc9fa3d80
      • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
      • Instruction Fuzzy Hash: 33C1D372A1CB8687EF248F16A44566ABBE1F784B85F449134DB4EA3B44DF3DE801CB40
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED55
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F7EAC
        • Part of subcall function 00007FF6235F3FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F3FE9
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F7EF5
        • Part of subcall function 00007FF6235F3FCC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235F4042
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F7FBD
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1791019856-0
      • Opcode ID: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
      • Instruction ID: 936c6b935a38517ed9f2a16ce9a5aff3faf984ca90570b57866d551f6f4e039e
      • Opcode Fuzzy Hash: 47a608bb907d4de4290f427b339ca80dcd83f241fa12a378f23bb4634d50531a
      • Instruction Fuzzy Hash: C861AC32A0864286EF249F21E8422B973A5FB45780F5081B5DFAEF3691DF3CE591C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: InfoLocale
      • String ID: GetLocaleInfoEx
      • API String ID: 2299586839-2904428671
      • Opcode ID: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
      • Instruction ID: 0df03b9cca02c606930b058caf547646e97a988d502380400e38647fefacd878
      • Opcode Fuzzy Hash: 3b61ae466ef5758e0e9e9450f631c2e40b05ac649b5573246797acb4bca5b173
      • Instruction Fuzzy Hash: C601A221B08B8186EF009B56B9021AAA764BF85BD0F584075DE4DB7F59CF3CDA418741
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
      • Instruction ID: 5a6055f661338f0db93261174cae1336b845cdaa8da44c9b19ebbbf678fb5ef4
      • Opcode Fuzzy Hash: 122b1925bd55db41e804c5b079ebde0f01de1123b2666aa23313b6dae26d6c44
      • Instruction Fuzzy Hash: 79B16A73604B898BEB15CF2AC8463683BA0F785B48F198962DE5DA77A4CF3DD451C701
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: $
      • API String ID: 0-227171996
      • Opcode ID: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
      • Instruction ID: 7e2cca900c8afaea65aff76b2b4d8bdb8995c456f94bca16c2ad45b858d3e2f1
      • Opcode Fuzzy Hash: 551e646fd59d23c1ee018d61c48a67f2a52f50f5278fc9195615cae8faf456cd
      • Instruction Fuzzy Hash: 0CE1CE76A0874282EF688E29885213D33A0FF45B88F2452B5DB5EB7794DF39E841D742
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: e+000$gfff
      • API String ID: 0-3030954782
      • Opcode ID: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
      • Instruction ID: 6675576ae5650dfb1920db31ddf384ff57ff76d0c18c13a6e3f6708633c2ec9e
      • Opcode Fuzzy Hash: a347cb712251c494c0ac76841d0ca458a250c6be9a7c463d0ead6691c264c289
      • Instruction Fuzzy Hash: 28517963B183C186EB218E35AC027697B91E745B94F09C2B1CF9CABAC5CF3DD4408702
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Info
      • String ID:
      • API String ID: 1807457897-0
      • Opcode ID: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
      • Instruction ID: d1b4e552091d2403a878a341ad4c06272e2ba52b7d5374dd180d5f62f98081b6
      • Opcode Fuzzy Hash: 773e53d09e5455f04dc57cd524f4ca394a315c5928bf5f5768ba6214c405212f
      • Instruction Fuzzy Hash: 4612AF22A08BC186EB51CF3899562FD73A4FB59748F059275EFDCA6692DF38E185C300
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
      • Instruction ID: c2861c34f75a8515b4495453d5a6b1083b30ccdaa52c67861a442f682d6e5a67
      • Opcode Fuzzy Hash: e22158b38decd8d90c74f2f99d25a665006446744f2e1b5a41cef00b0dd0ad41
      • Instruction Fuzzy Hash: BFE16136A04B8186EB20DB61E8422FE77A4FB55788F404632DF8DA3796EF78D245C341
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: [RO] %ld bytes
      • API String ID: 0-772938740
      • Opcode ID: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
      • Instruction ID: 4793e979891e84d869a1d78e1bf280b36cbb83f617a1e13be30bfca42b09fe47
      • Opcode Fuzzy Hash: 4874844c38418d14ede67d35d8ec1f57646d452b183219fb2a06a3d7a21df842
      • Instruction Fuzzy Hash: FB42BE336093C58FC329CF28D84029E7BA0F755B48F048569DB8AA7B86DB3CE855CB51
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
        • Part of subcall function 00007FF6235EED10: FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED55
      • GetLocaleInfoW.KERNEL32 ref: 00007FF6235F80F0
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastValue$InfoLocale
      • String ID:
      • API String ID: 673564084-0
      • Opcode ID: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
      • Instruction ID: 09c4265360497fb845cc6557fd3ea7d1d4d2de6b460d5e4a595c98b4af00e8fd
      • Opcode Fuzzy Hash: fd4313f3ed39529f0e214070d5eb9b22141959494d17c08f529f82dcba2f0cc7
      • Instruction Fuzzy Hash: 60318032B0868286FF24AB21DC427AA73A1FB45780F548575DE9DE3695DF3CE5418701
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
      • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6235F84C7,00000000,00000092,?,?,00000000,?,?,00007FF6235ED771), ref: 00007FF6235F7D76
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EnumLocalesSystemValue
      • String ID:
      • API String ID: 3029459697-0
      • Opcode ID: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
      • Instruction ID: 343bb88fce13496851979802b33cb093bf63ca2f2777d4a484ec56101db95528
      • Opcode Fuzzy Hash: 15ac7d5427dd9fc22c9c1f247fbd5354b0666d540418ec543f069a2b87512e20
      • Instruction Fuzzy Hash: 0C110263A086458AEF148F25D8816B837A1FB81FE0F958135CA2DA33C0CF38D6D1C741
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
      • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6235F803A), ref: 00007FF6235F82C7
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$InfoLocaleValue
      • String ID:
      • API String ID: 3796814847-0
      • Opcode ID: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
      • Instruction ID: 2eece46668bd3b87725f70e4a979541a241c293b53dd9fce9ca47a29548d8bac
      • Opcode Fuzzy Hash: 02c8055d8d650acd3e8a74c68ff88f338c75fb4c0e3c19cf7d436b4e0503b1ee
      • Instruction Fuzzy Hash: CB113A32F1865283EF748725FC42A7E2260EB417A4F648671DE6DB36D4EF2DE8818301
      APIs
        • Part of subcall function 00007FF6235EED10: GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
        • Part of subcall function 00007FF6235EED10: FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
        • Part of subcall function 00007FF6235EED10: SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
      • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6235F8483,00000000,00000092,?,?,00000000,?,?,00007FF6235ED771), ref: 00007FF6235F7E26
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EnumLocalesSystemValue
      • String ID:
      • API String ID: 3029459697-0
      • Opcode ID: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
      • Instruction ID: 47bfc05def80cdfacd31e857f52489725eda750cf7f8e217dff22ef1bb9c605b
      • Opcode Fuzzy Hash: 5727eb7e919169bab7f3b731904feba02bf0749f82d0e8f83876c19ff70cc26c
      • Instruction Fuzzy Hash: 8001F572F0824146EF205B25EC427B976A1EB41BE4F558272DB2CF72C4CFBC98818701
      APIs
      • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF6235F0F7F,?,?,?,?,?,?,?,?,00000000,00007FF6235F7328), ref: 00007FF6235F0B27
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EnumLocalesSystem
      • String ID:
      • API String ID: 2099609381-0
      • Opcode ID: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
      • Instruction ID: 9ab0df9e942a5a8e945f8944475b640165e52d5bbbc792dd26cec60c9d3d7c13
      • Opcode Fuzzy Hash: 0f058bcf8847595df1816a53f4d47a97cac47f7a866e7bb19b671d0c18a11263
      • Instruction Fuzzy Hash: A9F01972B08B4183FA04DB65EC925A9A366FB99B80F548075EA8DE7765CF3CD460C341
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID: gfffffff
      • API String ID: 0-1523873471
      • Opcode ID: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
      • Instruction ID: b728f93016c7b769824af7a165d121903ba5c012a20a2525686fce047ace6875
      • Opcode Fuzzy Hash: 91511e75055787009b36da5e0b5904dd2b35cdbec92fe664924b5d59d9c2ed42
      • Instruction Fuzzy Hash: 96A14563B0978686EF21CF29A8017A97B91AB50B84F068172DE8DA7795DF3DD502C702
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
      • Instruction ID: e6d9cd1b6c69625c03ae6b3cc668452c0b53d9f99e6d3cee694e0dc0c684ec60
      • Opcode Fuzzy Hash: 5fb6afdc90124b9ccfbc1fc7428f51e6266c183c57cc2358b46b47bb293d3794
      • Instruction Fuzzy Hash: 38B16C72A0878585EF648F29C85223C7BF4F749B88F2851B6CA4EA7396CF39D441D702
      APIs
      • GetLastError.KERNEL32 ref: 00007FF6235F2A89
        • Part of subcall function 00007FF6235F0A28: HeapAlloc.KERNEL32(?,?,00000000,00007FF6235EEEEA,?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000), ref: 00007FF6235F0A7D
        • Part of subcall function 00007FF6235EE95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE972
        • Part of subcall function 00007FF6235EE95C: GetLastError.KERNEL32(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE97C
        • Part of subcall function 00007FF6235FA24C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235FA27F
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
      • String ID:
      • API String ID: 916656526-0
      • Opcode ID: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
      • Instruction ID: 7e5b13d3b8cd43e0560a17bafd9b842477538e3e8d25910e1902148472cb26ae
      • Opcode Fuzzy Hash: 211458dcc4182629a49dfa16bd233c2fd01fa5b79e8a7313d1c8d1c4e015e553
      • Instruction Fuzzy Hash: 5041F265B2974301EE709E266C537BAA680BF96BC0F444575EE8DF7B85EF3CE4008642
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
      • Instruction ID: 1c356eb182f70e9734377680b3a582e99785c4b22ea016af80cb66b08aeaffe5
      • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
      • Instruction Fuzzy Hash: EC22CEB7B3805047D36DCB1DEC52FA97692B7A5308748A02CBA07D3F45EA3DEA458A44
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
      • Instruction ID: 5d3b825dbee109a967e869bf1479519b3c8b189f547c64ba6db977c9f44ae900
      • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
      • Instruction Fuzzy Hash: 66C1DC73B186A58BEB09CE26E951569B792F7C4BD0B55C134DA0E67B88DF3CD801CB00
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
      • Instruction ID: 97de3b5104f9d7e6623ed680764242e230e57c746452908791cb27633546d390
      • Opcode Fuzzy Hash: 3e5dc7f97a53f24eb071f4a4c5281cd4cfcae3ea760a8a1df74637965631acf6
      • Instruction Fuzzy Hash: 2CD1E422A0874286EF68CE29D85227D27A1FB09B48F1452B5DF5DB76D4DF3DE841C342
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
      • String ID:
      • API String ID: 4023145424-0
      • Opcode ID: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
      • Instruction ID: c94a0c36471d07c93107ae932fd902569cd4d0fe633324c83385dbab2218ed2c
      • Opcode Fuzzy Hash: 21e64ea7c375e93a6d3691ec49e9bdd76ef4fc5f4d0d1dcdba5dc2295bd766ac
      • Instruction Fuzzy Hash: C4C1D466A0878249EF609B629C127BA67E0FB94788F404076DE8DF76D9EF3CD541C702
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$Value_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1500699246-0
      • Opcode ID: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
      • Instruction ID: 213ea04fc42f92b8c1cf30848c7f3eeb4cc19dadbf556d3c9e2a3cf2f372c8cb
      • Opcode Fuzzy Hash: d774b1686d68766547d9d0affe500116b26f703ac014ee2f743871d76f2ddb8c
      • Instruction Fuzzy Hash: 61B1D022A1864682EF649F25DC126B933A1EB45BC8F404275DE4DF76C9DF3CE541C782
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
      • Instruction ID: eaf22552c118c07571bc74d35fc3007aac0065bdc9f839948502a53f217036fa
      • Opcode Fuzzy Hash: 9cf611d711d996cef35472e7504a5935af8ed11963d98eb5a37693ba2286e55b
      • Instruction Fuzzy Hash: F4B19F7291874585EF648F29C85227C3BE0EB49F88F2811B6CB4DA7396CF39E841D746
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
      • Instruction ID: c4a64ccfb2a90f0d30e26169038f94ee4a80f933452476d56abcfe623b5226d1
      • Opcode Fuzzy Hash: c771e48c11f0d915594974b4bba5b1cef921b70c42e7a63ac30c42f7e56c6b99
      • Instruction Fuzzy Hash: 1981A176A18B5186EF648F25D88237923A0FB84BA8F144676EE6EF7795CF38D0418301
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
      • Instruction ID: 64777c795675ff3620574a30385c68a2346ef9b4f67627324af23d85b9c63b01
      • Opcode Fuzzy Hash: c06df77d5c41abf0c9103d11d2ff5cfa312f76e721c7628385afe64dabe37a34
      • Instruction Fuzzy Hash: 5381D272A0878186EFB48B19E84237A6B91FF56794F484275DE8DA3B85CF3DE5408B01
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
      • Instruction ID: f1ed803bb26c853c642f9dfa635114602febb033e0ad8b7e35627c422fb70bbf
      • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
      • Instruction Fuzzy Hash: 8661E662B18BCD82DE208F59F8426A96360FB59790F549335EB9DA7B54EF3DE180C340
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction ID: 2962f31ab6ca0feba2a21f19ad6247d3861f604dac2b731fe3aaa47155d1be6a
      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction Fuzzy Hash: C2519276A1875186EB248F29D89123833A1EB44B68F288571CE4DB7794CF3AE843C741
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction ID: 46693d545f5ae9a163b69e14be56877d11eaf08e190711b9657fde26398d26f2
      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction Fuzzy Hash: DC519D36A18B5182EF648F29C85122C37A1EB48B68F248571DE4DB77A4CF3AE843C741
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction ID: 48475c190c7c1cf6d905e24755e5b94a0bc2d29e405c87abf62290f39674ea2a
      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction Fuzzy Hash: 8351A176A18B5186EF248F29C44123837A0EB44BA8F258571CE4DB7795CF3AEC53D781
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
      • Instruction ID: e4ec2c82bf75ce59960429d66fe8e898935d79b78f7bf63e097dcebf9d1aa26a
      • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
      • Instruction Fuzzy Hash: 4351B377A1875186EB648F2AD44133C37A1EB44B58F2845B2CE4DB77A4DF3AE842C781
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
      • Instruction ID: 2fe903500dbd0f01123f8b06e9d34259810356eac98a671e0158bc9e467afa09
      • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
      • Instruction Fuzzy Hash: 38518D72A1875586EB248F29C84127837B0EB48B68F384571DE4DB7795DF3AE842C781
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
      • Instruction ID: cf42e2d80941d5939bb66525166259ad2c02258ba1f6bd06bfdfa669e85cef3a
      • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
      • Instruction Fuzzy Hash: A551A377A1879186EF248F29C84523837A0EB44B59F248571DE8DB77A4DF3AEC42C781
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
      • Instruction ID: f64652a6ae1de06d6bb59aff8d82d8dadff4c4154830825fe858519cef5dfdad
      • Opcode Fuzzy Hash: 992bdeb28752ac81bb160f4e9466717d9b532df2d17ea574ae2dd87a94b6b211
      • Instruction Fuzzy Hash: 2041D172714A5582EF08CF6ADD25169A3A1BB48FC0B49A032EE8DE7B58DF3CD4428340
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
      • Instruction ID: 3f4867af5ae1b2e9116dc21f66924572d48eb97ecf2b3a13a72f1b4065891b18
      • Opcode Fuzzy Hash: 6db13767cb4ef8546692f7daaddc1c348767b8ea185383b737debd21f48b2f6e
      • Instruction Fuzzy Hash: FCF044716582558AEB948F68A813A297798F748380B908479D58DD3F14DB7CD0509F09
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
      • Instruction ID: 7eca23d234f7e567c6c60f9a891be01b74d191a48992c7d1311b307ef0168b13
      • Opcode Fuzzy Hash: 9500c7797480eaac07bce270d35ebf5893055aa53205c196292c9b063e5a007a
      • Instruction Fuzzy Hash: 1EA0022190CE47D0EE048B00ED5213023B0EB96B01B4D00F1C40DF14A09F3DB540C397
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
      • String ID:
      • API String ID: 4058177064-0
      • Opcode ID: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
      • Instruction ID: dc96b266e8c26585ed017fa63904918ecacf2150da4bc685a44014443bc7377d
      • Opcode Fuzzy Hash: d4a00dac0fba48dd619eb6ba1b780ae101c1c81bf132304460c16c28b79e9ffb
      • Instruction Fuzzy Hash: CF918D76B08B8297EB599B21DD566B973A0FB44744F004975CB6DE3AA0CF3CE4A4C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
      • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
      • API String ID: 1783372451-551013563
      • Opcode ID: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
      • Instruction ID: 3302dfa8a9c6ceb4e3db101ee7af39eefb1d806964ca3ec6658dd6d9100354f7
      • Opcode Fuzzy Hash: eac3ac33eed5e84588de99090fdd2237e456d1a0e0148cdd7090aa018ec508cf
      • Instruction Fuzzy Hash: 94615B32A18B8685EF20DB61DC422E923A0FF89748F444176DA4DB7A99EF3CD645CB41
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
      • String ID:
      • API String ID: 1455939504-0
      • Opcode ID: e29aee751ba035bfa70c15ae0e3b0f7247e17a471693f6df1d39858999031e9a
      • Instruction ID: 2fbcbcd1945130e37de4af129045be748488025c0806f685b074c955d225a50e
      • Opcode Fuzzy Hash: e29aee751ba035bfa70c15ae0e3b0f7247e17a471693f6df1d39858999031e9a
      • Instruction Fuzzy Hash: 5D516172608B9186EB208F21E84566AB7A5FB85BA4F100235EE9DA3F98CF3CD045C705
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
      • String ID:
      • API String ID: 2081738530-0
      • Opcode ID: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
      • Instruction ID: a9ef9c8b2c52f7ff9a6896eed249985fc66fb55d63eb7481af06a22e7a951065
      • Opcode Fuzzy Hash: abf8e540b54f698cc9b45021eb612f4fee3d5b077170ba2ec9f9a82e9aa791c4
      • Instruction Fuzzy Hash: BE518E32A08B4685FE519B25EC061B923A5FF55B90F0802B2DA9DB77A5DF3CE443D302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
      • String ID:
      • API String ID: 957247320-3916222277
      • Opcode ID: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
      • Instruction ID: a5f8e8e8f963b29902f508ee0ab0e025abafed032b5a1dd4ae1b59d07f7b8223
      • Opcode Fuzzy Hash: 2310baa555e0df77a8bcfccd4f7fd94b27c56680d13eb448f7d2580fe2531f2f
      • Instruction Fuzzy Hash: 48716BB2A087828BEB618F29D885769B7E0FB44B48F144474CB4DE36D5CF7DE4868B41
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
      • Instruction ID: 9637e26df39d94919ebb656c66a43a59600cfdfc46769b43a19d94c6d2a1860b
      • Opcode Fuzzy Hash: cb0b3ee4ce24505bbac61aa70540e6acda4bbb341cea077ae408a959c4223429
      • Instruction Fuzzy Hash: BE618F32B08A4282EB589B12DD4A67D6365FB85B88F804871CE1EF76D0DF3CE859C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
      • Instruction ID: ed069e92236172d7025181ed9982fdc3b2ef70c40ac83622acb9e8f748f7541f
      • Opcode Fuzzy Hash: 31685a7c47cc355b0b84d769594d8f48275261b6e3cd822618b6b5c873848fb6
      • Instruction Fuzzy Hash: 04316B21B1CB8286EF589B569C8E1796361FF45B88F5408B4DE8EF7AD0CF2CA445C302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseValue$CreateDeleteOpenlstrlen
      • String ID: Software$VenNetwork
      • API String ID: 3197061591-1820303132
      • Opcode ID: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
      • Instruction ID: 5609330b5dcda39b3851cf7efaa45495ddd63995363bf1e0503add9793291963
      • Opcode Fuzzy Hash: b270a5905e67aa2bd04960c5a5af98d5e64a07028cd1629e036b508084a2e799
      • Instruction Fuzzy Hash: BB216F36608B4087EB108B22FC4566AB765FB85BE5F444131DE4EA3B68CFBCD149CB05
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalErrorLastSection$EnterLeave
      • String ID:
      • API String ID: 2124651672-0
      • Opcode ID: ba3e2043a30928e4cf0dd0a6aa21304fb3d64fad1c8207218715581e30546e70
      • Instruction ID: 487a537cfcc0c548a4b415e217ec5626af4dd4e304fe28fef7375016cae9ec84
      • Opcode Fuzzy Hash: ba3e2043a30928e4cf0dd0a6aa21304fb3d64fad1c8207218715581e30546e70
      • Instruction Fuzzy Hash: 2351DD32A086428BEB649F11E84653C77E5FB48B88F094579DE4EB7791CF38E901C742
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$f$p$p$f
      • API String ID: 3215553584-1325933183
      • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
      • Instruction ID: 03326b666496861b2ed0d8af703911ef0734be598df87202784bf943078c0b1b
      • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
      • Instruction Fuzzy Hash: 521272B2B0C35386FF209E14E9466797262FB88750F884171E69DB76C4DF3CE9808B16
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
      • String ID:
      • API String ID: 2911610646-0
      • Opcode ID: 34ebcb83ecca3e20ff49f256afc65ca9a808d404bf61d5c783bec37bfef76818
      • Instruction ID: 4a9e3725317065928bfe68ff7c9c0eb749f840af784f514644bcda195f63645d
      • Opcode Fuzzy Hash: 34ebcb83ecca3e20ff49f256afc65ca9a808d404bf61d5c783bec37bfef76818
      • Instruction Fuzzy Hash: 45518B72A09B8287EB158F25E90976973A0FB44748F000534DB4CA7B90DF7DE465CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
      • String ID:
      • API String ID: 3019579578-0
      • Opcode ID: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
      • Instruction ID: 42a0dac32e141d8099e304626b37259b1565be8303497822e5540c94b077d074
      • Opcode Fuzzy Hash: 4019db875c6352495a6e2a967cb07e89537093c69e3cddfa206385f108ce449b
      • Instruction Fuzzy Hash: F3415B3290874287EB708B52E80623EB361FB84758F1409B5DA4EB3AD4DF3CF8858742
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterErrorLastLeave
      • String ID:
      • API String ID: 4082018349-0
      • Opcode ID: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
      • Instruction ID: bd2f8437412471316ee50e7359c2c91485df13ef13b45f335a91df1e25e8a649
      • Opcode Fuzzy Hash: bf041e3c240114bd2df664f35279ad8215a3420238d0dd4b213a5f2d55893e77
      • Instruction Fuzzy Hash: AB313B72A18A428AEB948F65D84927D33A4FF44B4CF4408B1DA0EF6694DF3CE499C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 849930591-393685449
      • Opcode ID: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
      • Instruction ID: 4e117cce551e98f2f08015c9d63351f7791022ea7cfaa282f3f4f1157c3e1a4d
      • Opcode Fuzzy Hash: cb5b3d42660800b6706ee9e5169d6ae77bc1ec10b54460efee445a81ffa0bcf3
      • Instruction Fuzzy Hash: AFD17F32A0878586EF24DB65D8423AD77A0FB49798F100175EE8DB7B96DF38E191C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressFreeLibraryProc
      • String ID: api-ms-$ext-ms-
      • API String ID: 3013587201-537541572
      • Opcode ID: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
      • Instruction ID: 9b6bb49964131fd39dc96ff36a06a149568fb511b37583a7e29fb302c304136d
      • Opcode Fuzzy Hash: c5e8058506f29389ada01458bdd8bed04f407a28a220f5367f3ecbd3c22801fb
      • Instruction Fuzzy Hash: 6041F161B19B0281FE15CB16AC0227A6295BF16BA0F494576DD4DFB784EF3CE4458302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
      • String ID: %s %s
      • API String ID: 958574092-2939940506
      • Opcode ID: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
      • Instruction ID: b1242a108d66212853ad98aecf1c081c74d48df3f637fe7531dad1c8c04f334a
      • Opcode Fuzzy Hash: 9d4b93ecebe44ad3dcfc41bef5c72ffa3e96dd61b2b13565d963145b1ed2cd72
      • Instruction Fuzzy Hash: 2D416226A18BC681EB118F2CD9052FD2360F795B4CF11A321DF4C66692EF39E2D5C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterLeave$ErrorLastsend
      • String ID:
      • API String ID: 3480985631-0
      • Opcode ID: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
      • Instruction ID: 3bb86c89cefeca6e7e402712b88e05a8ce37f839b076f2d83189bb67a95fb4b9
      • Opcode Fuzzy Hash: 223d6e403172c637e9da5f06492e840e62a0238e832c6a19f43c9c4cbc36de86
      • Instruction Fuzzy Hash: A1418D72608B8282EB558F26E9456AC73A4FB04F9CF180575CF1DA7B98CF38E551C711
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$p$p
      • API String ID: 3215553584-1995029353
      • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
      • Instruction ID: c14f016fbf616df6ea894eb2b3c1f354b842c32dbefad8dd8f9bee5c1c220484
      • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
      • Instruction Fuzzy Hash: 3A12B462E0C35386FF245A15E9566BA72B6FB80754F844175EA8DF7AC4DF3CE4808B02
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
      • String ID:
      • API String ID: 2807917265-0
      • Opcode ID: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
      • Instruction ID: 0307d099120e8df021c8473a4302219e267b4ce5089a8c1e977a905310e4a63f
      • Opcode Fuzzy Hash: b86a4d89a2a610e9370193a82eb041067802b0227bafa79ad6b9f02f0420e125
      • Instruction Fuzzy Hash: 0E516DB170874286EF618F259C46A7923A4EB05B5CF141A71DE2DF76D9DF38E4808742
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
      • String ID: bad locale name
      • API String ID: 1386471777-1405518554
      • Opcode ID: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
      • Instruction ID: 72c339d0248bf8ed6274fe64c3f3ae9f1b998627450faab1521a99c337d2dc13
      • Opcode Fuzzy Hash: 69cc4a8b7b19662485723bada806c81d00e2c443d81482d7207a293efd463004
      • Instruction Fuzzy Hash: 8E518622B09B458AFF14DBB0D8522BC33B4EF84748F444575DE8EB6A9ADF38E5568301
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
      • String ID: bad locale name
      • API String ID: 3908275632-1405518554
      • Opcode ID: 547efca0749532fe16a4a51e07bad1bbee508b3b10b870f5b11536083eee9189
      • Instruction ID: f9fad232a545e618948c83b5ef74b264e3bca1106acc61b9e71967b2dc130879
      • Opcode Fuzzy Hash: 547efca0749532fe16a4a51e07bad1bbee508b3b10b870f5b11536083eee9189
      • Instruction Fuzzy Hash: 59516722B09B4689FF50DBB0D8523BC33A5AF89748F444175DE4DBBA9ACF38D5469302
      APIs
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6235E3A7E,?,?,?,00007FF6235E3770,?,?,?,00007FF6235E03A9), ref: 00007FF6235E3851
      • GetLastError.KERNEL32(?,?,?,00007FF6235E3A7E,?,?,?,00007FF6235E3770,?,?,?,00007FF6235E03A9), ref: 00007FF6235E385F
      • LoadLibraryExW.KERNEL32(?,?,?,00007FF6235E3A7E,?,?,?,00007FF6235E3770,?,?,?,00007FF6235E03A9), ref: 00007FF6235E3889
      • FreeLibrary.KERNEL32(?,?,?,00007FF6235E3A7E,?,?,?,00007FF6235E3770,?,?,?,00007FF6235E03A9), ref: 00007FF6235E38F7
      • GetProcAddress.KERNEL32(?,?,?,00007FF6235E3A7E,?,?,?,00007FF6235E3770,?,?,?,00007FF6235E03A9), ref: 00007FF6235E3903
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Library$Load$AddressErrorFreeLastProc
      • String ID: api-ms-
      • API String ID: 2559590344-2084034818
      • Opcode ID: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
      • Instruction ID: 00a0cc0352c1e0e30ce52f3e791cf45ea7b58da2eb18557997d121bd59760ec9
      • Opcode Fuzzy Hash: bdcdafd802d049a58c0b09305f9ac5b25268f61174ed16779f6a01e1bd42f6da
      • Instruction Fuzzy Hash: 7831AE21B1FB4291EE65DB02AC025762394BF48BA4F5A0576DD1DBB790EF3CE445C302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AttributesCreateErrorFileLastProcesslstrlen
      • String ID: WinSta0\Default$h
      • API String ID: 591566999-1620045033
      • Opcode ID: 1ceca65180fb4a563620d507f9660d1a76dcb955b3d7348028c680a32d12ef86
      • Instruction ID: 9d7b500770b0a687b0237bf37807427f6e35a2eae28f569c54b41216b4750289
      • Opcode Fuzzy Hash: 1ceca65180fb4a563620d507f9660d1a76dcb955b3d7348028c680a32d12ef86
      • Instruction Fuzzy Hash: 57319522A0C7C245DA709B14BD0137AA391FB85790F014335EA9DA7B99EF3CD0848701
      APIs
      • GetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED1F
      • FlsGetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED34
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED55
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED82
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EED93
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDA4
      • SetLastError.KERNEL32(?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F,?,?,?,00007FF6235E66E3), ref: 00007FF6235EEDBF
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
      • Instruction ID: 44a1c6ba5138033fb46c131877c56ba3ce07e0adf8f886c9092e74da97af678a
      • Opcode Fuzzy Hash: f2de6421f07b29a90cfdc6310c4a09f0568ac7a9393794dea83b72160e9ddcb3
      • Instruction Fuzzy Hash: 12214924A2D70342FE9863615E4717952529F85BA4F190BB8ECBEF7BD6DF3CB4418202
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
      • String ID: CONOUT$
      • API String ID: 3230265001-3130406586
      • Opcode ID: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
      • Instruction ID: bf11c6b751a56182af7c1339ac073cf4f7db7b06f9070c092522778251b66b93
      • Opcode Fuzzy Hash: 459cac5f161fe15dedf5efeb1a5c45af724dbddd491f92cbd2d9a7ab51bbc5e3
      • Instruction Fuzzy Hash: A6119031B18B4186EB509B12EC46729A6A4FB89BE4F000274EE5DE7BA4CF3CD5149742
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
      • String ID:
      • API String ID: 4202892810-0
      • Opcode ID: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
      • Instruction ID: f7f8d440b34ea085b65ea88ff0babc6fcf50038b18ae9b0f297011661b250417
      • Opcode Fuzzy Hash: 1770146ed1a2281a067c6a80d48e2834b530e15e6b9c6a9fb3f6106c2579b985
      • Instruction Fuzzy Hash: FC115175608A4282FB10DB55FC19725B760FB85BA4F044270ED6E63BE4CF7CD4498701
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$CloseDeleteOpen
      • String ID: Console$IpDatespecial
      • API String ID: 3183427449-1840232981
      • Opcode ID: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
      • Instruction ID: 7749fef6a3e45109941ad5a48ed8ce8d437cfcc848937b1c694a85fb2d40a0a7
      • Opcode Fuzzy Hash: 227ad8f4b06cdb6b08930102bada313d7f8b98b7889bc09013c0be248a67a942
      • Instruction Fuzzy Hash: B5015E36608EC286EB218F24EC167693764FB85B55F044162CE4D63B54DF3CD199CB05
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
      • String ID:
      • API String ID: 3421218197-3916222277
      • Opcode ID: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
      • Instruction ID: a77f2a6f7dca600d483b829387df7e83da0f022e6e61d137c0304fdd770dc48c
      • Opcode Fuzzy Hash: aa1260efbfd046cd4269c4db6a47a0747b5d48ad13e0b0b72107f694596a2f32
      • Instruction Fuzzy Hash: 3FF01D32618B8286DB609B20F84975AB3A0FB89744F500235EA8E96F64EF7CC149CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLast$recv
      • String ID:
      • API String ID: 316788870-0
      • Opcode ID: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
      • Instruction ID: 7b13804e40c34f4448ae14573984c38c4e0aaab353b5cd5aa0259ae292f44f73
      • Opcode Fuzzy Hash: 1bfb22ba95e7e7656d2d5e0fb302539e9b3bee6e0c9b932fa958a4b538105933
      • Instruction Fuzzy Hash: 96315B72B0CA4282EF618F29E84676D63B1EB45B48F540976CE0DE76D8DF3DD8848706
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 3523768491-393685449
      • Opcode ID: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
      • Instruction ID: 7cf712737710c93074518afc760a87d20fe62eef67b9362acb7444734c28e695
      • Opcode Fuzzy Hash: f0c8ce6e5c114cb55c7e972b5d7e00f12528d3fa075699b5c4d5ef1c378b05c7
      • Instruction Fuzzy Hash: 18E1D373A087828AEB249F35D8422AC37A0FB44B48F145175DE9DB7796DF38E582C702
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
      • String ID:
      • API String ID: 2235205178-0
      • Opcode ID: 590f28aa241335ba61f28d79a4cf37bde6970dd5790133cda3c336355218676e
      • Instruction ID: afc352ca76ca29f00ec0a11bcff4738d563ab94a0ffd2ebdb3b31334ccd3882a
      • Opcode Fuzzy Hash: 590f28aa241335ba61f28d79a4cf37bde6970dd5790133cda3c336355218676e
      • Instruction Fuzzy Hash: 4C217C32A08A8182EB50CF26EC4526973A4FB89F98F184971DE4DF77A8DF38D441C741
      APIs
      • GetLastError.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEE97
      • FlsSetValue.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEECD
      • FlsSetValue.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEEFA
      • FlsSetValue.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEF0B
      • FlsSetValue.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEF1C
      • SetLastError.KERNEL32(?,?,000045EA9EF29F99,00007FF6235E8DA5,?,?,?,?,00007FF6235F27E6,?,?,00000000,00007FF6235EA69B,?,?,?), ref: 00007FF6235EEF37
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
      • Instruction ID: 12560377369a3525d1c4affd89dc33a0013d53a559cb0e66290ebe12db790058
      • Opcode Fuzzy Hash: 3654d854b1b7b54d09208102c236c7adbe92e0b1e90858cb6ea83a43bfdf338d
      • Instruction Fuzzy Hash: 2D116A20A2D74342FE5467216D4703962526F89BB4F1806B8ECBEF77C6DF3CB4028202
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
      • Instruction ID: 64ed8bb6614c576689ee6cc7f34b29876c2446bd73d3cfb078b79e6a9e771111
      • Opcode Fuzzy Hash: 69936be9a3c9092073ccdecace5a334f9bb4337f6d94747144cad9e03172cb9f
      • Instruction Fuzzy Hash: CFF06265A1DB0281FF108B64EC463396364BF49762F5806B5C96EF56E4DF3CD449C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseDeleteOpenValue
      • String ID: Console$IpDatespecial
      • API String ID: 849931509-1840232981
      • Opcode ID: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
      • Instruction ID: 7b7c1f6d212260709ec357d0f550afd8635d6bc7d6c9e2724587108296fdc897
      • Opcode Fuzzy Hash: 428edfecf080eeaca7e0c1c67ef556d191498152a1b600a56db6dc59e929ff35
      • Instruction Fuzzy Hash: 0DF0FF36608DC286EB208B14EC117A96364F78476AF004171CD1D77A68EF39D1998B05
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: AdjustPointer
      • String ID:
      • API String ID: 1740715915-0
      • Opcode ID: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
      • Instruction ID: 6d56afd12b2f69b7f1cf63f8336e210dd4f288ac7e496f17e211488f02072593
      • Opcode Fuzzy Hash: 95c273c5d9a602b1e514679a9057b242ded82a174dba946a287035d63dc3020a
      • Instruction Fuzzy Hash: 8FB18F22E0EB5681FE659F12984223D63A4EF54B84F0984B6DE8DF7785DF3CE4428742
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
      • Instruction ID: 679085874d711da314797735f9aeb481a2c176af4182bcb3aa3b9f5df436b51d
      • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
      • Instruction Fuzzy Hash: 5A117362E1CA0301FE641128DF5737561616F673B0F5906B4EEAEF62DACF2CB8404213
      APIs
      • FlsGetValue.KERNEL32(?,?,?,00007FF6235E3C9B,?,?,00000000,00007FF6235E3F36,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235EEF6F
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235E3C9B,?,?,00000000,00007FF6235E3F36,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235EEF8E
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235E3C9B,?,?,00000000,00007FF6235E3F36,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235EEFB6
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235E3C9B,?,?,00000000,00007FF6235E3F36,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235EEFC7
      • FlsSetValue.KERNEL32(?,?,?,00007FF6235E3C9B,?,?,00000000,00007FF6235E3F36,?,?,?,?,?,00007FF6235E3EC2), ref: 00007FF6235EEFD8
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
      • Instruction ID: 735ec2dbef0e7b8d787a79c0ac6713d07e74031fb4b16fa4a2c3381e1095a1b7
      • Opcode Fuzzy Hash: 4047813a2c2501da88736eb8979464a470432fe091b6a2381c64cb1679d0dde5
      • Instruction Fuzzy Hash: 4F117F20A2935342FE9853259D4317952416F45BF4F1857B8ECBDF67D6DF3CB4428202
      APIs
      • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F), ref: 00007FF6235EEDF5
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F), ref: 00007FF6235EEE14
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F), ref: 00007FF6235EEE3C
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F), ref: 00007FF6235EEE4D
      • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6235F7113,?,?,?,00007FF6235EF444,?,?,?,00007FF6235E843F), ref: 00007FF6235EEE5E
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
      • Instruction ID: 0037c79c78daab39ce0ff5eb44980c0589f65dfb41116d0f132787731288ea34
      • Opcode Fuzzy Hash: f4b63a2d358e16832ea89596edc1dbf90b4b2fd2f1616095919a36d422ba38cd
      • Instruction Fuzzy Hash: 7F11F724E2930346FE9862215C5717922825F56B74F1C1BB8EDBEFA2D6DF3CB4419243
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$EnterLeave
      • String ID:
      • API String ID: 3168844106-0
      • Opcode ID: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
      • Instruction ID: 09b51a2d9446dfb872106853abb652f930e5a1399970fbb59a702b76014b74cd
      • Opcode Fuzzy Hash: 7d1c33e0fc199dc1a1b2b98ae86d416f77ce0655480dcc5f384a8a26f1c27f0c
      • Instruction Fuzzy Hash: 1D11F132628A42C7EF509B65F8953A963A0FB44759F841471DB8FA6B94CF3CE486C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
      • String ID:
      • API String ID: 1513102227-0
      • Opcode ID: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
      • Instruction ID: d98ea987c817ee4813a30bd96f08ab08d7a707bcbc5530f56d0b85cb409492c5
      • Opcode Fuzzy Hash: cb3a45266a7c72afb3eef7b31d32061257325c5ad6beb33f20a6e81f88ef5b24
      • Instruction Fuzzy Hash: 4A113D32519F8281EF108F29E85502873B4FB44F68B284675DA5D667E0DF39D557C341
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
      • String ID:
      • API String ID: 1535946027-0
      • Opcode ID: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
      • Instruction ID: 317e9c73f36489d33eb9996a5b3e525ecd4060e824a1c3c3e06e034c60e15500
      • Opcode Fuzzy Hash: 311de798c0593289d29e071e9f78a1d734eb52b4581ef33c1cbfd426072e5f36
      • Instruction Fuzzy Hash: CBF0EC35608E4583EB149F29EC591692321FB8AF69F184670DE2EA73E4CF38D885C351
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CallEncodePointerTranslator
      • String ID: MOC$RCC
      • API String ID: 3544855599-2084237596
      • Opcode ID: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
      • Instruction ID: b93c212384eb30c6f3ec65bb4c1af079bad5d44f2a9e03f5d3fc7747bb5d2c70
      • Opcode Fuzzy Hash: 85eb8fbd3e06a99c4afa559b4d80cf249f4e954e0195537aa802c98b0a840f84
      • Instruction Fuzzy Hash: 6291C073A087958AEB14DF65E8412EC7BA0FB04788F104169EE8DB7B55DF38D292CB01
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
      • String ID: csm
      • API String ID: 2395640692-1018135373
      • Opcode ID: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
      • Instruction ID: 5c3f1ddfc2ec6504eb7d13a5f88d47ca068bd8ee450150b9a9d9474de922fe70
      • Opcode Fuzzy Hash: c305225e0e2b3a2203a822812f960376c115b044745f784688940b7b0a399dcc
      • Instruction Fuzzy Hash: FE51BD32B097468AEF94CB15E845A787392EB44B88F148171EA4EE7789DF3CE881C701
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
      • String ID: csm$csm
      • API String ID: 3896166516-3733052814
      • Opcode ID: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
      • Instruction ID: 6790a40a79f63237f30a5e7e72e30b547895ef77f1d63b8ce270d7a76517d1a7
      • Opcode Fuzzy Hash: 544592ab7251effa554c0990b2f03f08321f7b0f5e6baf8f1fc1d42750b8d711
      • Instruction Fuzzy Hash: 9E51BF32A1838686EF68AF119C4636837A0FB55B94F1441B5DA8CB7BD9CF3CE490C702
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: FileWrite$ConsoleErrorLastOutput
      • String ID:
      • API String ID: 2718003287-0
      • Opcode ID: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
      • Instruction ID: 13104d50926e3cb524d5c082000bfa2eec43a18e3b97476b19a4c04827f20bcf
      • Opcode Fuzzy Hash: b0a5a2f5e03aa4de9bb2610dcdd396f5b9cdbd820afb8483674e8d26cbad73da
      • Instruction Fuzzy Hash: F3D1F132B18A8189EB11CF65D8412AC37B2FB45798B0442B6DE5DF7BA9DF38D446C702
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 73155330-0
      • Opcode ID: 9836cfd4f00772ab983df51a940828b549011ef8ebab5eaf54ddafcf2ed5cfb4
      • Instruction ID: 59de96c3c27c4f826a875366f5d939d9ce3b840f6909e9f5737aeb9ef6e21be1
      • Opcode Fuzzy Hash: 9836cfd4f00772ab983df51a940828b549011ef8ebab5eaf54ddafcf2ed5cfb4
      • Instruction Fuzzy Hash: 2291E362B05A8A85EE14DB65D8462BD6361FB04BE0F948A71DF2DB7BC9DF7CD0818301
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3668304517-0
      • Opcode ID: d455572cb0b53bd605dd2c5479bbb32fa5d957f89605b264ea43e35a7a78a5b6
      • Instruction ID: 6d84bfd2048539ab553117566005e34ecdbd18829945ffd185dcbdea6a5f3ec2
      • Opcode Fuzzy Hash: d455572cb0b53bd605dd2c5479bbb32fa5d957f89605b264ea43e35a7a78a5b6
      • Instruction Fuzzy Hash: D5B17C63F14B5985EF008FA4D8457AC2372FB08B98F405266DE6D77A99DF78A481C341
      APIs
      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6235FB36F), ref: 00007FF6235FB4A0
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6235FB36F), ref: 00007FF6235FB52B
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ConsoleErrorLastMode
      • String ID:
      • API String ID: 953036326-0
      • Opcode ID: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
      • Instruction ID: ce9434a2984da29e23aca6b7fda80520ab46259c562c1bdf042e60b3c0605746
      • Opcode Fuzzy Hash: c0b9c452233083e8ba344db7b85cdb6942af15e1945070f1535423c6b6b64ca2
      • Instruction Fuzzy Hash: FA91B372A08A52C5FF50CF65D8822BD2BA1BB06B88F1441B9DE4EB7A95DF3CD445C702
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
      • String ID:
      • API String ID: 3936042273-0
      • Opcode ID: 6b86777ed2056881ec85e37c8b53bc7b1ae53672222ced7e915cb6963593c230
      • Instruction ID: 5d7d8d835399d715b0019d4bf06c38beea327f2bfd7ac1ba1983c970e37a3409
      • Opcode Fuzzy Hash: 6b86777ed2056881ec85e37c8b53bc7b1ae53672222ced7e915cb6963593c230
      • Instruction Fuzzy Hash: F171AF62B14B8A85EE04DB25D80936C63A1EB85FE0F558671DEAC67BC5DF7CE481C302
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 4260596558-0
      • Opcode ID: be836d38096120c0cd8b151b43bf66e5befb7495844985f2fd7b9594a703298f
      • Instruction ID: 53f59144c0c5b0129fbefbe7ff50f42c095698bcffc0c89c5030b69d75232f7e
      • Opcode Fuzzy Hash: be836d38096120c0cd8b151b43bf66e5befb7495844985f2fd7b9594a703298f
      • Instruction Fuzzy Hash: 0E71D362B0878691EE209B25D84227E63A1FB85BA8F448771EE7EA37C4DF7CD540C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: Virtual$AllocInfoProtectQuerySystem
      • String ID:
      • API String ID: 3562403962-0
      • Opcode ID: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
      • Instruction ID: fe4fc1697f83f230ca3afe520c31071bd3e683cf2c192a266098d70480fe0f81
      • Opcode Fuzzy Hash: de052ff2da3a860ebe00b2b1188a3b3a24b5d5626fd4b16e4c5629aca21b164b
      • Instruction Fuzzy Hash: 6F314A32714B859EDB20CF31DC557A823A5FB48B88F444026EA4DA7B48DF3CE646C741
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterEvent
      • String ID:
      • API String ID: 3394196147-0
      • Opcode ID: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
      • Instruction ID: 23ebc0f126c6dcd4bdbe4f7f87d5450296a03bd5c61f6737e8d903d40bbd1392
      • Opcode Fuzzy Hash: 401af7361c6d18c862ea4f071fb6758f38da9ad67756e4e78bac1cd16ae14490
      • Instruction Fuzzy Hash: 28214832708B8193DB48CF2AE9842ADB3A4FB48B84F544435DB6DA3765DF38E4A1C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
      • Instruction ID: da7ec5065b68a217c03e0632a32891770c508946f8aba7b9853193f243764912
      • Opcode Fuzzy Hash: e05f7aef3380f0f9b3312b24ce1aa7c1f593c40dbd43f636e11a9c4c637e2614
      • Instruction Fuzzy Hash: C0111C36B15B058AEF00CF60EC552B833A4FB19758F440A31DE6DA6BA4DF78D1548341
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CancelEventclosesocketsetsockopt
      • String ID:
      • API String ID: 852421847-0
      • Opcode ID: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
      • Instruction ID: e51b3ec9bf27042ffadbb9009804fb316b59eb01be47756a461292ee2e950c0c
      • Opcode Fuzzy Hash: 3e6bea74e94700dfcc8d9d47a61c466b5b5c0e1f507d80d6be11655914b66227
      • Instruction Fuzzy Hash: DCF04632608B8182DB148F25E85832AB330FB89BA4F104335CBAC97AA4CF3DE0658701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ObjectSingleWait$Sleep
      • String ID:
      • API String ID: 2961732021-0
      • Opcode ID: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
      • Instruction ID: 531b261d0e7b1f8980d9a4cffccdea940abeb7405093bbbed611911027a24c16
      • Opcode Fuzzy Hash: 83ddd93f6670c03bec4b7f128343a3e6a6daf1263786cfff0f95db90d503808b
      • Instruction Fuzzy Hash: 2DF0DA72708E4487DB509B39DC592283262EB8AB39F550370CE2DA73E4CF38C4858355
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: __except_validate_context_record
      • String ID: csm$csm
      • API String ID: 1467352782-3733052814
      • Opcode ID: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
      • Instruction ID: 03558ad2b601a8a7a390e1333a85b90d2faffad0028188236a791302f6ad4125
      • Opcode Fuzzy Hash: f15189d2199330c0f402dae8ecdfa2ca81426a1eff024833c44a8ddbe4b12987
      • Instruction Fuzzy Hash: 1071BE72A1878186DF609F22D8516797BA0FB04B84F1481B2DE9CB7A89DF3CD591CB02
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: EncodePointer
      • String ID: MOC$RCC
      • API String ID: 2118026453-2084237596
      • Opcode ID: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
      • Instruction ID: c28af95fd88cceaceb3942386c257ac13dd4b28c596a8b960578881002e187ab
      • Opcode Fuzzy Hash: ff6c3586205ef54b92cc1381aa76c713ce5aef96bda724e5a14e442f6a8185ef
      • Instruction Fuzzy Hash: EA61A032908BC581DB248B15E8413BAB7A0FB85B94F044265EF9DA3B55DF3CE191CB01
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CloseHandlewsprintf
      • String ID: %s_bin
      • API String ID: 3088109604-2665034546
      • Opcode ID: 66361e1af3ee593cea34195adac24433fb7505641dbd06c9474f0aaa8f9553f0
      • Instruction ID: bf483efc73b1dbbddb407ffca8b2eb31d59279d926297293741095cd0c1e8f33
      • Opcode Fuzzy Hash: 66361e1af3ee593cea34195adac24433fb7505641dbd06c9474f0aaa8f9553f0
      • Instruction Fuzzy Hash: 0751E366B19A9681EF10DB21C822BB923A5EF85B88F468576DA0DB77C5DF3CD401C303
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID: ?
      • API String ID: 1286766494-1684325040
      • Opcode ID: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
      • Instruction ID: ab07564cc6f91cac6eb44df51cea269480cb881a9c30eabcc6bf41b03ede97ec
      • Opcode Fuzzy Hash: 73dd6a1d9a5ad4992f3991f8c36a8220d63358c9d054768064d2836bf5e58140
      • Instruction Fuzzy Hash: F9412922A1838242FF609B25DC0237A66A4EF91BA4F144275EF5CB7AD6DF3CD542C702
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: CreateFrameInfo__except_validate_context_record
      • String ID: csm
      • API String ID: 2558813199-1018135373
      • Opcode ID: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
      • Instruction ID: 29b5644a3cbce4459d490a84d2beccc60803013c3436b16facd606f95f45259e
      • Opcode Fuzzy Hash: f28967bb51a8388d528e36e8d1b9cbe39d4a27893e421944e70fc0d8e7df8c72
      • Instruction Fuzzy Hash: 7651537361874186EA20EF26E94226D77A4FB88B90F141175EF8DA7B56CF3CE451CB02
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6235EC256
        • Part of subcall function 00007FF6235EE95C: RtlFreeHeap.NTDLL(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE972
        • Part of subcall function 00007FF6235EE95C: GetLastError.KERNEL32(?,?,?,00007FF6235F6862,?,?,?,00007FF6235F6BDF,?,?,00000000,00007FF6235F7025,?,?,?,00007FF6235F6F57), ref: 00007FF6235EE97C
      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6235DE051), ref: 00007FF6235EC274
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\f3fBEUL66b.exe
      • API String ID: 3580290477-2325883835
      • Opcode ID: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
      • Instruction ID: ae69bc9e0274033083a899a074b419aafed0fe703ada81d28f97730f0e441edf
      • Opcode Fuzzy Hash: aee35bfe6285ca872dc023e0e85ec8bac6debb86297f70b490d45f268cf6f652
      • Instruction Fuzzy Hash: 51419D76A08B1286EF55DF25AC920BD63A4FF44B84B444076EE8EB7B95DF3CE4418302
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorFileLastWrite
      • String ID: U
      • API String ID: 442123175-4171548499
      • Opcode ID: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
      • Instruction ID: 13e0d8114f5c59d7fc6034963c454dff5f18d51415168a31b67f647d471c2759
      • Opcode Fuzzy Hash: 82c14a47abd65dfd2f18e3d0d2973b2ccc07122a063a358567b3cbc0c6ba3651
      • Instruction Fuzzy Hash: BC41BF32B18A8182EF209F25E8557BA67A1FB89794F404131EE4EE7B98DF3CD441CB41
      APIs
      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235C1111), ref: 00007FF6235E0340
      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6235C1111), ref: 00007FF6235E0381
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ExceptionFileHeaderRaise
      • String ID: csm
      • API String ID: 2573137834-1018135373
      • Opcode ID: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
      • Instruction ID: f567cc67e7a0bf0112fd570a7a3c2b41715ffbc0ec0975d1524191a8a907d47a
      • Opcode Fuzzy Hash: 4e14dd832fb4824443fa8c0aec862097db35212d867c479028c393dfe5930aef
      • Instruction Fuzzy Hash: FE110D32618B4182EB618F25F84026977E5FB88B84F584275EECD67B69DF3CD551CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3529908435.00007FF6235C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6235C0000, based on PE: true
      • Associated: 00000000.00000002.3529896224.00007FF6235C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529931449.00007FF6235FF000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529949759.00007FF623615000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529962727.00007FF623618000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529976457.00007FF62361C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3529990771.00007FF623620000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6235c0000_f3fBEUL66b.jbxd
      Similarity
      • API ID: ErrorLastRead
      • String ID:
      • API String ID: 4100373531-0
      • Opcode ID: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
      • Instruction ID: b50b7538f0ff576fd430c109575dbaa2c563d33dcf30674a9ad2559ca4425cd7
      • Opcode Fuzzy Hash: 82ac0250d1ecd3177f83757e94cf9be5bc81ee4aab1a059e0fd8dc4cfb57a079
      • Instruction Fuzzy Hash: DF414862B09B4682EF108B16E84526A33B0FB48B91F054475DF4EA7B94EF3CE8A0C311