Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iDaD62by4N.exe

Overview

General Information

Sample name:iDaD62by4N.exe
renamed because original name is a hash value
Original sample name:da566ba3ba5c66a305a19f2695b6f638.exe
Analysis ID:1583296
MD5:da566ba3ba5c66a305a19f2695b6f638
SHA1:b2aeef0bd25408585f26779271a025a77a825e25
SHA256:0171b83f8a99eb2b3c2e06077c692cba3c17fd697535676d356c7db679abc976
Tags:exeMeterpreteruser-abuse_ch
Infos:

Detection

Metasploit, Meterpreter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Metasploit Payload
Yara detected Meterpreter
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to change the desktop window for a process (likely to hide graphical interactions)
Contains functionality to check if the process is started with administrator privileges
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate device drivers
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • iDaD62by4N.exe (PID: 1096 cmdline: "C:\Users\user\Desktop\iDaD62by4N.exe" MD5: DA566BA3BA5C66A305A19F2695B6F638)
    • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"Type": "tcp", "IP": "43.136.177.76", "Port": 6666}
{"Type": "Metasploit Connect", "IP": "43.136.177.76", "Port": 6666}
SourceRuleDescriptionAuthorStrings
iDaD62by4N.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    iDaD62by4N.exeWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x16d69:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    iDaD62by4N.exeWindows_Trojan_Metasploit_91bc5d7dunknownunknown
    • 0x16dbf:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    SourceRuleDescriptionAuthorStrings
    dump.pcapWindows_Trojan_Metasploit_38b8ceecIdentifies the API address lookup function used by metasploit. Also used by other tools (like beacon).unknown
    • 0x4766c:$a1: 89 E5 31 D2 64 8B 52 30 8B 52 0C 8B 52 14 8B 72 28 0F B7 4A 26 31 FF 31 C0 AC 3C 61
    dump.pcapWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
    • 0x47545:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    • 0x4777d:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    • 0x478cb:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
    dump.pcapWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x475b1:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    • 0x477e9:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    • 0x47937:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x81:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
      • 0xd7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
      00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
        • 0x569:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        0.0.iDaD62by4N.exe.7ff6ef710000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          0.0.iDaD62by4N.exe.7ff6ef710000.0.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
          • 0x16d69:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
          0.0.iDaD62by4N.exe.7ff6ef710000.0.unpackWindows_Trojan_Metasploit_91bc5d7dunknownunknown
          • 0x16dbf:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
          0.2.iDaD62by4N.exe.7ff6ef710000.5.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            0.2.iDaD62by4N.exe.7ff6ef710000.5.unpackWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
            • 0x16d69:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
            Click to see the 11 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-02T11:56:58.572624+010020256441A Network Trojan was detected43.136.177.766666192.168.2.549704TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-02T11:56:57.566564+010028518781A Network Trojan was detected43.136.177.766666192.168.2.549704TCP
            2025-01-02T11:56:57.566718+010028518781A Network Trojan was detected43.136.177.766666192.168.2.549704TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: iDaD62by4N.exeAvira: detected
            Source: iDaD62by4N.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "43.136.177.76", "Port": 6666}
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpackMalware Configuration Extractor: Meterpreter {"Type": "tcp", "IP": "43.136.177.76", "Port": 6666}
            Source: iDaD62by4N.exeVirustotal: Detection: 34%Perma Link
            Source: iDaD62by4N.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381B564 CryptDecodeObjectEx,GetLastError,CryptAcquireContextW,CryptAcquireContextW,GetLastError,CryptImportPublicKeyInfo,GetLastError,CryptEncrypt,calloc,memcpy_s,CryptEncrypt,GetLastError,free,LocalFree,CryptDestroyKey,CryptReleaseContext,0_2_0000022DA381B564
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381AC84 memcpy_s,CryptDuplicateKey,GetLastError,CryptSetKeyParam,GetLastError,CryptGenRandom,GetLastError,CryptSetKeyParam,GetLastError,htonl,malloc,memcpy_s,CryptEncrypt,GetLastError,htonl,memcpy_s,memcpy_s,malloc,htonl,memcpy_s,memcpy_s,CryptDestroyKey,0_2_0000022DA381AC84
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381B138 calloc,CryptAcquireContextW,GetLastError,CryptGenRandom,GetLastError,CryptImportKey,GetLastError,free,0_2_0000022DA381B138
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381B69F CryptImportPublicKeyInfo,GetLastError,free,LocalFree,CryptDestroyKey,CryptReleaseContext,0_2_0000022DA381B69F
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381B4A4 CryptDestroyKey,CryptReleaseContext,free,0_2_0000022DA381B4A4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381A904 calloc,htonl,htonl,CryptDuplicateKey,GetLastError,CryptSetKeyParam,GetLastError,CryptSetKeyParam,GetLastError,CryptDecrypt,GetLastError,memmove_s,htonl,htonl,malloc,memcpy_s,CryptDestroyKey,0_2_0000022DA381A904
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5444790 GetLastError,CryptDestroyHash,CryptReleaseContext,fclose,0_2_0000022DA5444790
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5444770 GetLastError,CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,_fread_nolock,CryptHashData,_fread_nolock,CryptGetHashParam,GetLastError,CryptGetHashParam,GetLastError,CryptDestroyHash,CryptReleaseContext,fclose,0_2_0000022DA5444770
            Source: iDaD62by4N.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: createThread.pdb source: iDaD62by4N.exe
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54451C0 _snprintf,strrchr,_snprintf,strrchr,GetLastError,FindFirstFileW,GetLastError,_snprintf,_snprintf,free,free,FindNextFileW,GetLastError,FindClose,free,free,free,0_2_0000022DA54451C0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5445940 FindFirstFileW,FindClose,0_2_0000022DA5445940
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5445660 SetLastError,lstrcmpiW,GetFileAttributesW,SetLastError,RemoveDirectoryW,GetLastError,lstrlenW,lstrlenW,wsprintfW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrlenW,lstrlenW,lstrlenW,wsprintfW,SetFileAttributesW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindNextFileW,GetLastError,FindClose,RemoveDirectoryW,0_2_0000022DA5445660
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5447060 calloc,swprintf,FindFirstFileW,calloc,swprintf,free,FindNextFileW,FindClose,free,GetLastError,GetLastError,free,0_2_0000022DA5447060
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5446F00 swprintf,FindFirstFileW,FindNextFileW,FindClose,GetLastError,GetLastError,0_2_0000022DA5446F00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B2090 calloc,swprintf,FindFirstFileW,calloc,swprintf,free,FindNextFileW,FindClose,free,GetLastError,GetLastError,free,0_2_0000022DA54B2090
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B1F30 swprintf,FindFirstFileW,CreateFileW,CloseHandle,FindNextFileW,FindClose,GetLastError,GetLastError,0_2_0000022DA54B1F30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5441260 GetLogicalDriveStringsA,GetLastError,GetDriveTypeA,malloc,WNetGetUniversalNameA,free,GetDiskFreeSpaceExA,0_2_0000022DA5441260

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2851878 - Severity 1 - ETPRO MALWARE Cobalt Strike Stager Payload : 43.136.177.76:6666 -> 192.168.2.5:49704
            Source: Yara matchFile source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Malware configuration extractorURLs: 43.136.177.76
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 43.136.177.76:6666
            Source: Joe Sandbox ViewASN Name: LILLY-ASUS LILLY-ASUS
            Source: Network trafficSuricata IDS: 2025644 - Severity 1 - ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server) : 43.136.177.76:6666 -> 192.168.2.5:49704
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: unknownTCP traffic detected without corresponding DNS query: 43.136.177.76
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3821AA4 recv,SetLastError,recv,GetLastError,SetLastError,SetLastError,htonl,malloc,SetLastError,memcpy_s,recv,GetLastError,SetLastError,SetLastError,SetLastError,GetLastError,free,free,0_2_0000022DA3821AA4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5453B00 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,GetAsyncKeyState,GetKeyNameTextW,ToUnicodeEx,GetKeyNameTextW,_snwprintf,0_2_0000022DA5453B00
            Source: iDaD62by4N.exeBinary or memory string: GetRawInputData
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5453B00 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,GetAsyncKeyState,GetKeyNameTextW,ToUnicodeEx,GetKeyNameTextW,_snwprintf,0_2_0000022DA5453B00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5453E30 GetKeyState,GetKeyState,GetKeyState,GetKeyboardState,GetForegroundWindow,GetWindowThreadProcessId,EnumChildWindows,OpenProcess,GetSystemTime,GetDateFormatW,GetTimeFormatW,_snwprintf,_snwprintf,CloseHandle,GetAsyncKeyState,GetKeyNameTextW,ToUnicodeEx,GetKeyNameTextW,_snwprintf,0_2_0000022DA5453E30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381B138 calloc,CryptAcquireContextW,GetLastError,CryptGenRandom,GetLastError,CryptImportKey,GetLastError,free,0_2_0000022DA381B138

            System Summary

            barindex
            Source: iDaD62by4N.exe, type: SAMPLEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: iDaD62by4N.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: dump.pcap, type: PCAPMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 0.0.iDaD62by4N.exe.7ff6ef710000.0.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 0.0.iDaD62by4N.exe.7ff6ef710000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: 0.2.iDaD62by4N.exe.7ff6ef710000.5.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 0.2.iDaD62by4N.exe.7ff6ef710000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Detects Meterpreter payload Author: ditekSHen
            Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon). Author: unknown
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Meterpreter payload Author: ditekSHen
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37C91B8 NtAllocateVirtualMemory,0_2_0000022DA37C91B8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37C9214 NtProtectVirtualMemory,0_2_0000022DA37C9214
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF718720 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,GetStdHandle,GetLastError,0_2_00007FF6EF718720
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B5C10 OpenSCManagerA,GetLastError,OpenServiceA,GetLastError,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle,SetLastError,0_2_0000022DA54B5C10
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA544BE70 calloc,_snprintf,mbstowcs,calloc,mbstowcs,malloc,CreatePipe,CreatePipe,LoadLibraryA,GetProcAddress,GetProcAddress,OpenProcess,malloc,GetLastError,wprintf,GetLastError,free,GetLastError,GetLastError,wprintf,GetLastError,FreeLibrary,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,DuplicateTokenEx,GetLastError,LoadLibraryA,GetProcAddress,GetProcAddress,CreateProcessAsUserW,GetLastError,LoadLibraryA,GetProcAddress,mbstowcs,malloc,mbstowcs,mbstowcs,malloc,mbstowcs,GetLastError,FreeLibrary,free,free,FreeLibrary,GetLastError,LoadLibraryA,GetCurrentProcessId,GetProcAddress,CreateProcessAsUserW,CreateProcessW,GetLastError,FreeLibrary,CloseHandle,CreateProcessW,GetLastError,ResumeThread,GetLastError,CloseHandle,CloseHandle,CloseHandle,free,free,free,free,free,0_2_0000022DA544BE70
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5450C30 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,GetLastError,CloseHandle,0_2_0000022DA5450C30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37C95400_2_0000022DA37C9540
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37F4FE80_2_0000022DA37F4FE8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37F584C0_2_0000022DA37F584C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37E9EE80_2_0000022DA37E9EE8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37F66D80_2_0000022DA37F66D8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37F1CBC0_2_0000022DA37F1CBC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37EC5640_2_0000022DA37EC564
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37E0D2C0_2_0000022DA37E0D2C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37E9BDC0_2_0000022DA37E9BDC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37EE31C0_2_0000022DA37EE31C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37EBA1C0_2_0000022DA37EBA1C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37F31780_2_0000022DA37F3178
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37ED1340_2_0000022DA37ED134
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37EC9140_2_0000022DA37EC914
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF7120C00_2_00007FF6EF7120C0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF724D400_2_00007FF6EF724D40
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF71AD500_2_00007FF6EF71AD50
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF7235200_2_00007FF6EF723520
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF714BC00_2_00007FF6EF714BC0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF723C200_2_00007FF6EF723C20
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF7213500_2_00007FF6EF721350
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF7202D00_2_00007FF6EF7202D0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF7192600_2_00007FF6EF719260
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383A7DC0_2_0000022DA383A7DC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383EF1C0_2_0000022DA383EF1C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383C61C0_2_0000022DA383C61C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383D5140_2_0000022DA383D514
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383DD340_2_0000022DA383DD34
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3843D780_2_0000022DA3843D78
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA384644C0_2_0000022DA384644C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3845BE80_2_0000022DA3845BE8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA38472D80_2_0000022DA38472D8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383AAE80_2_0000022DA383AAE8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383192C0_2_0000022DA383192C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381A1400_2_0000022DA381A140
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383D1640_2_0000022DA383D164
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA38428BC0_2_0000022DA38428BC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54742040_2_0000022DA5474204
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5443A800_2_0000022DA5443A80
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA547F28C0_2_0000022DA547F28C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA547EA280_2_0000022DA547EA28
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54733E80_2_0000022DA54733E8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54703B40_2_0000022DA54703B4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54463B00_2_0000022DA54463B0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5475C5C0_2_0000022DA5475C5C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA545DC100_2_0000022DA545DC10
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5479C1C0_2_0000022DA5479C1C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA546FB580_2_0000022DA546FB58
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA546EB840_2_0000022DA546EB84
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA546C5E40_2_0000022DA546C5E4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA544BE700_2_0000022DA544BE70
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5474D280_2_0000022DA5474D28
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA547600C0_2_0000022DA547600C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA547BEE00_2_0000022DA547BEE0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54786F00_2_0000022DA54786F0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA547FF500_2_0000022DA547FF50
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54577200_2_0000022DA5457720
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B52600_2_0000022DA54B5260
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54C4E880_2_0000022DA54C4E88
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B5E300_2_0000022DA54B5E30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B9D000_2_0000022DA54B9D00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54C40980_2_0000022DA54C4098
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B69840_2_0000022DA54B6984
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B85140_2_0000022DA54B8514
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54BA00C0_2_0000022DA54BA00C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54C37900_2_0000022DA54C3790
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54BC47C0_2_0000022DA54BC47C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54C44480_2_0000022DA54C4448
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54BE6DC0_2_0000022DA54BE6DC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B8B000_2_0000022DA54B8B00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54BBAB80_2_0000022DA54BBAB8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54C56C00_2_0000022DA54C56C0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B8F640_2_0000022DA54B8F64
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: String function: 00007FF6EF722F90 appears 63 times
            Source: iDaD62by4N.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: iDaD62by4N.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: dump.pcap, type: PCAPMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 0.0.iDaD62by4N.exe.7ff6ef710000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 0.0.iDaD62by4N.exe.7ff6ef710000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: 0.2.iDaD62by4N.exe.7ff6ef710000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.7ff6ef710000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
            Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_38b8ceec os = windows, severity = x86, description = Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 44b9022d87c409210b1d0807f5a4337d73f19559941660267d63cd2e4f2ff342, id = 38b8ceec-601c-4117-b7a0-74720e26bf38, last_modified = 2021-08-23
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
            Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Meterpreter author = ditekSHen, description = Detects Meterpreter payload
            Source: classification engineClassification label: mal100.troj.evad.winEXE@2/1@0/1
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5455A19 GetLastError,FormatMessageA,free,SetLastError,0_2_0000022DA5455A19
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381F018 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0000022DA381F018
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA38128F8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,OpenProcess,GetLastError,CreateEventW,GetLastError,GetCurrentProcess,DuplicateHandle,GetLastError,VirtualAllocEx,GetLastError,WriteProcessMemory,GetLastError,WriteProcessMemory,GetLastError,WriteProcessMemory,GetLastError,WriteProcessMemory,GetLastError,free,GetLastError,free,CloseHandle,CloseHandle,0_2_0000022DA38128F8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA544CA70 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,0_2_0000022DA544CA70
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5451B90 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0000022DA5451B90
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5450C30 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,GetLastError,CloseHandle,0_2_0000022DA5450C30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5449E40 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,wcsstr,CloseHandle,FreeLibrary,0_2_0000022DA5449E40
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B45E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_0000022DA54B45E0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B6740 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,GetHandleInformation,CloseHandle,SetLastError,0_2_0000022DA54B6740
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5441260 GetLogicalDriveStringsA,GetLastError,GetDriveTypeA,malloc,WNetGetUniversalNameA,free,GetDiskFreeSpaceExA,0_2_0000022DA5441260
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: OpenSCManagerA,GetLastError,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,SetLastError,0_2_0000022DA54B5B20
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54570E0 CoInitialize,CoCreateInstance,VariantInit,_Wcsftime,VariantClear,GetLastError,CoUninitialize,0_2_0000022DA54570E0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B49B0 FindResourceA,calloc,CreateEventA,CreateEventA,LoadResource,GetLastError,SizeofResource,LockResource,CloseHandle,CloseHandle,VirtualFreeEx,CloseHandle,VirtualAllocEx,GetLastError,WriteProcessMemory,GetLastError,GetProcessId,WaitForSingleObject,ReadProcessMemory,GetLastError,SetEvent,GetLastError,WaitForSingleObject,_snwprintf_s,_snwprintf_s,_snwprintf_s,GetLastError,0_2_0000022DA54B49B0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B5970 OpenSCManagerA,GetLastError,OpenServiceA,GetLastError,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,SetLastError,0_2_0000022DA54B5970
            Source: C:\Users\user\Desktop\iDaD62by4N.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
            Source: iDaD62by4N.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\iDaD62by4N.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: iDaD62by4N.exeVirustotal: Detection: 34%
            Source: iDaD62by4N.exeReversingLabs: Detection: 55%
            Source: unknownProcess created: C:\Users\user\Desktop\iDaD62by4N.exe "C:\Users\user\Desktop\iDaD62by4N.exe"
            Source: C:\Users\user\Desktop\iDaD62by4N.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: cscapi.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: iDaD62by4N.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: iDaD62by4N.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: iDaD62by4N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: createThread.pdb source: iDaD62by4N.exe
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF719AC0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,ReleaseMutex,0_2_00007FF6EF719AC0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA37FA318 push rax; iretd 0_2_0000022DA37FA319
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B5970 OpenSCManagerA,GetLastError,OpenServiceA,GetLastError,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,SetLastError,0_2_0000022DA54B5970
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54511D0 ClearEventLogA,GetLastError,0_2_0000022DA54511D0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA383A7DC EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0000022DA383A7DC

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5449E40 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,wcsstr,CloseHandle,FreeLibrary,0_2_0000022DA5449E40
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: malloc,EnumDeviceDrivers,GetDeviceDriverFileNameW,free,free,free,0_2_0000022DA5452050
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: GetVersionExA,GetLastError,OpenSCManagerA,GetLastError,EnumServicesStatusA,GetLastError,GetLastError,malloc,GetLastError,EnumServicesStatusA,GetLastError,OpenServiceA,QueryServiceStatusEx,OpenProcess,GetCurrentThreadId,_snwprintf_s,VirtualAllocEx,WriteProcessMemory,WaitForSingleObject,GetExitCodeThread,GetCurrentThread,OpenThreadToken,DuplicateToken,CloseServiceHandle,GetHandleInformation,CloseHandle,GetHandleInformation,CloseHandle,GetHandleInformation,CloseHandle,CloseServiceHandle,free,SetLastError,0_2_0000022DA54B5E30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-66975
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-67031
            Source: C:\Users\user\Desktop\iDaD62by4N.exeAPI coverage: 3.9 %
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54451C0 _snprintf,strrchr,_snprintf,strrchr,GetLastError,FindFirstFileW,GetLastError,_snprintf,_snprintf,free,free,FindNextFileW,GetLastError,FindClose,free,free,free,0_2_0000022DA54451C0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5445940 FindFirstFileW,FindClose,0_2_0000022DA5445940
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5445660 SetLastError,lstrcmpiW,GetFileAttributesW,SetLastError,RemoveDirectoryW,GetLastError,lstrlenW,lstrlenW,wsprintfW,FindFirstFileW,lstrcpyW,lstrcmpiW,lstrcmpiW,lstrlenW,lstrlenW,lstrlenW,wsprintfW,SetFileAttributesW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindNextFileW,GetLastError,FindClose,RemoveDirectoryW,0_2_0000022DA5445660
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5447060 calloc,swprintf,FindFirstFileW,calloc,swprintf,free,FindNextFileW,FindClose,free,GetLastError,GetLastError,free,0_2_0000022DA5447060
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5446F00 swprintf,FindFirstFileW,FindNextFileW,FindClose,GetLastError,GetLastError,0_2_0000022DA5446F00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B2090 calloc,swprintf,FindFirstFileW,calloc,swprintf,free,FindNextFileW,FindClose,free,GetLastError,GetLastError,free,0_2_0000022DA54B2090
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B1F30 swprintf,FindFirstFileW,CreateFileW,CloseHandle,FindNextFileW,FindClose,GetLastError,GetLastError,0_2_0000022DA54B1F30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5441260 GetLogicalDriveStringsA,GetLastError,GetDriveTypeA,malloc,WNetGetUniversalNameA,free,GetDiskFreeSpaceExA,0_2_0000022DA5441260
            Source: iDaD62by4N.exe, 00000000.00000002.3274403965.0000022DA36CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\iDaD62by4N.exeAPI call chain: ExitProcess graph end nodegraph_0-67117
            Source: C:\Users\user\Desktop\iDaD62by4N.exeAPI call chain: ExitProcess graph end nodegraph_0-66524
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF725AC4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6EF725AC4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA38414DC EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_0000022DA38414DC
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF719AC0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,ReleaseMutex,0_2_00007FF6EF719AC0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF719230 HeapAlloc,GetProcessHeap,HeapAlloc,0_2_00007FF6EF719230
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF725C6C SetUnhandledExceptionFilter,0_2_00007FF6EF725C6C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF725AC4 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6EF725AC4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381A844 GetModuleHandleW,SetUnhandledExceptionFilter,ExitProcess,ExitThread,0_2_0000022DA381A844
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3840BE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000022DA3840BE0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54779E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000022DA54779E4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54BB4D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000022DA54BB4D4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5452A00 GetCurrentProcessId,GetCurrentProcessId,OpenWindowStationA,RevertToSelf,OpenWindowStationA,GetProcessWindowStation,SetProcessWindowStation,GetLastError,OpenDesktopA,GetLastError,SetThreadDesktop,GetLastError,SwitchDesktop,GetLastError,CloseDesktop,CloseWindowStation,SetProcessWindowStation,0_2_0000022DA5452A00
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA544AA20 VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,TerminateProcess,0_2_0000022DA544AA20
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3819AE4 VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,0_2_0000022DA3819AE4
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B6560 VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,0_2_0000022DA54B6560
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtAllocateVirtualMemory: Indirect: 0x22DA37C9206Jump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtProtectVirtualMemory: Indirect: 0x22DA3725F83Jump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtAllocateVirtualMemory: Indirect: 0x22DA5342D8EJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtAllocateVirtualMemory: Indirect: 0x22DA3725F2EJump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtProtectVirtualMemory: Indirect: 0x22DA5342DE3Jump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeNtProtectVirtualMemory: Indirect: 0x22DA37C9257Jump to behavior
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381ED28 AllocateAndInitializeSid,SetEntriesInAclW,AllocateAndInitializeSid,LocalAlloc,InitializeAcl,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,SetSecurityDescriptorSacl,0_2_0000022DA381ED28
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA381ED28 AllocateAndInitializeSid,SetEntriesInAclW,AllocateAndInitializeSid,LocalAlloc,InitializeAcl,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,SetSecurityDescriptorSacl,0_2_0000022DA381ED28
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: GetComputerNameA,GetLastError,LoadLibraryA,GetProcAddress,GetProcAddress,GetNativeSystemInfo,GetProcAddress,GetLocaleInfoA,malloc,GetLocaleInfoA,GetLocaleInfoA,malloc,GetLocaleInfoA,_snprintf,_snprintf,free,free,NetWkstaGetInfo,free,NetApiBufferFree,IsUserAnAdmin,GetCurrentProcessId,0_2_0000022DA54515C0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3820A6C CreateNamedPipeW,GetLastError,CreateNamedPipeW,GetLastError,ConnectNamedPipe,GetLastError,CloseHandle,0_2_0000022DA3820A6C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_00007FF6EF72598C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6EF72598C
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5451920 GetTimeZoneInformation,GetLocalTime,_snwprintf_s,0_2_0000022DA5451920
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA3814AE8 GetVersionExW,GetLastError,SetLastError,GetLastError,VirtualAlloc,GetLastError,VirtualAlloc,GetLastError,SetLastError,GetLastError,SetLastError,GetLastError,VirtualFree,VirtualFree,0_2_0000022DA3814AE8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: iDaD62by4N.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.iDaD62by4N.exe.7ff6ef710000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.iDaD62by4N.exe.7ff6ef710000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 0.2.iDaD62by4N.exe.22da37c0000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.iDaD62by4N.exe.22da3810000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA38216F8 bind,WSAGetLastError,listen,WSAGetLastError,accept,WSAGetLastError,closesocket,0_2_0000022DA38216F8
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA5448AA0 malloc,WSASocketA,WSASocketA,setsockopt,closesocket,WSASocketA,WSAGetLastError,htons,htons,htons,WSAGetLastError,bind,WSAGetLastError,listen,WSAGetLastError,WSACreateEvent,WSAGetLastError,WSAEventSelect,WSAGetLastError,closesocket,free,0_2_0000022DA5448AA0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54495B0 malloc,inet_addr,inet_addr,WSASocketA,WSAGetLastError,htons,bind,WSAGetLastError,WSACreateEvent,WSAGetLastError,WSAEventSelect,WSAGetLastError,closesocket,free,0_2_0000022DA54495B0
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B2E39 RpcBindingFree,free,0_2_0000022DA54B2E39
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B2D30 malloc,_snwprintf_s,DceErrorInqTextA,RpcBindingFree,free,0_2_0000022DA54B2D30
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B3940 RpcBindingFree,0_2_0000022DA54B3940
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B3810 RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,0_2_0000022DA54B3810
            Source: C:\Users\user\Desktop\iDaD62by4N.exeCode function: 0_2_0000022DA54B2E90 _snwprintf_s,RpcStringBindingComposeW,DceErrorInqTextA,RpcBindingFromStringBindingW,RpcStringFreeW,RpcBindingSetAuthInfoW,0_2_0000022DA54B2E90
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure1
            Valid Accounts
            2
            Native API
            1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            1
            Disable or Modify Tools
            31
            Input Capture
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            Data Encrypted for Impact
            CredentialsDomainsDefault Accounts12
            Service Execution
            1
            Valid Accounts
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            System Service Discovery
            Remote Desktop Protocol31
            Input Capture
            2
            Encrypted Channel
            Exfiltration Over Bluetooth1
            System Shutdown/Reboot
            Email AddressesDNS ServerDomain AccountsAt12
            Windows Service
            1
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
            Access Token Manipulation
            2
            Obfuscated Files or Information
            NTDS25
            System Information Discovery
            Distributed Component Object ModelInput Capture1
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
            Windows Service
            1
            DLL Side-Loading
            LSA Secrets31
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts22
            Process Injection
            1
            Masquerading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Valid Accounts
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Access Token Manipulation
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt22
            Process Injection
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
            Indicator Removal
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            iDaD62by4N.exe35%VirustotalBrowse
            iDaD62by4N.exe55%ReversingLabsWin64.Backdoor.Meterpreter
            iDaD62by4N.exe100%AviraHEUR/AGEN.1318399
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            43.136.177.760%Avira URL Cloudsafe
            No contacted domains info
            NameMaliciousAntivirus DetectionReputation
            43.136.177.76true
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            43.136.177.76
            unknownJapan4249LILLY-ASUStrue
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1583296
            Start date and time:2025-01-02 11:56:07 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 21s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:iDaD62by4N.exe
            renamed because original name is a hash value
            Original Sample Name:da566ba3ba5c66a305a19f2695b6f638.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@2/1@0/1
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 25
            • Number of non-executed functions: 318
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            No simulations
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            LILLY-ASUSHilix.sh4.elfGet hashmaliciousMiraiBrowse
            • 43.147.184.0
            armv5l.elfGet hashmaliciousUnknownBrowse
            • 40.201.14.36
            armv7l.elfGet hashmaliciousUnknownBrowse
            • 40.216.153.85
            armv4l.elfGet hashmaliciousUnknownBrowse
            • 43.68.215.233
            armv6l.elfGet hashmaliciousUnknownBrowse
            • 40.157.226.86
            01012025.htmlGet hashmaliciousHTMLPhisherBrowse
            • 43.152.64.207
            loligang.sh4.elfGet hashmaliciousMiraiBrowse
            • 43.70.37.252
            loligang.spc.elfGet hashmaliciousMiraiBrowse
            • 43.1.228.236
            loligang.ppc.elfGet hashmaliciousMiraiBrowse
            • 43.58.148.3
            http://usps.com-trackaddn.top/lGet hashmaliciousUnknownBrowse
            • 43.153.71.154
            No context
            No context
            Process:C:\Users\user\Desktop\iDaD62by4N.exe
            File Type:data
            Category:dropped
            Size (bytes):47
            Entropy (8bit):1.168829563685559
            Encrypted:false
            SSDEEP:3:/lSll2DQi:AoMi
            MD5:DAB633BEBCCE13575989DCFA4E2203D6
            SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
            SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
            SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:........................................user.
            File type:PE32+ executable (console) x86-64, for MS Windows
            Entropy (8bit):6.266159713204113
            TrID:
            • Win64 Executable Console (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:iDaD62by4N.exe
            File size:130'560 bytes
            MD5:da566ba3ba5c66a305a19f2695b6f638
            SHA1:b2aeef0bd25408585f26779271a025a77a825e25
            SHA256:0171b83f8a99eb2b3c2e06077c692cba3c17fd697535676d356c7db679abc976
            SHA512:b7b942d5e481c607af64128cfa21a8fff45e145c9b985f2fc75096f55c9d0567d953a0e53c6e20bcb97fcdc172e470e5a3b431079c94c37b243b13485be78438
            SSDEEP:1536:aggOxyGHTvy1FJ0SnAFYmVKfIGvPV5UQzKhlC4GYOZFsUQpBZA0iANaVgUHniMBh:aZOsuYFJ0SAFYmcfX5ECrv7sUAxiMC
            TLSH:E6D36C237651E1ECC40AC07882564AB2A772F4D91B31ABEF17D442383E6DEE55F3C698
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-...Lo..Lo..Lo..4...Lo...n..Lo...l..Lo...k..Lo...j..Lo..9n..Lo..Ln.tLo..Lo..Lo.G.m..Lo.Rich.Lo.................PE..d.....og...
            Icon Hash:00928e8e8686b000
            Entrypoint:0x1400156a0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x676FD595 [Sat Dec 28 10:40:21 2024 UTC]
            TLS Callbacks:0x400098b0, 0x1
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:d7998d62e33e6d63fb8500b41aad05e4
            Instruction
            dec eax
            sub esp, 28h
            call 00007FC1287D2B08h
            dec eax
            add esp, 28h
            jmp 00007FC1287D2697h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            nop word ptr [eax+eax+00000000h]
            dec eax
            sub esp, 10h
            dec esp
            mov dword ptr [esp], edx
            dec esp
            mov dword ptr [esp+08h], ebx
            dec ebp
            xor ebx, ebx
            dec esp
            lea edx, dword ptr [esp+18h]
            dec esp
            sub edx, eax
            dec ebp
            cmovb edx, ebx
            dec esp
            mov ebx, dword ptr [00000010h]
            dec ebp
            cmp edx, ebx
            jnc 00007FC1287D2838h
            inc cx
            and edx, 8D4DF000h
            wait
            add al, dh
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1f2ac0xc8.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x210000x1128.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x230000x2b4.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x1c4d00x54.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x1c5800x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c3900x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x180000x2c0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x162af0x16400a5cd393d96d88970e60ed50b5eb43ef6False0.5357707162921348data6.371944244713758IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x180000x7d460x7e00327b0a04575c5b5218328c6954a08657False0.3939422123015873data5.3032993600140665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x200000x2f00x2008671c6fb755911e93d0a86270a9cb6daFalse0.224609375data1.5524319039400882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x210000x11280x1200422f8470a8cd8b28c9a852d9c1c87987False0.4774305555555556data4.918853406781578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x230000x2b40x4004ad2e6c5bbecd8ead1a7dd0ce148f99aFalse0.5029296875data4.2976888503280195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
            kernel32.dllGetCurrentProcess, GetStdHandle, GetCurrentProcessId, UnhandledExceptionFilter, HeapFree, HeapReAlloc, lstrlenW, ReleaseMutex, GetEnvironmentVariableW, GetConsoleMode, GetCurrentDirectoryW, IsDebuggerPresent, RtlVirtualUnwind, GetModuleHandleW, MultiByteToWideChar, WriteConsoleW, WideCharToMultiByte, GetModuleHandleA, GetProcAddress, GetProcessHeap, HeapAlloc, RtlLookupFunctionEntry, RtlCaptureContext, InitializeSListHead, WaitForSingleObjectEx, LoadLibraryA, CreateMutexA, QueryPerformanceCounter, GetCurrentThread, SetThreadStackGuarantee, AddVectoredExceptionHandler, GetLastError, CloseHandle, SetUnhandledExceptionFilter, GetSystemTimeAsFileTime, WaitForSingleObject, CreateThread, VirtualAlloc, SetLastError, GetCurrentThreadId, IsProcessorFeaturePresent
            ntdll.dllRtlNtStatusToDosError, NtWriteFile
            VCRUNTIME140.dllmemcpy, memset, memcmp, _CxxThrowException, __C_specific_handler, __current_exception, __CxxFrameHandler3, memmove, __current_exception_context
            api-ms-win-crt-runtime-l1-1-0.dllexit, _exit, __p___argc, __p___argv, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _set_app_type, _configure_narrow_argv, _get_initial_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, terminate, _initialize_narrow_environment, _initterm, _seh_filter_exe, _initterm_e
            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
            api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
            api-ms-win-crt-heap-l1-1-0.dllfree, _set_new_mode
            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
            2025-01-02T11:56:57.566564+01002851878ETPRO MALWARE Cobalt Strike Stager Payload143.136.177.766666192.168.2.549704TCP
            2025-01-02T11:56:57.566718+01002851878ETPRO MALWARE Cobalt Strike Stager Payload143.136.177.766666192.168.2.549704TCP
            2025-01-02T11:56:58.572624+01002025644ET MALWARE Possible Metasploit Payload Common Construct Bind_API (from server)143.136.177.766666192.168.2.549704TCP
            TimestampSource PortDest PortSource IPDest IP
            Jan 2, 2025 11:56:56.591957092 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:56.596892118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:56.596962929 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.566106081 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566564083 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566600084 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566612959 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566670895 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.566680908 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566693068 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566704035 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566710949 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.566718102 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566729069 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.566764116 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.566831112 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566843033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.566879988 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.571574926 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.571598053 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.571608067 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.571666002 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.817804098 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817825079 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817836046 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817853928 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817867041 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817915916 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817926884 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.817955017 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.818000078 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.818011045 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818023920 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818064928 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.818599939 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818613052 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818624020 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818636894 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818646908 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818655014 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.818660021 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.818676949 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.818687916 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.819516897 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819571018 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819583893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819628000 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.819659948 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819672108 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819683075 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.819701910 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.820414066 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.820432901 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.820488930 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.822771072 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.824243069 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:57.906233072 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.906250954 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:57.906338930 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.068486929 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068504095 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068526030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068537951 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068550110 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068574905 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.068609953 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.068720102 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068756104 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.068758011 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068772078 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068809032 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.068943977 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068985939 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.068996906 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069032907 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069116116 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069128036 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069152117 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069489002 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069502115 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069514036 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069535017 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069550037 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069556952 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069569111 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069581032 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069591999 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069602013 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069633961 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.069772005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069783926 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.069818020 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.070327997 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070358992 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070370913 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070405960 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.070524931 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070538044 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070549965 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070561886 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070571899 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.070604086 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.070628881 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070641994 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.070672035 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.071273088 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071309090 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071326971 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071357965 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.071378946 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.071424007 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071434975 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071446896 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071468115 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.071589947 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071602106 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071614027 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.071635962 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.071662903 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.072287083 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072299957 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072312117 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072346926 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.072367907 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072380066 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072391033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072407961 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072411060 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.072427988 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.072468042 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.072515011 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.157102108 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.157135963 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.157212019 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319508076 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319546938 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319559097 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319591999 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319603920 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319616079 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319673061 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319694996 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319709063 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319709063 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319757938 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319760084 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319817066 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319832087 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319866896 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319900036 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319911003 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319922924 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.319941044 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.319953918 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320122957 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320173979 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320190907 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320214033 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320269108 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320282936 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320295095 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320331097 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320609093 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320625067 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320636988 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320661068 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320744038 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320756912 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320768118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320779085 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320780039 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320800066 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.320838928 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320849895 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.320884943 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321157932 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321204901 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321216106 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321237087 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321249962 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321333885 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321345091 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321361065 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321376085 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321382046 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321404934 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321511984 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321523905 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321535110 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321546078 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321556091 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321557999 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321573019 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.321582079 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.321616888 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.322088003 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322128057 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322139978 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322160959 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.322295904 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322308064 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322318077 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322329998 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322345018 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.322489023 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322499990 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322511911 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322523117 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322531939 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.322535038 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322546959 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.322556019 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.322577000 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.323041916 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323087931 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323098898 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323184013 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323194027 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323209047 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323261023 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.323328018 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323338985 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323350906 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323362112 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323374033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323378086 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.323386908 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323396921 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.323415995 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.323551893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.323589087 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.324059963 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324070930 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324081898 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324112892 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.324134111 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324145079 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324156046 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324167013 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324181080 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.324274063 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324285984 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324297905 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.324318886 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.324342012 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.324738026 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408047915 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408071995 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408083916 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408093929 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408104897 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408117056 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408150911 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408195972 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408207893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408211946 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408227921 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408238888 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408277035 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408282042 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408293009 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408322096 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408359051 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408458948 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408471107 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408488035 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408493996 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408505917 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408521891 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.408541918 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408555031 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.408572912 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.458909035 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570489883 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570508957 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570528984 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570539951 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570552111 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570553064 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570564032 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570590019 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570602894 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570615053 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570637941 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570652008 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570676088 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570707083 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570719004 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570744038 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570751905 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570790052 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570799112 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570827961 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570838928 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570863962 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570928097 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570940018 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.570975065 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.570979118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571013927 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571046114 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571058035 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571101904 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571139097 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571151018 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571161985 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571173906 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571181059 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571224928 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571347952 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571361065 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571372986 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571384907 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571394920 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571398020 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571410894 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571420908 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571449041 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571548939 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571561098 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571573973 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571599007 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571619034 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571630955 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571643114 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571661949 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571674109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571677923 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571686983 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571696043 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571716070 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571885109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571897030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571913004 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571923018 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.571923971 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.571950912 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572043896 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572053909 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572066069 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572084904 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572113037 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572113991 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572127104 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572168112 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572243929 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572257996 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572268009 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572297096 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572361946 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572374105 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572386026 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572397947 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572397947 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572424889 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572623968 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572634935 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572645903 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572657108 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572659016 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572669029 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572669983 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572681904 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572693110 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572705984 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572717905 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572742939 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.572906971 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572920084 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572932005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572941065 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.572948933 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.573262930 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.575391054 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.575402975 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.575450897 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.575457096 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.575463057 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:58.575499058 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.818331003 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:58.823275089 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:59.187602997 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:59.240165949 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:59.240331888 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:59.245101929 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:59.687720060 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:56:59.740149975 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:59.755888939 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:56:59.761712074 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264695883 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264723063 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264734030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264745951 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264796972 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264806032 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.264810085 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264861107 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.264873981 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264942884 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264955044 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264966011 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.264978886 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.264981031 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265017986 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265043020 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265084982 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265110016 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265121937 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265158892 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265167952 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265189886 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265213966 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265223980 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265228033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265266895 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265305042 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265316963 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265364885 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265396118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265408039 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265418053 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265449047 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265553951 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265564919 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265575886 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265592098 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265598059 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265613079 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265700102 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265712023 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265722990 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265733004 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265744925 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265747070 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265774012 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265789032 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265855074 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265866041 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265878916 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.265902042 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.265990973 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266002893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266016006 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266031027 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266042948 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266128063 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266139030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266149998 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266184092 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266189098 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266202927 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266213894 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266225100 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266226053 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266248941 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266443014 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266455889 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266467094 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266478062 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266482115 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266489983 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266495943 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266535044 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266558886 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266576052 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266587019 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266597033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266613007 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266650915 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266674995 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266899109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266910076 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266920090 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266931057 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266936064 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266943932 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266954899 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266963005 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266967058 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266979933 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266988993 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.266992092 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.266999006 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267005920 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267016888 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267025948 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267033100 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267045975 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267052889 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267056942 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267069101 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267081022 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267087936 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267102003 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267431021 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267441988 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267453909 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267468929 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267493963 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267570972 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267582893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267592907 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267611980 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267622948 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267623901 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267633915 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267642021 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267646074 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267657042 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267673016 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267673969 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267687082 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267687082 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267709970 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267723083 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267728090 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267735004 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267750978 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267761946 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267765999 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267774105 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267786026 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267796040 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267798901 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267811060 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267812014 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267826080 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.267838955 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.267858028 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268409967 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268421888 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268433094 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268444061 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268454075 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268466949 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268467903 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268491983 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268517017 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268538952 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268552065 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268587112 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268690109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268702030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268712997 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268723965 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268733978 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268735886 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268744946 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268755913 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268760920 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268768072 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268769026 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268779993 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268793106 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268801928 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268804073 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268816948 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268827915 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.268836975 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.268862963 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.269177914 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.269190073 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.269212008 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.318247080 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.353351116 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.353382111 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.353394985 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.353401899 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.353533030 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.358145952 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.358160019 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.358202934 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.358355045 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.358367920 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.358432055 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.362829924 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.362843037 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.362878084 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.363090038 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.363102913 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.363154888 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.369422913 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369438887 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369452953 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369465113 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369476080 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369484901 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.369489908 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.369524956 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.369537115 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.374614954 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.374629021 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.374640942 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.374670982 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.374758005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.374794006 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.379781961 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.379796028 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.379847050 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.380088091 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.380103111 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.380167961 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.384917021 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.384931087 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.384942055 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.384973049 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.385231972 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.385243893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.385281086 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.390194893 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.390206099 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.390260935 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.443813086 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.449223995 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.449240923 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.888530970 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:00.943289995 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.943949938 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:00.948817015 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:01.387274027 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:01.427620888 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:01.447990894 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:01.455307007 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:01.887367964 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:01.927635908 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:01.943327904 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:01.948157072 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:02.388165951 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:02.443274975 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:02.443568945 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:02.448379040 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:02.789607048 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:02.833957911 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:02.849673033 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:02.856937885 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:02.856956005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:03.492496014 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:03.537014961 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:03.552798986 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:03.557661057 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049640894 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049662113 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049673080 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049685955 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049701929 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049710989 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049729109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049732924 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.049778938 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049782038 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.049793005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049806118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049818993 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049820900 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.049854994 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.049911976 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049926043 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.049949884 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050017118 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050028086 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050041914 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050051928 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050062895 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050064087 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050082922 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050116062 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050147057 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050158024 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050168991 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050203085 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050234079 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050246000 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050256968 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050271988 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050303936 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050426006 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050438881 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050451994 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050462961 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050473928 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050478935 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050487041 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050503016 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050528049 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050678015 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050689936 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050702095 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050712109 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050724030 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050739050 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050769091 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050827980 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050841093 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050853014 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050864935 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050869942 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050878048 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050893068 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050920010 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.050971031 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.050987005 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051018000 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051026106 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051038027 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051050901 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051062107 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051073074 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051079035 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051090956 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051363945 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051376104 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051387072 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051398993 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051404953 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051415920 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051425934 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051429033 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051441908 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051451921 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051489115 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051510096 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051659107 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051675081 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051686049 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051696062 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051697016 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051707029 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051717997 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051719904 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051729918 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051740885 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051747084 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051753044 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051764011 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051767111 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051778078 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:57:04.051790953 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.051817894 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.099553108 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:57:04.104310989 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:58:04.779268980 CET66664970443.136.177.76192.168.2.5
            Jan 2, 2025 11:58:04.833904982 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:58:04.834683895 CET497046666192.168.2.543.136.177.76
            Jan 2, 2025 11:58:04.839565992 CET66664970443.136.177.76192.168.2.5

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:05:56:55
            Start date:02/01/2025
            Path:C:\Users\user\Desktop\iDaD62by4N.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\iDaD62by4N.exe"
            Imagebase:0x7ff6ef710000
            File size:130'560 bytes
            MD5 hash:DA566BA3BA5C66A305A19F2695B6F638
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000000.2025069939.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmp, Author: ditekSHen
            • Rule: JoeSecurity_Meterpreter, Description: Yara detected Meterpreter, Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_38b8ceec, Description: Identifies the API address lookup function used by metasploit. Also used by other tools (like beacon)., Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: MALWARE_Win_Meterpreter, Description: Detects Meterpreter payload, Source: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
            Reputation:low
            Has exited:false

            Target ID:1
            Start time:05:56:55
            Start date:02/01/2025
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:1.4%
              Dynamic/Decrypted Code Coverage:90.8%
              Signature Coverage:22.3%
              Total number of Nodes:676
              Total number of Limit Nodes:53
              execution_graph 66355 22da38281b0 66356 22da38281e3 66355->66356 66357 22da38281c1 66355->66357 66361 22da3828220 66357->66361 66362 22da38281cb CloseHandle 66361->66362 66363 22da3828231 ReleaseMutex 66361->66363 66364 22da3837a38 66362->66364 66363->66362 66365 22da3837a3d RtlFreeHeap 66364->66365 66369 22da3837a6d free 66364->66369 66366 22da3837a58 66365->66366 66365->66369 66370 22da383a484 65 API calls _getptd_noexit 66366->66370 66368 22da3837a5d GetLastError 66368->66369 66369->66356 66370->66368 66371 22da3819a30 66372 22da3819a57 _DllMainCRTStartup 66371->66372 66373 22da3819ac0 66371->66373 66372->66373 66374 22da3819a67 VirtualProtect 66372->66374 66374->66373 66375 22da3819a86 VirtualProtect 66374->66375 66375->66373 66377 22da383a154 66378 22da383a1e3 66377->66378 66379 22da383a166 66377->66379 66381 22da383a239 66378->66381 66388 22da383a1e7 _CRT_INIT 66378->66388 66425 22da383a4f4 GetProcessHeap 66379->66425 66383 22da383a23e 66381->66383 66384 22da383a29c 66381->66384 66382 22da383a16b 66385 22da383a16f _CRT_INIT 66382->66385 66426 22da383c2e8 106 API calls 5 library calls 66382->66426 66467 22da384070c 66383->66467 66384->66385 66470 22da383c140 65 API calls 3 library calls 66384->66470 66388->66385 66463 22da383a5b8 67 API calls free 66388->66463 66392 22da383a17b _RTC_Initialize 66392->66385 66399 22da383a18b GetCommandLineA 66392->66399 66393 22da383a20f 66397 22da383a21e _CRT_INIT 66393->66397 66464 22da383ffec 66 API calls free 66393->66464 66397->66385 66466 22da383c368 68 API calls 2 library calls 66397->66466 66398 22da383a219 66465 22da383c368 68 API calls 2 library calls 66398->66465 66427 22da38404fc GetEnvironmentStringsW 66399->66427 66410 22da383a1a9 66412 22da383a1ad 66410->66412 66413 22da383a1b4 66410->66413 66458 22da383c368 68 API calls 2 library calls 66412->66458 66459 22da3840060 78 API calls 3 library calls 66413->66459 66417 22da383a1b9 66418 22da383a1cd 66417->66418 66460 22da384031c 77 API calls 6 library calls 66417->66460 66424 22da383a1d1 66418->66424 66462 22da383ffec 66 API calls free 66418->66462 66421 22da383a1c2 66421->66418 66461 22da383a738 76 API calls 4 library calls 66421->66461 66422 22da383a1e1 66422->66412 66424->66385 66425->66382 66426->66392 66428 22da383a19d 66427->66428 66429 22da384052a WideCharToMultiByte 66427->66429 66440 22da383fcbc 66428->66440 66431 22da3840579 66429->66431 66432 22da38405ca FreeEnvironmentStringsW 66429->66432 66471 22da3840c80 65 API calls malloc 66431->66471 66432->66428 66434 22da3840581 66434->66432 66435 22da3840589 WideCharToMultiByte 66434->66435 66436 22da38405b1 66435->66436 66437 22da38405bc FreeEnvironmentStringsW 66435->66437 66438 22da3837a38 free 65 API calls 66436->66438 66437->66428 66439 22da38405b9 66438->66439 66439->66437 66472 22da3840df0 66440->66472 66442 22da383fceb 66443 22da3840c00 _mtinit 65 API calls 66442->66443 66444 22da383fcff 66443->66444 66445 22da383fd7a GetStartupInfoW 66444->66445 66446 22da383fd0f _ioinit 66444->66446 66449 22da383fd94 66445->66449 66454 22da383fed6 66445->66454 66446->66410 66447 22da383ffbb 66450 22da3840fe0 _setmbcp LeaveCriticalSection 66447->66450 66448 22da383fdf0 66448->66454 66455 22da383fe78 GetFileType 66448->66455 66457 22da3840744 _mtinitlocknum InitializeCriticalSectionAndSpinCount 66448->66457 66449->66448 66452 22da3840c00 _mtinit 65 API calls 66449->66452 66449->66454 66450->66446 66451 22da383ff1e GetStdHandle 66453 22da383ff49 GetFileType 66451->66453 66451->66454 66452->66449 66453->66454 66454->66447 66454->66451 66456 22da3840744 _mtinitlocknum InitializeCriticalSectionAndSpinCount 66454->66456 66455->66448 66456->66454 66457->66448 66458->66385 66459->66417 66460->66421 66461->66418 66462->66422 66463->66393 66464->66398 66465->66397 66466->66385 66468 22da384071f TlsGetValue 66467->66468 66469 22da384071c 66467->66469 66469->66468 66470->66385 66471->66434 66473 22da3840e0e 66472->66473 66474 22da3840e1f EnterCriticalSection 66472->66474 66478 22da3840ebc 65 API calls 8 library calls 66473->66478 66476 22da3840e13 66476->66474 66479 22da383a700 65 API calls 3 library calls 66476->66479 66478->66476 66480 22da3828514 66481 22da382853d 66480->66481 66482 22da3828544 66480->66482 66494 22da3837a78 66482->66494 66484 22da382854e _ld12tod 66484->66481 66511 22da382824c 66484->66511 66487 22da382859f CreateThread 66487->66481 66490 22da3828614 66487->66490 66488 22da382858e 66489 22da3837a38 free 65 API calls 66488->66489 66489->66481 66518 22da38282c8 66490->66518 66493 22da3837a38 free 65 API calls 66493->66481 66495 22da3837b0c 66494->66495 66509 22da3837a90 66494->66509 66528 22da383a520 DecodePointer 66495->66528 66497 22da3837ac8 HeapAlloc 66502 22da3837b01 66497->66502 66497->66509 66498 22da3837aa8 66498->66497 66522 22da383aa74 65 API calls 2 library calls 66498->66522 66523 22da383aae8 65 API calls 5 library calls 66498->66523 66524 22da383a5a0 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 66498->66524 66499 22da3837b11 66529 22da383a484 65 API calls _getptd_noexit 66499->66529 66502->66484 66503 22da3837af1 66526 22da383a484 65 API calls _getptd_noexit 66503->66526 66507 22da3837af6 66527 22da383a484 65 API calls _getptd_noexit 66507->66527 66509->66497 66509->66498 66509->66503 66509->66507 66525 22da383a520 DecodePointer 66509->66525 66512 22da3837a78 malloc 65 API calls 66511->66512 66513 22da3828263 _ld12tod 66512->66513 66514 22da3828286 CreateEventW 66513->66514 66515 22da3828270 66513->66515 66514->66515 66516 22da38282a9 66514->66516 66515->66487 66515->66488 66517 22da3837a38 free 65 API calls 66516->66517 66517->66515 66519 22da38282dd CloseHandle 66518->66519 66520 22da38282d9 66518->66520 66521 22da3837a38 free 65 API calls 66519->66521 66520->66493 66521->66520 66522->66498 66523->66498 66525->66509 66526->66507 66527->66502 66528->66499 66529->66502 66530 22da3822518 66539 22da38281f0 66530->66539 66532 22da382255b 66533 22da3822565 send 66532->66533 66534 22da38225bc GetLastError 66532->66534 66533->66532 66535 22da38225a2 66533->66535 66536 22da38225cd 66534->66536 66535->66534 66535->66535 66536->66536 66537 22da3828220 type_info::_name_internal_method ReleaseMutex 66536->66537 66538 22da38225e9 66537->66538 66540 22da3828214 66539->66540 66541 22da3828201 WaitForSingleObject 66539->66541 66540->66532 66541->66540 66542 22da381b138 66561 22da38166ac 66542->66561 66546 22da381b1af 66546->66546 66583 22da3817548 103 API calls type_info::_name_internal_method 66546->66583 66547 22da381b1f9 CryptAcquireContextW 66548 22da381b258 GetLastError 66547->66548 66555 22da381b15b 66547->66555 66548->66555 66550 22da381b297 CryptGenRandom 66552 22da381b2e7 GetLastError 66550->66552 66553 22da381b2fc CryptImportKey 66550->66553 66551 22da381b47f 66552->66546 66554 22da381b339 GetLastError 66553->66554 66553->66555 66554->66546 66555->66546 66555->66547 66555->66550 66559 22da3816e14 76 API calls type_info::_name_internal_method 66555->66559 66560 22da3837a38 free 65 API calls 66555->66560 66572 22da383828c 66555->66572 66579 22da381b4a4 67 API calls free 66555->66579 66580 22da3817324 74 API calls type_info::_name_internal_method 66555->66580 66581 22da381b564 78 API calls 3 library calls 66555->66581 66582 22da3816ac4 77 API calls type_info::_name_internal_method 66555->66582 66559->66555 66560->66555 66584 22da3816fd4 htonl 66561->66584 66563 22da38166d0 66585 22da38172e4 66563->66585 66566 22da38167b4 66566->66555 66567 22da3816701 66567->66566 66567->66567 66591 22da3816858 68 API calls 3 library calls 66567->66591 66570 22da38166f6 66570->66567 66588 22da38165bc 82 API calls 3 library calls 66570->66588 66589 22da381704c 74 API calls type_info::_name_internal_method 66570->66589 66590 22da38169a4 76 API calls 2 library calls 66570->66590 66616 22da383b050 66572->66616 66575 22da38382be 66575->66555 66577 22da38382b4 66577->66575 66625 22da383a484 65 API calls _getptd_noexit 66577->66625 66579->66555 66580->66555 66581->66555 66582->66555 66583->66551 66584->66563 66592 22da3817148 66585->66592 66588->66570 66589->66570 66590->66570 66591->66566 66597 22da3817018 66592->66597 66595 22da3817171 66595->66570 66596 22da3817183 htonl 66596->66595 66600 22da38170f0 66597->66600 66603 22da3817c3c 66600->66603 66611 22da3817c74 _ld12tod type_info::_name_internal_method 66603->66611 66604 22da3817040 66604->66595 66604->66596 66605 22da3817d27 htonl 66605->66611 66606 22da3817d3e htonl 66606->66611 66607 22da3817e1d htonl htonl 66607->66611 66608 22da3817eb3 htonl 66608->66611 66609 22da3837a78 65 API calls malloc 66609->66611 66610 22da3837a38 65 API calls free 66610->66611 66611->66604 66611->66605 66611->66606 66611->66607 66611->66608 66611->66609 66611->66610 66614 22da3818f74 69 API calls 2 library calls 66611->66614 66615 22da3819404 67 API calls 2 library calls 66611->66615 66614->66611 66615->66611 66617 22da383b065 66616->66617 66622 22da383b082 66616->66622 66618 22da383b073 66617->66618 66617->66622 66626 22da383a484 65 API calls _getptd_noexit 66618->66626 66620 22da383b09a HeapAlloc 66621 22da38382a1 66620->66621 66620->66622 66621->66575 66624 22da383a484 65 API calls _getptd_noexit 66621->66624 66622->66620 66622->66621 66627 22da383a520 DecodePointer 66622->66627 66624->66577 66625->66575 66626->66621 66627->66622 66628 22da382199c 66629 22da38281f0 type_info::_name_internal_method WaitForSingleObject 66628->66629 66630 22da38219d2 select 66629->66630 66632 22da3828220 type_info::_name_internal_method ReleaseMutex 66630->66632 66633 22da3821a8f 66632->66633 66634 22da382815c 66635 22da3837a78 malloc 65 API calls 66634->66635 66637 22da382816a _ld12tod 66635->66637 66636 22da382819e 66637->66636 66638 22da3828189 CreateMutexExW 66637->66638 66638->66636 66639 22da381759c 66640 22da38175bb 66639->66640 66641 22da38175ca 66640->66641 66655 22da3817720 85 API calls 2 library calls 66640->66655 66641->66641 66643 22da38175f8 66656 22da3816e14 76 API calls 4 library calls 66643->66656 66648 22da3817686 SetLastError 66649 22da381761d 66648->66649 66649->66648 66649->66649 66650 22da381769a GetLastError 66649->66650 66657 22da381ac84 66649->66657 66691 22da381704c 74 API calls type_info::_name_internal_method 66649->66691 66692 22da38177c8 65 API calls 4 library calls 66649->66692 66651 22da38176b6 66650->66651 66652 22da38176ac 66650->66652 66693 22da3816858 68 API calls 3 library calls 66651->66693 66654 22da3837a38 free 65 API calls 66652->66654 66654->66651 66655->66643 66656->66649 66658 22da381acb0 66657->66658 66658->66658 66694 22da3819ff0 66658->66694 66662 22da3837a78 malloc 65 API calls 66663 22da381b031 htonl 66662->66663 66665 22da3839698 memcpy_s 65 API calls 66663->66665 66664 22da381ad49 CryptDuplicateKey 66667 22da381ad70 GetLastError 66664->66667 66668 22da381ad85 CryptSetKeyParam 66664->66668 66669 22da381b090 66665->66669 66666 22da381b0c4 type_info::_name_internal_method 66666->66666 66675 22da381b126 66666->66675 66676 22da381b11b CryptDestroyKey 66666->66676 66679 22da381ad7a 66667->66679 66670 22da381adbe CryptGenRandom 66668->66670 66671 22da381ada9 GetLastError 66668->66671 66674 22da3839698 memcpy_s 65 API calls 66669->66674 66672 22da381adf1 66670->66672 66673 22da381ade7 GetLastError 66670->66673 66671->66679 66672->66672 66677 22da381adfd CryptSetKeyParam 66672->66677 66680 22da381ae37 htonl 66672->66680 66673->66672 66674->66666 66675->66649 66676->66675 66677->66672 66678 22da381ae1c GetLastError 66677->66678 66678->66679 66679->66662 66679->66666 66679->66679 66681 22da3837a78 malloc 65 API calls 66680->66681 66682 22da381ae81 66681->66682 66683 22da3839698 memcpy_s 65 API calls 66682->66683 66684 22da381aefe CryptEncrypt 66683->66684 66685 22da381af37 GetLastError 66684->66685 66686 22da381af41 66684->66686 66685->66686 66686->66686 66687 22da381af4f htonl 66686->66687 66688 22da3839698 memcpy_s 65 API calls 66687->66688 66689 22da381acf5 66688->66689 66689->66664 66689->66679 66690 22da3839698 memcpy_s 65 API calls 66689->66690 66690->66689 66691->66649 66692->66649 66693->66641 66695 22da381a002 66694->66695 66696 22da381a011 66694->66696 66720 22da38197dc GetSystemTimeAsFileTime _time64 66695->66720 66717 22da38389e0 66696->66717 66700 22da381a009 66721 22da3838a0c 65 API calls _getptd 66700->66721 66701 22da38389e0 rand 65 API calls 66703 22da381a04c 66701->66703 66704 22da38389e0 rand 65 API calls 66703->66704 66705 22da381a073 66704->66705 66706 22da38389e0 rand 65 API calls 66705->66706 66707 22da381a0a0 66706->66707 66708 22da3839698 66707->66708 66712 22da38396b5 _cftof2_l 66708->66712 66713 22da38396b9 _ld12tod 66708->66713 66709 22da38396be 66747 22da383a484 65 API calls _getptd_noexit 66709->66747 66711 22da38396c3 66748 22da383b250 14 API calls _invalid_parameter_noinfo 66711->66748 66712->66689 66713->66709 66713->66712 66715 22da38396f9 66713->66715 66715->66712 66749 22da383a484 65 API calls _getptd_noexit 66715->66749 66722 22da383c17c 66717->66722 66720->66700 66721->66696 66727 22da383c1a0 GetLastError 66722->66727 66724 22da383c187 66725 22da381a020 66724->66725 66741 22da383a700 65 API calls 3 library calls 66724->66741 66725->66701 66728 22da384070c _CRT_INIT TlsGetValue 66727->66728 66729 22da383c1bd 66728->66729 66730 22da383c20c SetLastError 66729->66730 66742 22da3840c00 66729->66742 66730->66724 66745 22da3840c25 66742->66745 66743 22da383b050 _calloc_impl 65 API calls 66743->66745 66744 22da383c1d2 66744->66730 66746 22da3840728 TlsSetValue 66744->66746 66745->66743 66745->66744 66747->66711 66748->66712 66749->66711 66750 22da37c9540 66753 22da37c95ef 66750->66753 66751 22da37c98b0 LoadLibraryA 66751->66753 66752 22da37c9791 __CxxFrameHandler2 66753->66751 66753->66752 66754 7ff6ef725524 66755 7ff6ef72553d 66754->66755 66756 7ff6ef72567b 66755->66756 66757 7ff6ef725545 __scrt_acquire_startup_lock 66755->66757 66778 7ff6ef725ac4 9 API calls 66756->66778 66759 7ff6ef725685 66757->66759 66763 7ff6ef725563 __scrt_release_startup_lock 66757->66763 66779 7ff6ef725ac4 9 API calls 66759->66779 66761 7ff6ef725690 66764 7ff6ef725698 _exit 66761->66764 66762 7ff6ef725588 66763->66762 66765 7ff6ef72560e _get_initial_narrow_environment __p___argv __p___argc 66763->66765 66768 7ff6ef725606 _register_thread_local_exe_atexit_callback 66763->66768 66774 7ff6ef7115b0 66765->66774 66768->66765 66770 7ff6ef725637 66770->66761 66771 7ff6ef72563b 66770->66771 66772 7ff6ef725640 _cexit 66771->66772 66773 7ff6ef725645 66771->66773 66772->66773 66773->66762 66780 7ff6ef7112c0 66774->66780 66777 7ff6ef725c18 GetModuleHandleW 66777->66770 66778->66759 66779->66761 66783 7ff6ef713000 AddVectoredExceptionHandler SetThreadStackGuarantee GetCurrentThread SetThreadDescription 66780->66783 66784 7ff6ef71307e 66783->66784 66785 7ff6ef7130a9 66783->66785 66784->66785 66787 7ff6ef71326e 66784->66787 66798 7ff6ef7211e0 66785->66798 66808 7ff6ef726540 17 API calls 66787->66808 66789 7ff6ef7131c7 66809 7ff6ef714540 17 API calls 66789->66809 66791 7ff6ef7131d7 66803 7ff6ef711310 66791->66803 66792 7ff6ef7130d2 66792->66789 66792->66791 66806 7ff6ef714540 17 API calls 66792->66806 66794 7ff6ef71321c 66795 7ff6ef7112fa 66794->66795 66807 7ff6ef726770 WaitOnAddress GetLastError WakeByAddressAll 66794->66807 66795->66777 66799 7ff6ef721216 66798->66799 66800 7ff6ef72122b 66798->66800 66799->66792 66810 7ff6ef727040 17 API calls 66800->66810 66811 7ff6ef7113b0 66803->66811 66805 7ff6ef711321 66805->66794 66806->66792 66807->66795 66809->66794 66814 7ff6ef7112a0 66811->66814 66817 7ff6ef7113d0 VirtualAlloc 66814->66817 66815 7ff6ef7112ab 66815->66805 66818 7ff6ef71143a 66817->66818 66819 7ff6ef711442 66818->66819 66820 7ff6ef711544 66818->66820 66829 7ff6ef711000 66819->66829 66844 7ff6ef726d50 17 API calls 66820->66844 66822 7ff6ef71149f 66824 7ff6ef7114b6 CreateThread 66822->66824 66825 7ff6ef711542 WaitForSingleObject 66824->66825 66826 7ff6ef71156b 66824->66826 66825->66815 66845 7ff6ef726d50 17 API calls 66826->66845 66830 7ff6ef711052 66829->66830 66837 7ff6ef711050 66829->66837 66831 7ff6ef7110b8 66830->66831 66834 7ff6ef7110bc 66830->66834 66846 7ff6ef726d50 17 API calls 66831->66846 66836 7ff6ef7111a0 66834->66836 66834->66837 66848 7ff6ef726d50 17 API calls 66836->66848 66838 7ff6ef7111f8 66837->66838 66847 7ff6ef726e30 17 API calls 66837->66847 66838->66822 66849 22da546e644 66850 22da546e6d3 66849->66850 66851 22da546e656 66849->66851 66853 22da546e729 66850->66853 66859 22da546e6d7 _CRT_INIT 66850->66859 66897 22da546fa7c GetProcessHeap 66851->66897 66855 22da546e72e 66853->66855 66856 22da546e78c 66853->66856 66854 22da546e65b 66886 22da546e65f _CRT_INIT 66854->66886 66898 22da5471e80 108 API calls 7 library calls 66854->66898 66927 22da5477510 TlsGetValue 66855->66927 66856->66886 66928 22da5471cd8 67 API calls 2 library calls 66856->66928 66859->66886 66923 22da546e960 69 API calls free 66859->66923 66863 22da546e66b _RTC_Initialize 66870 22da546e67b GetCommandLineA 66863->66870 66863->66886 66864 22da546e6ff 66866 22da546e70e _CRT_INIT 66864->66866 66924 22da5473290 68 API calls free 66864->66924 66866->66886 66926 22da5471f00 70 API calls 2 library calls 66866->66926 66869 22da546e709 66925 22da5471f00 70 API calls 2 library calls 66869->66925 66899 22da5477300 72 API calls 2 library calls 66870->66899 66875 22da546e68d 66900 22da5472f60 66875->66900 66880 22da546e699 66883 22da546e6a4 66880->66883 66884 22da546e69d 66880->66884 66919 22da5476e64 80 API calls 3 library calls 66883->66919 66918 22da5471f00 70 API calls 2 library calls 66884->66918 66889 22da546e6a9 66890 22da546e6bd 66889->66890 66920 22da5477120 79 API calls 6 library calls 66889->66920 66896 22da546e6c1 66890->66896 66922 22da5473290 68 API calls free 66890->66922 66893 22da546e6d1 66893->66884 66894 22da546e6b2 66894->66890 66921 22da546eae0 78 API calls 5 library calls 66894->66921 66896->66886 66897->66854 66898->66863 66899->66875 66929 22da5477c78 66900->66929 66902 22da5472f8f 66903 22da5477a04 __check_float_string 67 API calls 66902->66903 66905 22da5472fa3 66903->66905 66904 22da547301e GetStartupInfoW 66907 22da547317a 66904->66907 66908 22da5473038 66904->66908 66905->66904 66906 22da5472fb3 _ioinit 66905->66906 66906->66880 66909 22da547325f 66907->66909 66911 22da54731c2 GetStdHandle 66907->66911 66916 22da5477548 __lock_fhandle InitializeCriticalSectionAndSpinCount 66907->66916 66908->66907 66913 22da5477a04 __check_float_string 67 API calls 66908->66913 66914 22da5473094 66908->66914 66910 22da5477e68 _setmbcp LeaveCriticalSection 66909->66910 66910->66906 66911->66907 66912 22da54731ed GetFileType 66911->66912 66912->66907 66913->66908 66914->66907 66915 22da547311c GetFileType 66914->66915 66917 22da5477548 __lock_fhandle InitializeCriticalSectionAndSpinCount 66914->66917 66915->66914 66916->66907 66917->66914 66918->66886 66919->66889 66920->66894 66921->66890 66922->66893 66923->66864 66924->66869 66925->66866 66926->66886 66928->66886 66930 22da5477ca7 EnterCriticalSection 66929->66930 66931 22da5477c96 66929->66931 66935 22da5477d44 67 API calls 8 library calls 66931->66935 66933 22da5477c9b 66933->66930 66936 22da546eaa8 67 API calls 3 library calls 66933->66936 66935->66933 66937 22da381b69f 66938 22da381b5aa 66937->66938 66939 22da381b6af CryptImportPublicKeyInfo 66938->66939 66942 22da383828c calloc 65 API calls 66938->66942 66949 22da3839698 memcpy_s 65 API calls 66938->66949 66954 22da381b5cc CryptDecodeObjectEx 66938->66954 66956 22da381b638 CryptAcquireContextW 66938->66956 66957 22da381b664 CryptAcquireContextW 66938->66957 66959 22da381b5bf 66938->66959 66940 22da381b6cd GetLastError 66939->66940 66941 22da381b6e2 CryptEncrypt 66939->66941 66940->66959 66941->66938 66942->66938 66943 22da381b87f 66944 22da381b892 66943->66944 66945 22da381b887 LocalFree 66943->66945 66946 22da381b8a5 66944->66946 66947 22da381b89a CryptDestroyKey 66944->66947 66945->66944 66951 22da381b8ad CryptReleaseContext 66946->66951 66952 22da381b8ba 66946->66952 66947->66946 66948 22da3837a38 free 65 API calls 66948->66943 66950 22da381b770 CryptEncrypt 66949->66950 66950->66938 66953 22da381b7a9 GetLastError 66950->66953 66951->66952 66953->66938 66954->66938 66955 22da381b61d GetLastError 66954->66955 66955->66959 66956->66938 66957->66938 66958 22da381b68a GetLastError 66957->66958 66958->66959 66959->66943 66959->66948 66959->66959 66960 22da3670000 66963 22da36700d6 LoadLibraryA 66960->66963 66964 22da367011b WSASocketA 66963->66964 66965 22da367013e connect 66964->66965 66966 22da3670154 66965->66966 66967 22da3670160 recv VirtualAlloc 66965->66967 66966->66965 66968 22da3670159 66966->66968 66969 22da367019f recv 66967->66969 66968->66967 66969->66969 66970 22da36701be 66969->66970 66971 22da3821aa4 66972 22da3821ab9 __crtGetStringTypeA_stat 66971->66972 66973 22da38281f0 type_info::_name_internal_method WaitForSingleObject 66972->66973 66976 22da3821b22 66973->66976 66974 22da3821b9f 66978 22da3821ba9 66974->66978 66982 22da3821cac type_info::_name_internal_method _cftof2_l 66974->66982 66984 22da3821bd0 66974->66984 66975 22da3821b2f recv 66975->66976 66977 22da3821b69 SetLastError 66975->66977 66976->66974 66976->66975 66979 22da3821edb GetLastError 66977->66979 66978->66978 66978->66979 66980 22da3821ee5 66979->66980 66980->66980 66981 22da3821efd 66980->66981 66983 22da3837a38 free 65 API calls 66980->66983 66985 22da3821f1f 66981->66985 66990 22da3837a38 free 65 API calls 66981->66990 66988 22da3821ce2 htonl 66982->66988 66983->66981 66986 22da3821c84 66984->66986 66989 22da3821c0c 66984->66989 66987 22da3828220 type_info::_name_internal_method ReleaseMutex 66985->66987 66986->66978 66992 22da3821c90 SetLastError 66986->66992 66991 22da3821f39 66987->66991 66995 22da3821cf9 66988->66995 66989->66984 66993 22da3821c27 recv 66989->66993 66990->66985 66991->66991 66992->66979 66993->66989 66994 22da3821c53 GetLastError 66993->66994 66994->66989 66996 22da3821c62 SetLastError 66994->66996 66995->66995 66997 22da3837a78 malloc 65 API calls 66995->66997 66996->66986 66998 22da3821d24 66997->66998 66999 22da3821d31 66998->66999 67000 22da3821d47 66998->67000 66999->66999 67001 22da3821d37 SetLastError 66999->67001 67000->67000 67002 22da3839698 memcpy_s 65 API calls 67000->67002 67001->66979 67003 22da3821d6a 67002->67003 67004 22da3821d82 recv 67003->67004 67008 22da3821df7 type_info::_name_internal_method 67003->67008 67004->67003 67005 22da3821dbf GetLastError 67004->67005 67005->67003 67006 22da3821dce 67005->67006 67006->66978 67007 22da3821dd5 SetLastError 67006->67007 67007->66978 67008->66978 67009 22da3821e3e 67008->67009 67012 22da3821e6d 67008->67012 67009->67009 67015 22da381a904 81 API calls 5 library calls 67009->67015 67011 22da3821e63 SetLastError 67011->66979 67012->66978 67016 22da381b8c8 69 API calls type_info::_name_internal_method 67012->67016 67014 22da3821eb3 SetLastError 67014->66979 67015->67011 67016->67014 67017 22da5452460 67018 22da545246c sprintf __crtLCMapStringA_stat 67017->67018 67030 22da54523c0 GetCurrentThread OpenThreadToken 67018->67030 67020 22da54524e1 67021 22da54524e9 LookupAccountSidW 67020->67021 67029 22da54525b1 67020->67029 67022 22da5452534 GetLastError 67021->67022 67023 22da5452543 67021->67023 67035 22da546cb70 92 API calls 4 library calls 67023->67035 67025 22da54525a1 67036 22da546af38 67025->67036 67027 22da54525a9 67028 22da546af38 free 67 API calls 67027->67028 67028->67029 67031 22da5452424 GetTokenInformation 67030->67031 67032 22da54523f6 GetCurrentProcess OpenProcessToken 67030->67032 67033 22da5452413 GetLastError 67031->67033 67034 22da5452448 67031->67034 67032->67031 67032->67033 67033->67020 67034->67020 67035->67025 67037 22da546af3d RtlFreeHeap 67036->67037 67041 22da546af6d realloc 67036->67041 67038 22da546af58 67037->67038 67037->67041 67042 22da546f970 67 API calls _getptd_noexit 67038->67042 67040 22da546af5d GetLastError 67040->67041 67041->67027 67042->67040 67043 22da54515c0 67044 22da54515e0 sprintf 67043->67044 67045 22da545161d GetComputerNameA 67044->67045 67046 22da5451645 67045->67046 67047 22da5451637 GetLastError 67045->67047 67079 22da5452600 67046->67079 67048 22da54518eb 67047->67048 67050 22da5451679 LoadLibraryA 67051 22da54516c6 67050->67051 67052 22da545168e GetProcAddress GetProcAddress 67050->67052 67054 22da5451704 GetProcAddress 67051->67054 67055 22da5451827 NetWkstaGetInfo 67051->67055 67052->67051 67053 22da54516b6 GetNativeSystemInfo 67052->67053 67053->67051 67057 22da545172b GetLocaleInfoA 67054->67057 67058 22da54517d8 67054->67058 67056 22da54518b5 IsUserAnAdmin 67055->67056 67065 22da545184f 67055->67065 67061 22da54518d0 GetCurrentProcessId 67056->67061 67062 22da5451751 67057->67062 67063 22da545176f GetLocaleInfoA 67057->67063 67110 22da546cb70 92 API calls 4 library calls 67058->67110 67061->67048 67092 22da546af78 67062->67092 67064 22da5451788 67063->67064 67069 22da54517a6 67063->67069 67068 22da546af78 malloc 67 API calls 67064->67068 67077 22da546af38 free 67 API calls 67065->67077 67066 22da54517d6 67070 22da5451812 67066->67070 67074 22da546af38 free 67 API calls 67066->67074 67072 22da5451790 GetLocaleInfoA 67068->67072 67069->67058 67073 22da54517b8 67069->67073 67070->67055 67075 22da546af38 free 67 API calls 67070->67075 67071 22da5451759 GetLocaleInfoA 67071->67063 67072->67069 67109 22da546cb70 92 API calls 4 library calls 67073->67109 67074->67070 67075->67055 67078 22da54518a8 NetApiBufferFree 67077->67078 67078->67056 67111 22da546b6a0 67079->67111 67082 22da545264a GetProcAddress 67084 22da545266a GetLastError 67082->67084 67086 22da5452681 sprintf 67082->67086 67083 22da545263b GetLastError 67083->67050 67084->67050 67085 22da54526a6 67085->67050 67086->67085 67087 22da5452882 67086->67087 67088 22da5452850 67086->67088 67114 22da546cb70 92 API calls 4 library calls 67087->67114 67113 22da546cb70 92 API calls 4 library calls 67088->67113 67091 22da5452880 67091->67050 67093 22da546af90 67092->67093 67094 22da546b00c 67092->67094 67097 22da546afc8 HeapAlloc 67093->67097 67101 22da546aff1 67093->67101 67105 22da546aff6 67093->67105 67107 22da546afa8 67093->67107 67118 22da546faa8 DecodePointer 67093->67118 67121 22da546faa8 DecodePointer 67094->67121 67096 22da546b011 67122 22da546f970 67 API calls _getptd_noexit 67096->67122 67097->67093 67099 22da546b001 67097->67099 67099->67071 67119 22da546f970 67 API calls _getptd_noexit 67101->67119 67120 22da546f970 67 API calls _getptd_noexit 67105->67120 67107->67097 67115 22da546fae4 67 API calls 2 library calls 67107->67115 67116 22da546fb58 67 API calls 6 library calls 67107->67116 67117 22da546e948 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 67107->67117 67109->67066 67110->67066 67112 22da5452629 GetModuleHandleA 67111->67112 67112->67082 67112->67083 67113->67091 67114->67091 67115->67107 67116->67107 67118->67093 67119->67105 67120->67099 67121->67096 67122->67099 67123 22da5447660 67124 22da5447682 67123->67124 67127 22da54478c0 GetModuleHandleA GetProcAddress 67124->67127 67126 22da5447690 67128 22da544791d GetAdaptersAddresses 67127->67128 67129 22da5447905 67127->67129 67131 22da546af78 malloc 67 API calls 67128->67131 67147 22da54476c0 73 API calls 3 library calls 67129->67147 67133 22da544794c 67131->67133 67132 22da5447910 67132->67126 67134 22da5447954 67133->67134 67135 22da544795d GetAdaptersAddresses 67133->67135 67134->67126 67136 22da5447989 67135->67136 67137 22da544797c GetLastError 67135->67137 67139 22da54479a2 sprintf 67136->67139 67140 22da5447990 67136->67140 67138 22da544799b 67137->67138 67142 22da546af38 free 67 API calls 67138->67142 67143 22da54479cc GetVersionExA 67139->67143 67148 22da54476c0 73 API calls 3 library calls 67140->67148 67142->67134 67144 22da54479e2 67143->67144 67145 22da5447b5d 67144->67145 67146 22da5447aa3 htonl 67144->67146 67145->67138 67146->67144 67147->67132 67148->67138 67149 22da5447ba0 67150 22da5447bca GetModuleHandleA GetProcAddress 67149->67150 67151 22da546af78 malloc 67 API calls 67150->67151 67153 22da5447c08 67151->67153 67152 22da5447c10 67153->67152 67154 22da5447c31 GetLastError 67153->67154 67160 22da5447c3e _itow 67153->67160 67155 22da5447f4b 67154->67155 67158 22da546af38 free 67 API calls 67155->67158 67156 22da5447d50 GetModuleHandleA GetProcAddress 67156->67155 67157 22da5447dd9 InternalGetForwardIpTable2 67156->67157 67159 22da5447de6 GetLastError 67157->67159 67163 22da5447df3 _itow 67157->67163 67158->67152 67159->67155 67160->67156 67161 22da5447cf0 htonl 67160->67161 67161->67160 67162 22da5447e3a GetLastError 67162->67163 67163->67155 67163->67162 67165 22da5447ede htonl 67163->67165 67166 22da54482a0 htonl htonl htonl htonl 67163->67166 67165->67163 67166->67163 67167 22da54b7920 67168 22da54b79af 67167->67168 67169 22da54b7932 67167->67169 67170 22da54b7a05 67168->67170 67177 22da54b79b3 _CRT_INIT 67168->67177 67215 22da54b7d5c GetProcessHeap 67169->67215 67173 22da54b7a68 67170->67173 67174 22da54b7a0a 67170->67174 67172 22da54b7937 67183 22da54b793b _CRT_INIT 67172->67183 67216 22da54b99a0 106 API calls 7 library calls 67172->67216 67173->67183 67249 22da54b97f8 65 API calls 2 library calls 67173->67249 67248 22da54bb000 TlsGetValue 67174->67248 67177->67183 67244 22da54b9adc 67 API calls free 67177->67244 67181 22da54b7947 _RTC_Initialize 67181->67183 67188 22da54b7957 GetCommandLineA 67181->67188 67182 22da54b79db 67193 22da54b79ea _CRT_INIT 67182->67193 67245 22da54ba8e0 66 API calls free 67182->67245 67187 22da54b79e5 67246 22da54b9a20 68 API calls 2 library calls 67187->67246 67217 22da54badf0 70 API calls 2 library calls 67188->67217 67193->67183 67247 22da54b9a20 68 API calls 2 library calls 67193->67247 67194 22da54b7969 67218 22da54ba5b0 67194->67218 67202 22da54b7979 67239 22da54b9a20 68 API calls 2 library calls 67202->67239 67203 22da54b7980 67240 22da54ba954 78 API calls 3 library calls 67203->67240 67207 22da54b7985 67208 22da54b7999 67207->67208 67241 22da54bac10 77 API calls 6 library calls 67207->67241 67214 22da54b799d 67208->67214 67243 22da54ba8e0 66 API calls free 67208->67243 67211 22da54b798e 67211->67208 67242 22da54b9c5c 76 API calls 4 library calls 67211->67242 67212 22da54b79ad 67212->67202 67214->67183 67215->67172 67216->67181 67217->67194 67250 22da54be2d8 67218->67250 67220 22da54ba5df 67221 22da54bb4f4 _ioinit 65 API calls 67220->67221 67222 22da54ba5f3 67221->67222 67223 22da54ba61c GetStartupInfoW 67222->67223 67224 22da54ba603 67222->67224 67227 22da54ba688 67223->67227 67228 22da54ba7ca 67223->67228 67225 22da54ba290 _ioinit RtlUnwindEx 67224->67225 67233 22da54b7975 67225->67233 67227->67228 67232 22da54bb4f4 _ioinit 65 API calls 67227->67232 67235 22da54ba6e4 67227->67235 67229 22da54ba8af 67228->67229 67231 22da54ba812 GetStdHandle 67228->67231 67237 22da54bb038 _mtinitlocks InitializeCriticalSectionAndSpinCount 67228->67237 67230 22da54be4c8 _fcloseall LeaveCriticalSection 67229->67230 67230->67233 67231->67228 67234 22da54ba83d GetFileType 67231->67234 67232->67227 67233->67202 67233->67203 67234->67228 67235->67228 67236 22da54ba76c GetFileType 67235->67236 67238 22da54bb038 _mtinitlocks InitializeCriticalSectionAndSpinCount 67235->67238 67236->67235 67237->67228 67238->67235 67239->67183 67240->67207 67241->67211 67242->67208 67243->67212 67244->67182 67245->67187 67246->67193 67247->67183 67249->67183 67251 22da54be2f6 67250->67251 67252 22da54be307 EnterCriticalSection 67250->67252 67256 22da54be3a4 65 API calls 8 library calls 67251->67256 67254 22da54be2fb 67254->67252 67257 22da54b9c24 65 API calls 3 library calls 67254->67257 67256->67254 67258 22da382868c 67259 22da382869d 67258->67259 67260 22da38286a1 ResumeThread 67258->67260 67260->67259

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Info$Locale$AddressProc$malloc$ComputerErrorLastLibraryLoadNameNativeSystem_snprintf
              • String ID: %s_%s$GetNativeSystemInfo$GetSystemDefaultLangID$IA64$IsWow64Process$Unknown$kernel32.dll$x64$x86
              • API String ID: 3227938556-198457881
              • Opcode ID: 8111a1cd46e082fb863d9515a28ab07058479b3937ed7e79029cc579077c90ed
              • Instruction ID: f0d4e664d333e243686b8d987ebc4a41b832e0113e66be7ed5c03f27ea894941
              • Opcode Fuzzy Hash: 8111a1cd46e082fb863d9515a28ab07058479b3937ed7e79029cc579077c90ed
              • Instruction Fuzzy Hash: 0F91A271B14B81A2EB649FA2E85CBAE63A0F785F80F445026DE4B63B55DFBCC845C740

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 56 22da381ac84-22da381aca7 57 22da381acb0-22da381acb4 56->57 57->57 58 22da381acb6-22da381ad05 call 22da3819ff0 call 22da3839698 57->58 63 22da381afef-22da381aff3 58->63 64 22da381ad0b-22da381ad1e 58->64 63->63 66 22da381aff5-22da381b001 63->66 64->63 65 22da381ad24-22da381ad28 64->65 65->65 67 22da381ad2a-22da381ad3d 65->67 68 22da381b0c4-22da381b0c8 66->68 69 22da381b007-22da381b0bf call 22da3837a78 htonl call 22da3839698 * 2 66->69 72 22da381afd1-22da381afd5 67->72 73 22da381ad43-22da381ad47 67->73 68->68 71 22da381b0ca-22da381b108 call 22da3819f9c 68->71 69->68 79 22da381b10d-22da381b111 71->79 72->72 77 22da381afd7-22da381afe6 72->77 73->73 76 22da381ad49-22da381ad6e CryptDuplicateKey 73->76 80 22da381ad70-22da381ad76 GetLastError 76->80 81 22da381ad85-22da381ada7 CryptSetKeyParam 76->81 82 22da381afed 77->82 79->79 84 22da381b113-22da381b119 79->84 85 22da381ad7a-22da381ad7e 80->85 86 22da381adbe-22da381ade5 CryptGenRandom 81->86 87 22da381ada9-22da381adaf GetLastError 81->87 82->66 92 22da381b126-22da381b131 84->92 93 22da381b11b-22da381b120 CryptDestroyKey 84->93 85->85 94 22da381ad80 85->94 89 22da381adf7-22da381adfb 86->89 90 22da381ade7-22da381aded GetLastError 86->90 88 22da381adb3-22da381adb7 87->88 88->88 95 22da381adb9 88->95 89->89 97 22da381adfd-22da381ae1a CryptSetKeyParam 89->97 96 22da381adf1-22da381adf5 90->96 93->92 98 22da381afcf 94->98 95->98 96->89 96->96 99 22da381ae31-22da381ae35 97->99 100 22da381ae1c-22da381ae22 GetLastError 97->100 98->82 99->99 102 22da381ae37-22da381af35 htonl call 22da3837a78 call 22da3839698 CryptEncrypt 99->102 101 22da381ae26-22da381ae2a 100->101 101->101 103 22da381ae2c 101->103 108 22da381af37-22da381af3d GetLastError 102->108 109 22da381af49-22da381af4d 102->109 103->98 110 22da381af41-22da381af45 108->110 109->109 111 22da381af4f-22da381afc9 htonl call 22da3839698 * 2 109->111 110->110 112 22da381af47 110->112 111->73 111->98 112->111
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Cryptmemcpy_s$ErrorLast$htonl$Parammalloc$DestroyDuplicateEncryptRandom
              • String ID:
              • API String ID: 1759111721-0
              • Opcode ID: a75b7c051405bc9eb1c4e5d7ea12c36d8c149e7536beefc64b17913c920497d5
              • Instruction ID: 58cb89d076fe17246c8dc804ce3237911e4f8a8e11a1348ff409d89bf85c2066
              • Opcode Fuzzy Hash: a75b7c051405bc9eb1c4e5d7ea12c36d8c149e7536beefc64b17913c920497d5
              • Instruction Fuzzy Hash: 39D1EE76305B8597EBA0CB7AE454B9A77A6F7C8B84F104025DA8D87BA4EF3DC445CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 159 22da381b564-22da381b5a1 160 22da381b5aa-22da381b5b3 159->160 161 22da381b5bf-22da381b5c7 160->161 162 22da381b5b5-22da381b5bd 160->162 164 22da381b866-22da381b86b 161->164 162->161 163 22da381b5cc-22da381b61b CryptDecodeObjectEx 162->163 165 22da381b61d-22da381b623 GetLastError 163->165 166 22da381b632-22da381b636 163->166 167 22da381b86d-22da381b873 164->167 168 22da381b87f-22da381b885 164->168 169 22da381b627-22da381b62b 165->169 166->166 171 22da381b638-22da381b65c CryptAcquireContextW 166->171 167->168 170 22da381b875-22da381b87a call 22da3837a38 167->170 172 22da381b892-22da381b898 168->172 173 22da381b887-22da381b88c LocalFree 168->173 169->169 176 22da381b62d 169->176 170->168 178 22da381b65e-22da381b662 171->178 179 22da381b6a9-22da381b6ad 171->179 174 22da381b8a5-22da381b8ab 172->174 175 22da381b89a-22da381b89f CryptDestroyKey 172->175 173->172 180 22da381b8ad-22da381b8b4 CryptReleaseContext 174->180 181 22da381b8ba-22da381b8c5 174->181 175->174 176->164 178->178 183 22da381b664-22da381b688 CryptAcquireContextW 178->183 179->179 182 22da381b6af-22da381b6cb CryptImportPublicKeyInfo 179->182 180->181 186 22da381b6cd-22da381b6d3 GetLastError 182->186 187 22da381b6e2-22da381b718 CryptEncrypt 182->187 184 22da381b6a1-22da381b6a5 183->184 185 22da381b68a-22da381b690 GetLastError 183->185 184->184 189 22da381b6a7 184->189 188 22da381b694-22da381b698 185->188 190 22da381b6d7-22da381b6db 186->190 191 22da381b71e-22da381b722 187->191 188->188 192 22da381b69a 188->192 189->182 190->190 193 22da381b6dd 190->193 191->191 194 22da381b724-22da381b73f call 22da383828c 191->194 192->164 193->164 197 22da381b74e-22da381b7a7 call 22da3839698 CryptEncrypt 194->197 198 22da381b741-22da381b749 194->198 201 22da381b7be-22da381b7c2 197->201 202 22da381b7a9-22da381b7af GetLastError 197->202 198->164 201->201 204 22da381b7c4-22da381b7cc 201->204 203 22da381b7b3-22da381b7b7 202->203 203->203 205 22da381b7b9 203->205 206 22da381b7d8-22da381b7e9 204->206 207 22da381b85c-22da381b860 205->207 208 22da381b83e-22da381b85a 206->208 209 22da381b7eb-22da381b83c 206->209 207->160 207->164 208->207 209->206
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$Context$AcquireErrorLast$DecodeDestroyFreeLocalObjectReleasefree
              • String ID: Microsoft Enhanced Cryptographic Provider v1.0
              • API String ID: 3855991727-1948191093
              • Opcode ID: 25341dd9ab4916a9fef7560b0812b7934bf005980a32c3f591df03194d9d2cfe
              • Instruction ID: 52e1cd6adf1282db1f75d91df53ee6123eecfedfb0b260547a3681b618cd671a
              • Opcode Fuzzy Hash: 25341dd9ab4916a9fef7560b0812b7934bf005980a32c3f591df03194d9d2cfe
              • Instruction Fuzzy Hash: 0DA1EC36218B819BE7A1CFB5E458B5AB7A2F799784F104025EA8D87B98DF7DC444CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 211 22da3821aa4-22da3821b1d call 22da38390a0 call 22da38281f0 215 22da3821b22-22da3821b26 211->215 215->215 216 22da3821b28-22da3821b2d 215->216 217 22da3821b9f-22da3821ba7 216->217 218 22da3821b2f-22da3821b67 recv 216->218 221 22da3821bb4-22da3821bb8 217->221 222 22da3821ba9-22da3821bad 217->222 219 22da3821b79-22da3821b91 218->219 220 22da3821b69-22da3821b74 SetLastError 218->220 224 22da3821b93 219->224 225 22da3821b95-22da3821b9d 219->225 223 22da3821edb-22da3821ee1 GetLastError 220->223 221->221 227 22da3821bba-22da3821bca 221->227 222->222 226 22da3821baf 222->226 228 22da3821ee5-22da3821ee9 223->228 224->216 225->216 226->223 229 22da3821bd0-22da3821bdd 227->229 230 22da3821cac-22da3821cb0 227->230 228->228 232 22da3821eeb-22da3821ef1 228->232 233 22da3821be1-22da3821be5 229->233 230->230 231 22da3821cb2-22da3821cf5 call 22da3837b40 call 22da3819f9c htonl 230->231 256 22da3821cf9-22da3821cfd 231->256 234 22da3821ef3-22da3821efd call 22da3837a38 232->234 235 22da3821f06-22da3821f0b 232->235 233->233 236 22da3821be7-22da3821bf0 233->236 234->235 241 22da3821f0d-22da3821f13 235->241 242 22da3821f28-22da3821f34 call 22da3828220 235->242 240 22da3821bf4-22da3821bf9 236->240 245 22da3821bff-22da3821c0a 240->245 246 22da3821c84-22da3821c89 240->246 241->242 247 22da3821f15-22da3821f1f call 22da3837a38 241->247 253 22da3821f39-22da3821f3d 242->253 250 22da3821c0c-22da3821c18 245->250 251 22da3821c1a-22da3821c1f 245->251 254 22da3821c90-22da3821ca7 SetLastError 246->254 255 22da3821c8b 246->255 247->242 257 22da3821c27-22da3821c51 recv 250->257 251->257 253->253 259 22da3821f3f-22da3821f4b 253->259 254->223 255->223 256->256 260 22da3821cff-22da3821d07 256->260 261 22da3821c6f-22da3821c7f 257->261 262 22da3821c53-22da3821c5e GetLastError 257->262 263 22da3821d0b-22da3821d0f 260->263 261->240 264 22da3821c60 262->264 265 22da3821c62-22da3821c6d SetLastError 262->265 263->263 266 22da3821d11-22da3821d2f call 22da3837a78 263->266 264->240 265->246 269 22da3821d31-22da3821d35 266->269 270 22da3821d47-22da3821d4b 266->270 269->269 271 22da3821d37-22da3821d42 SetLastError 269->271 270->270 272 22da3821d4d-22da3821d73 call 22da3839698 270->272 271->223 275 22da3821d7b-22da3821d80 272->275 276 22da3821d82-22da3821dbd recv 275->276 277 22da3821df7-22da3821dfc 275->277 278 22da3821dbf-22da3821dca GetLastError 276->278 279 22da3821de5-22da3821df5 276->279 280 22da3821dfe-22da3821e02 277->280 281 22da3821e09-22da3821e15 call 22da3819fc4 277->281 282 22da3821dce-22da3821dd3 278->282 283 22da3821dcc 278->283 279->275 280->280 284 22da3821e04 280->284 289 22da3821e3e-22da3821e42 281->289 290 22da3821e17-22da3821e3c call 22da38393f0 281->290 286 22da3821de0 282->286 287 22da3821dd5-22da3821dda SetLastError 282->287 283->275 284->223 286->223 287->286 289->289 291 22da3821e44-22da3821e6b call 22da381a904 SetLastError 289->291 290->289 295 22da3821e6d-22da3821e71 290->295 291->223 295->295 297 22da3821e73-22da3821e97 call 22da381bb64 295->297 300 22da3821ed5-22da3821ed9 297->300 301 22da3821e99-22da3821e9d 297->301 300->223 300->300 301->301 302 22da3821e9f-22da3821ed3 call 22da381b8c8 SetLastError 301->302 302->223
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$freerecv$ObjectSingleWait
              • String ID:
              • API String ID: 3522290020-0
              • Opcode ID: acf328f902c2231a029c33d227560589bb3e942cb677ce90cad7a3e78b4fb588
              • Instruction ID: ff2de2011eb8cd9f3107703b6febb1d3e10e8a8fe51a51a96fe17c5b3e1b4127
              • Opcode Fuzzy Hash: acf328f902c2231a029c33d227560589bb3e942cb677ce90cad7a3e78b4fb588
              • Instruction Fuzzy Hash: 91D1333621868197EBF0DBF5E458B5AB7E2F788744F600125EA9D8BB94EB7CC444CB01

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 362 22da381b138-22da381b15b call 22da38166ac 365 22da381b160-22da381b170 362->365 366 22da381b17f-22da381b1ad call 22da383828c 365->366 367 22da381b172-22da381b17a call 22da381b4a4 365->367 371 22da381b1af-22da381b1b3 366->371 372 22da381b1c2-22da381b1de 366->372 367->366 371->371 373 22da381b1b5-22da381b1bd 371->373 374 22da381b1ea-22da381b1f3 372->374 375 22da381b469-22da381b49b call 22da3817548 373->375 376 22da381b1f9-22da381b256 CryptAcquireContextW 374->376 377 22da381b28b-22da381b290 374->377 378 22da381b258-22da381b25e GetLastError 376->378 379 22da381b26a-22da381b27b 376->379 381 22da381b292 377->381 382 22da381b297-22da381b2e5 CryptGenRandom 377->382 383 22da381b262-22da381b266 378->383 385 22da381b27e-22da381b282 379->385 381->375 386 22da381b2e7-22da381b2ed GetLastError 382->386 387 22da381b2fc-22da381b337 CryptImportKey 382->387 383->383 391 22da381b268-22da381b286 383->391 385->385 392 22da381b284 385->392 388 22da381b2f1-22da381b2f5 386->388 389 22da381b34e-22da381b3ec call 22da3817324 call 22da381b564 call 22da3816ac4 387->389 390 22da381b339-22da381b33f GetLastError 387->390 388->388 393 22da381b2f7 388->393 404 22da381b3ee-22da381b3f4 389->404 405 22da381b41b-22da381b44e call 22da3816e14 389->405 394 22da381b343-22da381b347 390->394 391->374 392->377 393->375 394->394 397 22da381b349 394->397 397->375 404->405 407 22da381b3f6-22da381b419 call 22da3816e14 call 22da3837a38 404->407 408 22da381b453-22da381b463 405->408 407->408 408->365 408->375
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$ErrorLast$Contextfree$DestroyFreeRelease$AcquireHeapImportLocalRandom_errnocallochtonl
              • String ID:
              • API String ID: 475133736-0
              • Opcode ID: 67210c864a26012c287a4a9d3c8f6c7ae83e5f63248235b38604e0fb7900b0bc
              • Instruction ID: 528040cb19447b7b581b325c80e4b3ed2bab32614ac438ae2bcfa035c5a0962c
              • Opcode Fuzzy Hash: 67210c864a26012c287a4a9d3c8f6c7ae83e5f63248235b38604e0fb7900b0bc
              • Instruction Fuzzy Hash: A9912272218B8497D7D0CF65E48875EB7A1F7C5B84F505026EA8E8BBA8DF79C444CB40

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 493 22da381b69f 494 22da381b6a7 493->494 495 22da381b6af-22da381b6cb CryptImportPublicKeyInfo 494->495 496 22da381b6cd-22da381b6d3 GetLastError 495->496 497 22da381b6e2-22da381b718 CryptEncrypt 495->497 498 22da381b6d7-22da381b6db 496->498 499 22da381b71e-22da381b722 497->499 498->498 500 22da381b6dd 498->500 499->499 501 22da381b724-22da381b73f call 22da383828c 499->501 502 22da381b866-22da381b86b 500->502 508 22da381b74e-22da381b7a7 call 22da3839698 CryptEncrypt 501->508 509 22da381b741-22da381b749 501->509 504 22da381b86d-22da381b873 502->504 505 22da381b87f-22da381b885 502->505 504->505 507 22da381b875-22da381b87a call 22da3837a38 504->507 510 22da381b892-22da381b898 505->510 511 22da381b887-22da381b88c LocalFree 505->511 507->505 519 22da381b7be-22da381b7c2 508->519 520 22da381b7a9-22da381b7af GetLastError 508->520 509->502 512 22da381b8a5-22da381b8ab 510->512 513 22da381b89a-22da381b89f CryptDestroyKey 510->513 511->510 517 22da381b8ad-22da381b8b4 CryptReleaseContext 512->517 518 22da381b8ba-22da381b8c5 512->518 513->512 517->518 519->519 522 22da381b7c4-22da381b7cc 519->522 521 22da381b7b3-22da381b7b7 520->521 521->521 523 22da381b7b9 521->523 524 22da381b7d8-22da381b7e9 522->524 525 22da381b85c-22da381b860 523->525 526 22da381b83e-22da381b85a 524->526 527 22da381b7eb-22da381b83c 524->527 525->502 529 22da381b5aa-22da381b5b3 525->529 526->525 527->524 530 22da381b5bf-22da381b5c7 529->530 531 22da381b5b5-22da381b5bd 529->531 530->502 531->530 532 22da381b5cc-22da381b61b CryptDecodeObjectEx 531->532 533 22da381b61d-22da381b623 GetLastError 532->533 534 22da381b632-22da381b636 532->534 535 22da381b627-22da381b62b 533->535 534->534 536 22da381b638-22da381b65c CryptAcquireContextW 534->536 535->535 537 22da381b62d 535->537 538 22da381b65e-22da381b662 536->538 539 22da381b6a9-22da381b6ad 536->539 537->502 538->538 540 22da381b664-22da381b688 CryptAcquireContextW 538->540 539->495 539->539 541 22da381b6a1-22da381b6a5 540->541 542 22da381b68a-22da381b690 GetLastError 540->542 541->494 541->541 543 22da381b694-22da381b698 542->543 543->543 544 22da381b69a 543->544 544->502
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$ContextDestroyEncryptErrorFreeImportInfoLastLocalPublicReleasecallocfree
              • String ID:
              • API String ID: 738811349-0
              • Opcode ID: e652d24782238043bbe866c50f51af785cf56a49aa1208cf5e8511848bee3867
              • Instruction ID: e18ea67df8d48e191dd0ab2c29e8f8077bf1bbca085f124fd376104fc7f7f250
              • Opcode Fuzzy Hash: e652d24782238043bbe866c50f51af785cf56a49aa1208cf5e8511848bee3867
              • Instruction Fuzzy Hash: E511E131114A8093FBA1DFB6E44CB6AA3A3F7D4B84F140015E68D8A9E4DFBDD884CB01
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: FrameHandler2LibraryLoad
              • String ID:
              • API String ID: 2889079456-0
              • Opcode ID: 6263d641ec332dac5ed4f08b61926634c6d686e0cac3bee97d0370188f5a9ba6
              • Instruction ID: 22b3e5ed5ad8ef0b318df876027188c1fde3e31564a9dc64010260ef454559d6
              • Opcode Fuzzy Hash: 6263d641ec332dac5ed4f08b61926634c6d686e0cac3bee97d0370188f5a9ba6
              • Instruction Fuzzy Hash: DE126976701B40EBEB94CFA8D554BAD73E6FB05B88F104129DE4D6BB98DA38D825C700
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0488918e477ea9ec4ac75411c96640c13bad580037342a82218a97c9fccc6dbf
              • Instruction ID: 80084a039045b846408e988c147485502471a12251a070a633af0842013cad4d
              • Opcode Fuzzy Hash: 0488918e477ea9ec4ac75411c96640c13bad580037342a82218a97c9fccc6dbf
              • Instruction Fuzzy Hash: A0F07FB6918B84CAC650DF59F48054ABBA4F399790F104216FBC883B28DB38C1608F40
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cc97c1b0fb8047c19bd44717af16640348f0f9ccd159b667f01d249c86242596
              • Instruction ID: f661125855e145eb190ec58edf8b536c99c7eeacea23703f897084735e379cc5
              • Opcode Fuzzy Hash: cc97c1b0fb8047c19bd44717af16640348f0f9ccd159b667f01d249c86242596
              • Instruction Fuzzy Hash: D9E0487A908B8486C650DB59F48054ABBA4F39A7A4F60451AEBCC43B29DB78C264CF40

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$AddressAllocErrorHandleHeapLastModuleProc_callnewhfreemalloc
              • String ID: FreeMibTable$GetIpForwardTable2$Iphlpapi.dll
              • API String ID: 2660982488-3103947123
              • Opcode ID: f2a5fece0d8b451c81201d33b0cbf850d43ab4d2e023ba59bb4abebf69cc3bb0
              • Instruction ID: fe35459ad0c8cdce4325ae63f3518dce190974d2d06e2196a0df04c5545be6eb
              • Opcode Fuzzy Hash: f2a5fece0d8b451c81201d33b0cbf850d43ab4d2e023ba59bb4abebf69cc3bb0
              • Instruction Fuzzy Hash: 6CB16D72A05B809AE710CFA0E88479E77F4F388798F504229DB9D67B58DF78C546CB40

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: malloc$AdaptersAddressAddressesHandleModuleProc
              • String ID: GetAdaptersAddresses$iphlpapi
              • API String ID: 4282841641-4067604246
              • Opcode ID: 8f434f50ffee5d0e5a9aa5839f26dcac3c0680ab3b8d4468273f56d4ab3e5913
              • Instruction ID: 9c4637a032892560d4a35670b0f751be5e08cbf9404c69fa23b330c4c3fdb946
              • Opcode Fuzzy Hash: 8f434f50ffee5d0e5a9aa5839f26dcac3c0680ab3b8d4468273f56d4ab3e5913
              • Instruction Fuzzy Hash: AF71AD76A05B94E3EB648B92E408FAE3370F789B94F404416CE4A67B54EFB8C546CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 354 22da36700d6-22da367013c LoadLibraryA WSASocketA 356 22da367013e-22da3670152 connect 354->356 357 22da3670154-22da3670157 356->357 358 22da3670160-22da367019d recv VirtualAlloc 356->358 357->356 359 22da3670159 357->359 360 22da367019f-22da36701bc recv 358->360 359->358 360->360 361 22da36701be 360->361
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274357378.0000022DA3670000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA3670000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3670000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: recv$AllocLibraryLoadSocketVirtualconnect
              • String ID: ws2_
              • API String ID: 2782296289-2545912100
              • Opcode ID: 1eff5d08a82a5ca81e1e332a23f882c81ad6b54b5f6841b1c7ae4de356901e35
              • Instruction ID: 98cccc46596f7d1244ca9acfd96f4fc6a3b9a0a3bf9babb84674ade29852f59e
              • Opcode Fuzzy Hash: 1eff5d08a82a5ca81e1e332a23f882c81ad6b54b5f6841b1c7ae4de356901e35
              • Instruction Fuzzy Hash: 2921FF3175CD5C0BE21C71AC380F63676C6C799766B25816FE94EC72DAEC908C82018A

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
              • String ID:
              • API String ID: 1133592946-0
              • Opcode ID: a77b8d06c39953ec2f905393d1e87070c28b5c3a114c2bc481b25ed10bb50813
              • Instruction ID: 66cc5c28319e02d6335487ee8171a30a3a767e2b459f660ba93b66ef6107079a
              • Opcode Fuzzy Hash: a77b8d06c39953ec2f905393d1e87070c28b5c3a114c2bc481b25ed10bb50813
              • Instruction Fuzzy Hash: 9C313FABA1C10383FE50AB61B4557B91352AF84784F444439E60DC72D7EE7FE864860B

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CurrentErrorLastOpenProcessThreadTokenfree$AccountLookup_snprintf
              • String ID: %s\%s
              • API String ID: 240425499-4073750446
              • Opcode ID: 3bde376433857be3971c65d39a71eaedc432fe96cc2290403f52ff7102b1fa64
              • Instruction ID: 28ead4df3f190f16eb8a77611607e35e4cc8139d0d647f8eec5779b1ffb78847
              • Opcode Fuzzy Hash: 3bde376433857be3971c65d39a71eaedc432fe96cc2290403f52ff7102b1fa64
              • Instruction Fuzzy Hash: 54314172658AC591FB30DBA5F458BDA63A1F785784F400022E78D53B89DF7CC156CB40

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Token$CurrentOpenProcessThread$ErrorInformationLast
              • String ID:
              • API String ID: 632756016-0
              • Opcode ID: 8228bee465ae78f6f26b624ec4de8fd4440b32671b84e53bdd42698b240db5fa
              • Instruction ID: f192cd7cc653f9f143d269695fb0f5f3034e49d6482f0ffc95658b7df42913bb
              • Opcode Fuzzy Hash: 8228bee465ae78f6f26b624ec4de8fd4440b32671b84e53bdd42698b240db5fa
              • Instruction Fuzzy Hash: DA017531F08B8192EB408FD1F848B5AA3A0F785BD4F444066EE4963B65DFB8C4499B40

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Thread$CurrentDescriptionExceptionGuaranteeHandlerStackVectored
              • String ID: main
              • API String ID: 3663057573-3207122276
              • Opcode ID: 386aaddc8df7cbd856297037b5197bfc094bcec0330ccf33105a57b1275b4e8c
              • Instruction ID: 7a361f07cf23b94364c58fa045a923ce231f53fb322e3727570c8e30b0e62f42
              • Opcode Fuzzy Hash: 386aaddc8df7cbd856297037b5197bfc094bcec0330ccf33105a57b1275b4e8c
              • Instruction Fuzzy Hash: 8D816C6BA04B4586EF40CF15E8903A937A0FB48B98F148235DE0D877A4DF7ED5A98345

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID:
              • API String ID: 2803490479-0
              • Opcode ID: 9501c7bca73ed4046e31c18e84c64c0496150e5e6f9b36b3e1cf3515f7a5841b
              • Instruction ID: 30c93315d34d92dab3cfeb193dcb1f9c29251bc6457151d3c4c5a29f7123414e
              • Opcode Fuzzy Hash: 9501c7bca73ed4046e31c18e84c64c0496150e5e6f9b36b3e1cf3515f7a5841b
              • Instruction Fuzzy Hash: BA31EC32228B8496DBD0DFA5E488B1EB3A1F7C8B94F505515FA9E87B98CF78C154CB01

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AllocCreateObjectSingleThreadVirtualWait
              • String ID:
              • API String ID: 2947710671-0
              • Opcode ID: 21ece5bcbeed1b0d8a3d4cb93d0680a2f42f75bb03d1a6cd45e6baa7692b501c
              • Instruction ID: f458c70cc2e9c63e4e7b156e74de9b901069f598cec3493c3a5f006243cee5e0
              • Opcode Fuzzy Hash: 21ece5bcbeed1b0d8a3d4cb93d0680a2f42f75bb03d1a6cd45e6baa7692b501c
              • Instruction Fuzzy Hash: 99411976608B8282EB70CB50F4547AA73A4F785384F104136D68D87BA9DFBFC168CB45
              APIs
                • Part of subcall function 0000022DA38281F0: WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818FD8), ref: 0000022DA382820E
              • select.WS2_32 ref: 0000022DA3821A74
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ObjectSingleWaitselect
              • String ID: @
              • API String ID: 3730138947-2766056989
              • Opcode ID: 1c91baf0b57b28275dfa1c99b752d6f5bb87ae8bfb29e6ba5fe54b5b19bc8fad
              • Instruction ID: d3ddcb815e8ef3b50714b43c3f3e6f8283fb4dfe4f2afac0a1e587de048e808f
              • Opcode Fuzzy Hash: 1c91baf0b57b28275dfa1c99b752d6f5bb87ae8bfb29e6ba5fe54b5b19bc8fad
              • Instruction Fuzzy Hash: 8831DC76228680C7DB90DFA9E094B1AB7B1F3C8754F605116FA9A87B58DB79C440CF01
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastObjectSingleWaitsend
              • String ID:
              • API String ID: 2747804604-0
              • Opcode ID: 5e4c5a4aff60329793ad59ddffe2b076d7279dbeb181af91e4248e6049880ce3
              • Instruction ID: 8be1ba9bae4b0d522a2378eed7ddb3850373ac2295345d822f7ae7a32f00e343
              • Opcode Fuzzy Hash: 5e4c5a4aff60329793ad59ddffe2b076d7279dbeb181af91e4248e6049880ce3
              • Instruction Fuzzy Hash: 5421BA722086419BD7E0DFA9F55871AB7E1F78CB88F004225EA9D87B58DB38C940CF05
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: c6df24463a63d4a5d8d3adb4db90d2668296821455cb5ee62475043f914862e2
              • Instruction ID: baaab75eb47c7f6cda28840adde959eb2f1c281fc940b523f78b8f39685ee691
              • Opcode Fuzzy Hash: c6df24463a63d4a5d8d3adb4db90d2668296821455cb5ee62475043f914862e2
              • Instruction Fuzzy Hash: 6811C632314B5097EBA48BB1E00876AA7A2FBC9B90F284525DF494B7D8CF3DC905C780
              APIs
              • malloc.LIBCMT ref: 0000022DA3828165
                • Part of subcall function 0000022DA3837A78: _FF_MSGBANNER.LIBCMT ref: 0000022DA3837AA8
                • Part of subcall function 0000022DA3837A78: _NMSG_WRITE.LIBCMT ref: 0000022DA3837AB2
                • Part of subcall function 0000022DA3837A78: HeapAlloc.KERNEL32(?,?,00000000,0000022DA3840CB0,?,?,?,0000022DA3840F14,?,?,?,0000022DA3840E13), ref: 0000022DA3837ACD
                • Part of subcall function 0000022DA3837A78: _callnewh.LIBCMT ref: 0000022DA3837AE6
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AF1
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AFC
              • CreateMutexExW.KERNEL32 ref: 0000022DA3828190
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$AllocCreateHeapMutex_callnewhmalloc
              • String ID:
              • API String ID: 845756553-0
              • Opcode ID: 862c486525186581acc9f00f5c330525613c010192bdae0743fc55d89bfa3908
              • Instruction ID: a6ec61e6f388cda8450933b81accccea87da0f4b7810e08f6a9742c95acaea24
              • Opcode Fuzzy Hash: 862c486525186581acc9f00f5c330525613c010192bdae0743fc55d89bfa3908
              • Instruction Fuzzy Hash: 71E04836714A9083E7B4EB75E41971E6362F7C8748F508125AACD46BA5CF3DC2158F04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandlefree
              • String ID:
              • API String ID: 3486141430-0
              • Opcode ID: da68d6a98acd5116d1b07bc87d55e8f4fb6029d08c1973d89e173bb50fa9fb78
              • Instruction ID: 0bea70a9763f6c0fcc298a11e3c6a46a90273132c3a3bcde685a2bd0dd6ebb45
              • Opcode Fuzzy Hash: da68d6a98acd5116d1b07bc87d55e8f4fb6029d08c1973d89e173bb50fa9fb78
              • Instruction Fuzzy Hash: 68E01235A34A80D3EF80ABB1D488B196361F3D8740F905011F95B46794CE2DC4558B01
              APIs
                • Part of subcall function 0000022DA3828220: ReleaseMutex.KERNEL32 ref: 0000022DA3828239
              • CloseHandle.KERNEL32 ref: 0000022DA38281D3
              • free.LIBCMT ref: 0000022DA38281DE
                • Part of subcall function 0000022DA3837A38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA383C20A,?,?,?,0000022DA383C187,?,?,00000000,0000022DA3838A19), ref: 0000022DA3837A4E
                • Part of subcall function 0000022DA3837A38: _errno.LIBCMT ref: 0000022DA3837A58
                • Part of subcall function 0000022DA3837A38: GetLastError.KERNEL32(?,?,00000000,0000022DA383C20A,?,?,?,0000022DA383C187,?,?,00000000,0000022DA3838A19), ref: 0000022DA3837A60
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseErrorFreeHandleHeapLastMutexRelease_errnofree
              • String ID:
              • API String ID: 1340716177-0
              • Opcode ID: 4d84ca56601c928dea9da9dbfe6c40fb991b567295e3ac2ffd462ae2c5df7fc7
              • Instruction ID: dbe4d154a34e4117c0b0c23621732efca45a9fc8f7793d3e0f9ec6b64f1a4f77
              • Opcode Fuzzy Hash: 4d84ca56601c928dea9da9dbfe6c40fb991b567295e3ac2ffd462ae2c5df7fc7
              • Instruction Fuzzy Hash: 3FE01272A34A4093DE84ABB1E489B196361F7C4B40F401012FA5A467A9CF3CC444CB01
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ResumeThread
              • String ID:
              • API String ID: 947044025-0
              • Opcode ID: 2f43028d8f07e5831b27e4063968a2b8956efc5f49df95266945ef244a950e27
              • Instruction ID: ab0c7c4e2b07044046fd8ba6c4a7b12d8ef927f2029dc9dfb1b46b59a738dfc3
              • Opcode Fuzzy Hash: 2f43028d8f07e5831b27e4063968a2b8956efc5f49df95266945ef244a950e27
              • Instruction Fuzzy Hash: 23E05B71B25649E7EFD06BF1D84CF1A7291F398785F504420D967CE750DB78C4945701
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$malloc$AddressCloseCreateHandlePipeProccallocmbstowcs$LibraryLoadOpenProcess_snprintf
              • String ID: %s\%s$CreateEnvironmentBlock$CreateProcessWithTokenW$DestroyEnvironmentBlock$InitializeProcThreadAttributeList$UpdateProcThreadAttribute$WTSQueryUserToken$[execute] InitializeProcThreadAttributeList: [%d]$[execute] UpdateProcThreadAttribute: [%d]$advapi32.dll$kernel32.dll$process$userenv.dll$wtsapi32.dll
              • API String ID: 107160605-350882186
              • Opcode ID: 2423f97204b0a057e8ebd9fd0630213cdab127cd23a79d053cc51357715b5dc7
              • Instruction ID: c479dfcba3053c9a0beaae91f0f87eaf8d97344a8fd374761192509990630c5b
              • Opcode Fuzzy Hash: 2423f97204b0a057e8ebd9fd0630213cdab127cd23a79d053cc51357715b5dc7
              • Instruction Fuzzy Hash: 27627E32A04B40AAEB54DFE1E848B9D37B0FB88B84F544126DE4DA7B59EFB8C544C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
              • String ID: SeAssignPrimaryTokenPrivilege$SeAuditPrivilege$SeBackupPrivilege$SeChangeNotifyPrivilege$SeCreateGlobalPrivilege$SeCreatePagefilePrivilege$SeCreatePermanentPrivilege$SeCreateSymbolicLinkPrivilege$SeCreateTokenPrivilege$SeDebugPrivilege$SeDelegateSessionUserImpersonatePrivilege$SeEnableDelegationPrivilege$SeImpersonatePrivilege$SeIncreaseBasePriorityPrivilege$SeIncreaseQuotaPrivilege$SeIncreaseWorkingSetPrivilege$SeLoadDriverPrivilege$SeLockMemoryPrivilege$SeMachineAccountPrivilege$SeManageVolumePrivilege$SeProfileSingleProcessPrivilege$SeRelabelPrivilege$SeRemoteShutdownPrivilege$SeRestorePrivilege$SeSecurityPrivilege$SeShutdownPrivilege$SeSyncAgentPrivilege$SeSystemEnvironmentPrivilege$SeSystemProfilePrivilege$SeSystemtimePrivilege$SeTakeOwnershipPrivilege$SeTcbPrivilege$SeTimeZonePrivilege$SeTrustedCredManAccessPrivilege$SeUndockPrivilege$SeUnsolicitedInputPrivilege
              • API String ID: 1944759421-3792899055
              • Opcode ID: 81d48b748c43de0ce4928f702a8a3c66826006e640bdb1b8977eb50856ceff39
              • Instruction ID: b5b407e3bee6fedcf9df5427150408df90fc8a8240bfb8a21b69b3d23771bf46
              • Opcode Fuzzy Hash: 81d48b748c43de0ce4928f702a8a3c66826006e640bdb1b8977eb50856ceff39
              • Instruction Fuzzy Hash: 2081B836A05F40E9EB118FA1F8886CA77F8F758754F501266EA8D63B24EF78C159C780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$CloseHandle$FreeLibraryResumeSleepThreadmalloc
              • String ID: @$NtQueueApcThread$ntdll
              • API String ID: 4258157543-2122203831
              • Opcode ID: d0e4bf74456b638bac0fc8aab38f9c685da134fe5546be86c485a251389b3401
              • Instruction ID: eac71dc28979c952f467978ec08d7dee570d99be88afe3e42a10862d23dd69aa
              • Opcode Fuzzy Hash: d0e4bf74456b638bac0fc8aab38f9c685da134fe5546be86c485a251389b3401
              • Instruction Fuzzy Hash: 0E123131218B8197E7E0DBB1E459B5AA3F6F794B84F504025EA8A8BBD8DF7DC444DB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastLibrary$AddressFreeLoadProcVersion
              • String ID: /t:0x%08X$SeDebugPrivilege
              • API String ID: 3600083760-2625622331
              • Opcode ID: ee07a1d482c46e70874c924a90dca33d871a91d2ed96c87a41cfbd526d001c3b
              • Instruction ID: 5e5d7b33c42d24c1da75e674dafd12bd3142d24f56d7cc15acc27d3b312914ab
              • Opcode Fuzzy Hash: ee07a1d482c46e70874c924a90dca33d871a91d2ed96c87a41cfbd526d001c3b
              • Instruction Fuzzy Hash: 3BD16232B01B40A6FF65AFA6E848B9D73E4F788B94F054129DE4A63B94DFB8C545C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$Resource$CloseEventHandleProcess_snwprintf_s$CreateMemoryObjectSingleVirtualWait$AllocFindFreeLoadLockReadSizeofWritecalloc
              • String ID: %02x$0$0$:::$DLL
              • API String ID: 619872185-897774778
              • Opcode ID: 33c5ec8edd936e19ef5c2e72961b2efc061b80c06f3e00a0822ef222e956fdf3
              • Instruction ID: 7cec51a79f23a3309ff3c4a09f5d4a734d80e6bae412f31043e56b9501030ec7
              • Opcode Fuzzy Hash: 33c5ec8edd936e19ef5c2e72961b2efc061b80c06f3e00a0822ef222e956fdf3
              • Instruction Fuzzy Hash: FED19135B04B80A6EF64DB92A45CB9A73B2F789BC4F454025DE4A63798EFB9C905C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$AttributesDirectoryFileRemovelstrcmpi
              • String ID: %s*.*$%s\%s$%s\*.*$\$\*.*
              • API String ID: 626095338-4183413870
              • Opcode ID: 476cbb9af391550a1492c0a7d6f80df1375e92404970ab48f4b9688533e02d8b
              • Instruction ID: ef2452b8526f6488b9f51acf4cbbba45e67ca53c836adbef3fba18b4cbd8b59b
              • Opcode Fuzzy Hash: 476cbb9af391550a1492c0a7d6f80df1375e92404970ab48f4b9688533e02d8b
              • Instruction Fuzzy Hash: 84718F31A04941A6FF649FA4E88CBE923B1FBA0794F841122C55AB25E4EFBCC559C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandleProcess$OpenToken$AdjustCurrentErrorLastLookupPrivilegePrivilegesValuefree
              • String ID: @$SeDebugPrivilege
              • API String ID: 1310624317-3223528420
              • Opcode ID: b9bfb66e13597722efd53f610cecb8fb5c2cbbf8338c398701cb5df2b7c2b290
              • Instruction ID: 3b4024729fba08a6f0d24e93f4c17925864e603e464d1cf79a2020497dcf9611
              • Opcode Fuzzy Hash: b9bfb66e13597722efd53f610cecb8fb5c2cbbf8338c398701cb5df2b7c2b290
              • Instruction Fuzzy Hash: F822B976208B8197E7A0CB65F458B5BB7E2F799784F104125EA898BB98DF7DC444CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: State$FormatProcessTimeWindow_snwprintf$AsyncChildCloseDateEnumForegroundHandleKeyboardOpenSystemThreadWindows
              • String ID: **-[ %s | PID: %d-[ @ %s %s UTC**$%ls$<%ls>$<^%ls>$Logging started
              • API String ID: 3707447748-1085417204
              • Opcode ID: f0ad641e1f6927298aa9a305a1c88056d766f274f7cc3736b189703827e4e608
              • Instruction ID: 62c6d06dae884566d5a4aacaf5a3c74142ddc4a2e1d96a7384c2bd0ebb43b268
              • Opcode Fuzzy Hash: f0ad641e1f6927298aa9a305a1c88056d766f274f7cc3736b189703827e4e608
              • Instruction Fuzzy Hash: 8DA1A872A08B85EAEB24CFA1E848BD973B1F785748F840026DA4D67768DFBCC559C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _snprintffreestrrchr$ErrorLast_errno_invalid_parameter_noinfo_output_s_lmalloc
              • String ID: %s\%s$%s\*
              • API String ID: 3538828039-2848263008
              • Opcode ID: 0e5e503c2ea9749f87f8fdec00abdffb142c5a5ece83d42b7bdf2d1f7d9663d5
              • Instruction ID: f396ebcc138751a1fdd63aa6ea167997d96e19dd5e815c665a1ab6bc48a8b702
              • Opcode Fuzzy Hash: 0e5e503c2ea9749f87f8fdec00abdffb142c5a5ece83d42b7bdf2d1f7d9663d5
              • Instruction Fuzzy Hash: F951D835A05B81A2EE64EBD1B41CBED63A0B799BD0F444122DD4E63795EEFCC449C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: closesocketfreemalloc
              • String ID:
              • API String ID: 2077312491-0
              • Opcode ID: 809cf09e2446c247650c86a72c79830729f1cea75e56cb31d70f0c4aba1e60c0
              • Instruction ID: e8386d639e39578b24e914ab19e25abbfe17a8498d2dd6c550908dec9e548505
              • Opcode Fuzzy Hash: 809cf09e2446c247650c86a72c79830729f1cea75e56cb31d70f0c4aba1e60c0
              • Instruction Fuzzy Hash: 36D1A136A01B40EBE7608FA5E448BAD73F1F758B94F104625DE6AA3B94DFB8C5458340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressProc$CloseHandleLibraryProcessToken$AdjustCurrentFreeLoadLookupOpenPrivilegePrivilegesValuewcsstr
              • String ID: CreateToolhelp32Snapshot$Process32FirstW$Process32NextW$SeDebugPrivilege$csrss.exe$kernel32
              • API String ID: 3269807286-2225489067
              • Opcode ID: 7bd98f5533653f531789abed5f815f2b2efb55186dfd135e21faa7810a691a61
              • Instruction ID: 03b33db90ca7dc9717a6eb08513442b00916a47add8e84ea6971d31832237179
              • Opcode Fuzzy Hash: 7bd98f5533653f531789abed5f815f2b2efb55186dfd135e21faa7810a691a61
              • Instruction Fuzzy Hash: EC51C531A04B41A2EB54DF92F848B6A73B1F784BD4F045126EE5963B98EFBCC445CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressCreateErrorEventHandleHeapLastModuleProcProcess
              • String ID: @
              • API String ID: 892381570-2766056989
              • Opcode ID: e1bb820d47028cb2069285cca36470ddd52aa13666dea84c8504503cf2cf15d0
              • Instruction ID: c0e30922d6632abc4d6f4bfabf0426fb57ab49d84b8e550d578934afb198d02a
              • Opcode Fuzzy Hash: e1bb820d47028cb2069285cca36470ddd52aa13666dea84c8504503cf2cf15d0
              • Instruction Fuzzy Hash: F1B13F32208B8197E7A0CBB5F459B5AB7F2F785B54F204126DA998BBD8DF7DC4448B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Find$File$freeswprintf$CloseErrorFirstLastNextcalloc
              • String ID: $%s\%s$%s\*.*
              • API String ID: 4266919821-2005348348
              • Opcode ID: 0a78df3b767c29c7e3524daa176936a6d2187ee3665ed98b6b49c8e10ebeee12
              • Instruction ID: fc2421b59c9be22c2451a03009df02a049135270c40f1ab1535ec3fd0445b525
              • Opcode Fuzzy Hash: 0a78df3b767c29c7e3524daa176936a6d2187ee3665ed98b6b49c8e10ebeee12
              • Instruction Fuzzy Hash: AC51CD32A44940A3EB649B95E448BA973B0F785BA0F545312FA5A63BD4DFBCC847C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Process$Memory$ThreadWrite$AllocContextVirtual$AddressHandleModuleProcReadResumeTerminate
              • String ID: @$NtUnmapViewOfSection$ntdll.dll
              • API String ID: 2043341788-1860678162
              • Opcode ID: ee30b7e2ad91102ce3a034b6296141f3efa41f1d2416c5db9c120aceb0fdb7cd
              • Instruction ID: 3f4fbbbf4b0640e0ef8009641116b0d92ce07d183a7367e76b0761a5d34f4cac
              • Opcode Fuzzy Hash: ee30b7e2ad91102ce3a034b6296141f3efa41f1d2416c5db9c120aceb0fdb7cd
              • Instruction Fuzzy Hash: D8518972B00B8197EB608F96F848B5A73A1F744B88F444015EF8A67B44DFBCD589CB44
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$ErrorLasthtonl$Param$DecryptDestroyDuplicatecallocmallocmemcpy_smemmove_s
              • String ID:
              • API String ID: 4207261932-0
              • Opcode ID: b49ab75eeee5ddf2d1dbebc1cbc48ecfaaf27e66fff803f7412bdeede67d8ffd
              • Instruction ID: 50331bfb9b520b894cafd612242a029ebf853b4a98af95bb22b6f6aabec0a1c6
              • Opcode Fuzzy Hash: b49ab75eeee5ddf2d1dbebc1cbc48ecfaaf27e66fff803f7412bdeede67d8ffd
              • Instruction Fuzzy Hash: CDA1FF76218B8197EB94CFB9E458B1A77E2F7D4B94F104025EA8A87BA4DF7DC444CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CloseProcessStationWindow$CurrentDesktop
              • String ID:
              • API String ID: 1313067402-0
              • Opcode ID: 94c626cacce61fbefa3ba524021b30f028923df042d450152af6bf72d7319283
              • Instruction ID: 376db90c9221c59208154a6cad440d3aee9d48a2a1efcf901ad7406784ac9e34
              • Opcode Fuzzy Hash: 94c626cacce61fbefa3ba524021b30f028923df042d450152af6bf72d7319283
              • Instruction Fuzzy Hash: CF618336B08B50A3FB659FE2A84CB2A23A0FB49FD5F144466DD0B67754EFB8C8458340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$Process$AllocHandleMemoryVirtualWrite$AddressCloseModuleOpenProc
              • String ID: @$W
              • API String ID: 4162672949-2335994147
              • Opcode ID: eb42eeb7f27181eb62335ffe6cee90d7aaa8eab7cad7d62695e460be63da0ed9
              • Instruction ID: f0201ad6e9aca33be02d9eb7b41bf5b96fc8161ebc5fc4e6e243c004dec5253b
              • Opcode Fuzzy Hash: eb42eeb7f27181eb62335ffe6cee90d7aaa8eab7cad7d62695e460be63da0ed9
              • Instruction Fuzzy Hash: 37A1CB76208B8097E7B0DFB5E448B5BB7B2F785B94F104125EA898BB98DF7DC4448B40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Findfree$ErrorFileLastcallocswprintf$CloseFirstNext
              • String ID: %s\%s$%s\*.*
              • API String ID: 3821236099-1665845743
              • Opcode ID: ddb0a624768e1e93a5f2c1a77af9a665de3d0ca826a354a1b6442d02a6f135c4
              • Instruction ID: 28af273b1d89586ae336e932271f8cde8cb0932f72b832e10fb2252bf689317c
              • Opcode Fuzzy Hash: ddb0a624768e1e93a5f2c1a77af9a665de3d0ca826a354a1b6442d02a6f135c4
              • Instruction Fuzzy Hash: CB51CA31A08684A2FF589B95E449BAD73B0F7C4BA0F454315FAA9637E4EFB8C485C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CreateInitializeInstance
              • String ID: NullRenderer$SampleGrabber$WebCam$vids
              • API String ID: 3519745914-1378241838
              • Opcode ID: ffc55bd91af28c3805f18e3fc733ac83d97484a42aa0c638f63a7fcf4dabcaef
              • Instruction ID: 29a265bc3053a43df8be52424a49b0291718e2e518f5615ccc453d38963003dd
              • Opcode Fuzzy Hash: ffc55bd91af28c3805f18e3fc733ac83d97484a42aa0c638f63a7fcf4dabcaef
              • Instruction Fuzzy Hash: 1AE15136B04B46E6EB11CFAAE848B9937A1F788B88F404062DF4E53715DFB9D949C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$__tzset_get_daylight_getptd_noexit_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2665896524-0
              • Opcode ID: 2e55afbc7bd3160bb278a42108840857c901d28fc620b6d15b4d967b9e5f567d
              • Instruction ID: 41259c57131fa5e8679dd8e9f3ce79488bd2286b7dc1ffc4b51f270bd370ec59
              • Opcode Fuzzy Hash: 2e55afbc7bd3160bb278a42108840857c901d28fc620b6d15b4d967b9e5f567d
              • Instruction Fuzzy Hash: B5712673F10A1496FF14DFA0D85ABAC2364FB54798F128126EE1D6ABCAEB79C5018700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Crypt$ContextErrorLast$AcquireDestroyHashReleasefclose
              • String ID:
              • API String ID: 1196782254-0
              • Opcode ID: 79dbfd2cacfc3be1d1a50822a5081629bc9f583ac5fb191f04506a8164d47540
              • Instruction ID: cc13877477aecea65fcfdec362330e171eb103b7461875661055aa6cc4fbd5a9
              • Opcode Fuzzy Hash: 79dbfd2cacfc3be1d1a50822a5081629bc9f583ac5fb191f04506a8164d47540
              • Instruction Fuzzy Hash: E8519371B14B81A3EB608FE1E848F9A63B4F788BC4F505426EE4A63B58DFB8C545C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: closesocketfreemalloc
              • String ID:
              • API String ID: 2077312491-0
              • Opcode ID: 11e4d250dd96446c17937d603394033e7e42fd1fa2762c549830586213ab93c5
              • Instruction ID: 223899d619612499c2cb0aec8f02eda6c80a67adf6a0fcabd409a50261da89bd
              • Opcode Fuzzy Hash: 11e4d250dd96446c17937d603394033e7e42fd1fa2762c549830586213ab93c5
              • Instruction Fuzzy Hash: 97917C72A11B50A7EB548FA5E448B6E33F0FB89B90F148225CE4D63B50EF78C461D740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$Virtual$AllocFree$Version
              • String ID:
              • API String ID: 2722171286-0
              • Opcode ID: fba7c4e8b7438935fe2ab70c6a95f08f41d9c765d65b3dad16eb500d3a6ec083
              • Instruction ID: 1523a0c671b105d9941207911a65a779e7174d106fad86aeaf86d58aa05813ad
              • Opcode Fuzzy Hash: fba7c4e8b7438935fe2ab70c6a95f08f41d9c765d65b3dad16eb500d3a6ec083
              • Instruction Fuzzy Hash: EC611232214B4193E7A0DBB5F859B1B77B6F7D8B94F104125EA8A8BBA4DF3DC5448B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: State$AsyncKeyboardNameText_snwprintf
              • String ID: %ls$<%ls>$<^%ls>
              • API String ID: 819054474-3418244432
              • Opcode ID: 68046c5ed62edf608801fb83fb612df9adf8266851809a336e810ef7920cf2cc
              • Instruction ID: 7e639f722074e31f41d7804796b86c482659d78f77d746a6075e2d175340ce30
              • Opcode Fuzzy Hash: 68046c5ed62edf608801fb83fb612df9adf8266851809a336e810ef7920cf2cc
              • Instruction Fuzzy Hash: CE418832604B45E6E724CF91F848B9E73B5F789740F44012AEA8A63794DFBDC559C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: FileFind$CloseErrorLast$CreateFirstHandleNext_vswprintf_s_lswprintf
              • String ID: %s\*
              • API String ID: 1413818605-766152087
              • Opcode ID: ec091b89f20d6ef00adf1243fa1b33774a0f9f803ebf6865371f2ba8d57902af
              • Instruction ID: 1dc144a4f522a60fa854484caab8b1b0e8bce795cd4178f5b5a3b994bad0d32b
              • Opcode Fuzzy Hash: ec091b89f20d6ef00adf1243fa1b33774a0f9f803ebf6865371f2ba8d57902af
              • Instruction Fuzzy Hash: 3331B831A08680A6EB615B95F44CBBAB370F7D4790F844115FAD922A98DFFCC585C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Variant$ClearCreateErrorInitInitializeInstanceLastUninitializeWcsftime
              • String ID: FriendlyName
              • API String ID: 958359432-3623505368
              • Opcode ID: 9701de09f984ee2d88b9a3f1517e209769a395558a2260adc76cce08169f135d
              • Instruction ID: 9d13a5438aa4e277441f4d68eabd578e4fc0ffff5c262d960d0e2a3261018568
              • Opcode Fuzzy Hash: 9701de09f984ee2d88b9a3f1517e209769a395558a2260adc76cce08169f135d
              • Instruction Fuzzy Hash: D9517132704B86E6EB10CFA5E488B9E77B0F789B84F544022EA4E53B28DF78C549C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$NamedPipe$CreateProcess$AllocateCloseConnectCurrentHandleInitializeLookupOpenPrivilegeTokenValue
              • String ID: SeSecurityPrivilege
              • API String ID: 3545420818-2333288578
              • Opcode ID: 7363ed99cd7cb3f9d29511433e3f0182f62cbbc70dc7cbb54a35e6ec27a2a5fb
              • Instruction ID: 698aae1c8ed6b607500f745fa969999d3f5d769c8405e8e4c0ede1bca022a598
              • Opcode Fuzzy Hash: 7363ed99cd7cb3f9d29511433e3f0182f62cbbc70dc7cbb54a35e6ec27a2a5fb
              • Instruction Fuzzy Hash: 67416372108A8197E7A0DBB4E458B5AF7A1F385778F500325F6B94AED8EB7DC444CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$AllocBindingFreeHeap_snwprintf_sfreemalloc
              • String ID: \\localhost/pipe/%s/\%s\%s$\pipe\lsarpc$localhost
              • API String ID: 1077255598-28946181
              • Opcode ID: 474c08fd89dba0365cd44054de8b85c13f02dc56e94fa981ab054502f5ad2ab2
              • Instruction ID: 6592fcae6757bde2bb5ed076ad07daf39288569771b346815f7974597b12accf
              • Opcode Fuzzy Hash: 474c08fd89dba0365cd44054de8b85c13f02dc56e94fa981ab054502f5ad2ab2
              • Instruction Fuzzy Hash: 8031B931A08B40A2EE249B96A808B9B72A1F785BF0F564715FD79277E4DBB9C442C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentErrorExitHandleLastLookupOpenPrivilegePrivilegesValueWindows
              • String ID: SeShutdownPrivilege
              • API String ID: 3672536310-3733053543
              • Opcode ID: 88e43dece8113a7eceb5ca5ed84316068a2b8c1f6a48f99735b721d9d652b503
              • Instruction ID: fbe6bb7a9595f51962fa5f764894e90e940ece45d6b160407ef66e4e64020bec
              • Opcode Fuzzy Hash: 88e43dece8113a7eceb5ca5ed84316068a2b8c1f6a48f99735b721d9d652b503
              • Instruction Fuzzy Hash: C4316476A04B4193EB409FA2F848BAA67A0F789B90F144026DE4EA7754DFBCC445C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Binding$String$AuthComposeErrorFreeFromInfoText_snwprintf_s_vsnwprintf_s_l
              • String ID: \\%s$ncacn_np
              • API String ID: 1079777691-3858430495
              • Opcode ID: 12233bd968acef49d8d39bfe264e85cb5ae9e54bcf419a3b965369d3e67d44de
              • Instruction ID: 2539bab937c696c5bdb3cbd6eb9159607a6c40625312ca89e81c2be533d3b97c
              • Opcode Fuzzy Hash: 12233bd968acef49d8d39bfe264e85cb5ae9e54bcf419a3b965369d3e67d44de
              • Instruction Fuzzy Hash: 64214171608B81A2EB208F61F448B8AB774F784BA4F444315EAAD536E8DF78C505D740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Initialize$DescriptorSecurity$AllocAllocateLocal$DaclEntriesSacl
              • String ID:
              • API String ID: 1565010709-0
              • Opcode ID: 0f8951fb75e2927ed412854d149cbf449715b977967668bed34e192075ffaafd
              • Instruction ID: fac409c6a4bac6ccae19e2f2b791c3c378444c1dedfe686804897ecb1a0b4a12
              • Opcode Fuzzy Hash: 0f8951fb75e2927ed412854d149cbf449715b977967668bed34e192075ffaafd
              • Instruction Fuzzy Hash: 33711D322187C197F7A08B75E458B4BBAE1F795788F504025DA898BBD8EB7ED448CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$ManagerOpen
              • String ID:
              • API String ID: 239337868-0
              • Opcode ID: 0a7b65c65ec24dbd24546dae0cabbc8627d049e3d38ab237962e16c91f5eec01
              • Instruction ID: ef3cae94567864f513c867d53632ce036695c64ae3b24d8ab26bb4f1c3c491d7
              • Opcode Fuzzy Hash: 0a7b65c65ec24dbd24546dae0cabbc8627d049e3d38ab237962e16c91f5eec01
              • Instruction Fuzzy Hash: A8118234F15740A3FF589BE7A49CB6DA3A1BB9DBE0F040428DD0B63754EFA888494B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$ManagerOpen
              • String ID:
              • API String ID: 239337868-0
              • Opcode ID: a6668828978a52cb829c853aacaaccec968ee5e4bc683db3bd65410f4e1c187d
              • Instruction ID: d8e3f2fd82198f061e7591ccf9d81aa07bc990f32b084a108f35c83d4327b714
              • Opcode Fuzzy Hash: a6668828978a52cb829c853aacaaccec968ee5e4bc683db3bd65410f4e1c187d
              • Instruction Fuzzy Hash: 1B115234F06740A3EF599BE7A59CB6C93B1BB99BD0F040828ED0763754EFA888494700
              APIs
              • GetProcessHeap.KERNEL32 ref: 0000022DA383733C
                • Part of subcall function 0000022DA3837538: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837544
                • Part of subcall function 0000022DA3837538: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA38376CB
              • HeapAlloc.KERNEL32 ref: 0000022DA38373C6
                • Part of subcall function 0000022DA38376F0: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383771F
                • Part of subcall function 0000022DA38376F0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383772A
              • VirtualAllocEx.KERNEL32 ref: 0000022DA383745B
              • WriteProcessMemory.KERNEL32 ref: 0000022DA383749F
              • HeapFree.KERNEL32 ref: 0000022DA3837520
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Heap$Process$AllocFree$CurrentMemoryVirtualWrite
              • String ID: 2$IoCompletion
              • API String ID: 3548349751-304311290
              • Opcode ID: 7ebdce919db8becf1db9f316b5089ad423863689ecabb06c358170e70d436e93
              • Instruction ID: 1847c15fab648581ac9296c4ccb58aa14274dfed6af13cab3d915126c6590290
              • Opcode Fuzzy Hash: 7ebdce919db8becf1db9f316b5089ad423863689ecabb06c358170e70d436e93
              • Instruction Fuzzy Hash: 42515C71218B8193E7E58BB5E848B1AB7E1F7C57A4F100615FA958ABD8DF7DC4448F00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Find$ErrorFileLast$CloseFirstNext_vswprintf_s_lswprintf
              • String ID: %s\%s
              • API String ID: 1768775470-4073750446
              • Opcode ID: 248aaef3886caa72b2d9d56981facd7d1fa5cb528fc77309e03ef3a928677393
              • Instruction ID: d2a512fc529dc730b07d636089c1d917744216e7383545935154ee6dfb9379b1
              • Opcode Fuzzy Hash: 248aaef3886caa72b2d9d56981facd7d1fa5cb528fc77309e03ef3a928677393
              • Instruction Fuzzy Hash: 0B31C831A04680A6EB649F91A44CBAD73B1F784BD0F444212FAD923AD8DFBCC985C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: BindingString$ComposeFreeFrom
              • String ID: 12345678-1234-ABCD-EF00-0123456789AB$\$\pipe\spoolss$ncacn_np
              • API String ID: 465755213-1684225170
              • Opcode ID: 5ff4be422249118a35a099eeb7e61a0a0a438981dad3fff9fd0aec4d44c96434
              • Instruction ID: fe27777fbe918526c2ddc01ac09705114640793e9f59900273da2d0b9eebc06e
              • Opcode Fuzzy Hash: 5ff4be422249118a35a099eeb7e61a0a0a438981dad3fff9fd0aec4d44c96434
              • Instruction Fuzzy Hash: DC218236A14A80E2DF709F86F888BAA73F0F784784F855119DB4953654DFBCC145C704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
              • String ID: SeDebugPrivilege
              • API String ID: 3398352648-2896544425
              • Opcode ID: 06a7beff0cfccf4d041f7d7f3e6a4332b90f74f19fcb778a4e1f4d7a6bf5bba0
              • Instruction ID: 5028d68523b951b45120de94e8edd4c2e3c64152c945fbc26e8eca9d8b1cb47f
              • Opcode Fuzzy Hash: 06a7beff0cfccf4d041f7d7f3e6a4332b90f74f19fcb778a4e1f4d7a6bf5bba0
              • Instruction Fuzzy Hash: 71012171A04B45A3EB509FE2F888B5AB3B0FBC8B54F454119EA8A53658DFFCC449CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
              • String ID:
              • API String ID: 917087896-0
              • Opcode ID: 0cfc3383bac7433545e81286e7cf9ad2375aa63631821ee19201f1c728bdbe70
              • Instruction ID: 04d0dd8e24b03075c863bf6142fd77e2aa7a577fb7d6a9addde8b7ed3bc16426
              • Opcode Fuzzy Hash: 0cfc3383bac7433545e81286e7cf9ad2375aa63631821ee19201f1c728bdbe70
              • Instruction Fuzzy Hash: 48312232218B4197E7D09FB5E848B5BB7A6F784744F500126EA8A8AB94DF3DC5448B40
              APIs
              • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B6778
              • OpenProcessToken.ADVAPI32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B678B
              • LookupPrivilegeValueA.ADVAPI32 ref: 0000022DA54B67BA
              • AdjustTokenPrivileges.ADVAPI32 ref: 0000022DA54B67DD
              • GetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B67E7
              • GetHandleInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B67FE
              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B680D
              • SetLastError.KERNEL32(?,?,?,?,00000000,00000000,?,0000022DA54B5F80), ref: 0000022DA54B681A
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorHandleLastProcessToken$AdjustCloseCurrentInformationLookupOpenPrivilegePrivilegesValue
              • String ID:
              • API String ID: 1526621745-0
              • Opcode ID: 63d616277a6404653c697ffa3010a5e12329fb468d5c94cc14154750edd8ebae
              • Instruction ID: 61a7ff7a368f74c9b15acb8b9aaa8ea8387c4a603ece0451a1e0b72399694459
              • Opcode Fuzzy Hash: 63d616277a6404653c697ffa3010a5e12329fb468d5c94cc14154750edd8ebae
              • Instruction Fuzzy Hash: CA215372A0974097FB509FA6F848B5AB3F4F7C8784F444039EA4A93A54DF78C805CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$Service$CloseCreateHandleManagerOpen
              • String ID:
              • API String ID: 1692906367-0
              • Opcode ID: 2b0af2ceeb5913fda9b3e7486b5fba0233390429202dadf00cb6cf47de665049
              • Instruction ID: 3d78bd1d605dd76e95970d56ee6a1c635d5ed44d91a4eac51165738a1fd74db7
              • Opcode Fuzzy Hash: 2b0af2ceeb5913fda9b3e7486b5fba0233390429202dadf00cb6cf47de665049
              • Instruction Fuzzy Hash: 55215035B08B4093EB548F92A84CB1DB3B4F799BD0F584938EA9A53B54DFBCC4458700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Drive$DiskErrorFreeLastLogicalNameSpaceStringsTypeUniversalfreemalloc
              • String ID:
              • API String ID: 2456301943-0
              • Opcode ID: ccae92921d5a1553cc09299aafbc17f3b5e33a5978f63057fd8c14b38652351e
              • Instruction ID: 29b86591002944a7f79d76290784cc80818a25a4f035e29d9009ae0c642718d7
              • Opcode Fuzzy Hash: ccae92921d5a1553cc09299aafbc17f3b5e33a5978f63057fd8c14b38652351e
              • Instruction Fuzzy Hash: BA51A272A04B8593EB609FA2E448BAE7761F789FD4F504026CE4A63B99DF7CC446C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
              • String ID: SeDebugPrivilege
              • API String ID: 3038321057-2896544425
              • Opcode ID: c6b6d43e06d8ba28a8b08f8c20b83eda430b067763666b33fe126ce2f199aabe
              • Instruction ID: 8edf3c2ca61f5be0e4ebd847b58b6e80ba7ef9bbe494b316d3412227e745d8ec
              • Opcode Fuzzy Hash: c6b6d43e06d8ba28a8b08f8c20b83eda430b067763666b33fe126ce2f199aabe
              • Instruction Fuzzy Hash: E7213771B08B8593EB409FA6F84876A77B1F785BC4F085035EA4AA3B59DFB8C405C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastVirtual$AllocMemoryProcessProtectWrite
              • String ID: @
              • API String ID: 3698175283-2766056989
              • Opcode ID: 5e30b1100322dcd236b3d3deec6b99aa36a4be20d0583ecc1c1f72bd8369be6e
              • Instruction ID: abea2a829b4e73e094330de575e397d77ca4a19dd03466461e7e6c1624631a29
              • Opcode Fuzzy Hash: 5e30b1100322dcd236b3d3deec6b99aa36a4be20d0583ecc1c1f72bd8369be6e
              • Instruction Fuzzy Hash: BF119432B04F81A6E7209F96F848A4AB7A0B749FD4F484026EE8963B54EF78C515C744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$bindclosesocketlisten
              • String ID:
              • API String ID: 1548718142-0
              • Opcode ID: fe8277ea95e6a61402380fbc271dee7c0d07b285c9eab3e52634fa1f44bccb06
              • Instruction ID: 244a2c04ed1a887342e34389bfb6b4fc6de754b829c5970dd419327d78453ca2
              • Opcode Fuzzy Hash: fe8277ea95e6a61402380fbc271dee7c0d07b285c9eab3e52634fa1f44bccb06
              • Instruction Fuzzy Hash: 7B11F936518A4097D7A09BB5E84861AB7A2F7C97B8F200710EAB946AE8CF3DC5449F04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$Device_errno$AllocDriverDriversEnumFileHeapName_callnewhmalloc
              • String ID:
              • API String ID: 3108112982-0
              • Opcode ID: d504a8a62a2027359cf706817d8d54aa5907b951b5ee076855b953ebce2ab0e2
              • Instruction ID: d8186073aab714862979935b506a38893e5b82d5f0be06653d52108dcd502a62
              • Opcode Fuzzy Hash: d504a8a62a2027359cf706817d8d54aa5907b951b5ee076855b953ebce2ab0e2
              • Instruction Fuzzy Hash: C941A4B6604BC592EB749B92E8587AE63A0F785FC4F404026DF8E63B45DFB8C545C704
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: $invalid bit length repeat$invalid block type$invalid stored block lengths$too many length or distance symbols
              • API String ID: 0-348607807
              • Opcode ID: 104f780cfa68167cb1bcc1de536b4380374a6ca759010339654cf3f2fb83958a
              • Instruction ID: df6302a9bb0d88ac9b27c420960cd511aee015f2381a35a3ae73a483f2b5656c
              • Opcode Fuzzy Hash: 104f780cfa68167cb1bcc1de536b4380374a6ca759010339654cf3f2fb83958a
              • Instruction Fuzzy Hash: 64138F76209B848ACBA5CF5AE49469EB7B1F3CDB90F104116EB8D87B69CB79D450CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: wcsstr$_errno_invalid_parameter_noinfo
              • String ID: file:$iehistory:$mapi:
              • API String ID: 409387605-1942739989
              • Opcode ID: e07818d66d1e176b373274aeefc80d9bcbcd8c0a3e8d64927c6b6bbd6033ad03
              • Instruction ID: 6c2317e0b914023602aecaa938a4fc4a6e010353c6f9d30c742bf64254d200d3
              • Opcode Fuzzy Hash: e07818d66d1e176b373274aeefc80d9bcbcd8c0a3e8d64927c6b6bbd6033ad03
              • Instruction Fuzzy Hash: 20C17C32600B8196EB20CFA5E898BDD37B5F788B98F504116DB8D67B99DFB8C245C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Time$InformationLocalZone_snwprintf_s_vsnprintf_s_l
              • String ID: %d-%02d-%02d %02d:%02d:%02d.%d %S (UTC%s%d)
              • API String ID: 3645815937-3952767286
              • Opcode ID: 654a11ebd5ada6235566ecadae292fb6f78affb3b0deb05a139ff6c98ee96027
              • Instruction ID: ca4bced4103ec9d524a9f92207b325126618797ec8794a06bc781d9cba7d8876
              • Opcode Fuzzy Hash: 654a11ebd5ada6235566ecadae292fb6f78affb3b0deb05a139ff6c98ee96027
              • Instruction Fuzzy Hash: C8417A72618791D6D760CF66E88479AB7E1F3C8B80F508126EB8993B28EB7CC145CF40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Virtual$AllocCreateMemoryProcessProtectRemoteThreadWrite
              • String ID:
              • API String ID: 1113946311-0
              • Opcode ID: 10fc5e7f6a62509194f4a45e3198c350bea98cae6c4cdc58543ba5fcaf41585d
              • Instruction ID: d60483df099f65e0b73d1756889a6828079acf60a3212fb2204446e7da2ae8f9
              • Opcode Fuzzy Hash: 10fc5e7f6a62509194f4a45e3198c350bea98cae6c4cdc58543ba5fcaf41585d
              • Instruction Fuzzy Hash: 98216D71305B9092EBA4CB66A588F5AB6EAB748FC4F044129DE4C4BB94DF39C501CB40
              APIs
              • VirtualAllocEx.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,0000022DA54B61BA), ref: 0000022DA54B65D2
              • WriteProcessMemory.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,0000022DA54B61BA), ref: 0000022DA54B65F1
              • VirtualProtectEx.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000000,0000022DA54B61BA), ref: 0000022DA54B6612
              • CreateRemoteThread.KERNEL32 ref: 0000022DA54B6646
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Virtual$AllocCreateMemoryProcessProtectRemoteThreadWrite
              • String ID:
              • API String ID: 1113946311-0
              • Opcode ID: f180c3a5bfa9a6539c27fc80602833a55acc816ec66a3861d6d02ed0e1206d69
              • Instruction ID: b26d3db292e8e7c21b16b2e08542735251b79927ee4e41e9ba47b429589746d3
              • Opcode Fuzzy Hash: f180c3a5bfa9a6539c27fc80602833a55acc816ec66a3861d6d02ed0e1206d69
              • Instruction Fuzzy Hash: 33217A72705B8596EF24CF56A949B2AB6A6B798FC0F044128EE9D63B58DF78C1058B00
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 7f0aa0525b7165fcf24d7e54f4ea9c602ba1047d22edecf0a50cb36d09ecbbb1
              • Instruction ID: 93528e73f19d5f224a59386290ffa7f45ecffd53e0f9d0c46827604c60a8fe1d
              • Opcode Fuzzy Hash: 7f0aa0525b7165fcf24d7e54f4ea9c602ba1047d22edecf0a50cb36d09ecbbb1
              • Instruction Fuzzy Hash: B431A336605F8486DBA08F69F48074E77A4F388BA8F104126DF8D93B68EF78C494CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Crypt$ContextErrorLast$AcquireDestroyHashReleasefclose
              • String ID:
              • API String ID: 1196782254-0
              • Opcode ID: ba31048e0eb4758c6aed36fa7f82a9920077cb3a0fd7453b809e904b5d87fb5a
              • Instruction ID: 626c540ce81f69b04df7c7742f25c1098dd7d27ce0f7866b945aee595db0999f
              • Opcode Fuzzy Hash: ba31048e0eb4758c6aed36fa7f82a9920077cb3a0fd7453b809e904b5d87fb5a
              • Instruction Fuzzy Hash: 9E21B076B15B80A2EB50DBA2F858F6A63B4F788BC0F148422EE4A63B54CF78C445C740
              APIs
              • GetModuleHandleW.KERNEL32(?,?,?,0000022DA381A8ED,?,?,?,?,0000022DA383A37E), ref: 0000022DA381A85D
              • SetUnhandledExceptionFilter.KERNEL32(?,?,?,0000022DA381A8ED,?,?,?,?,0000022DA383A37E), ref: 0000022DA381A891
              • ExitProcess.KERNEL32 ref: 0000022DA381A8A6
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ExceptionExitFilterHandleModuleProcessUnhandled
              • String ID:
              • API String ID: 3470424200-0
              • Opcode ID: 04bb9a9e3b9a2e4ce43640a4552fad1b4fdee3d981589b498bcc59f910ae51c4
              • Instruction ID: 04d28dcef6fb7ec5f83d3356e079f1ec18d13d81ec8bb7e87c660f59a24f4475
              • Opcode Fuzzy Hash: 04bb9a9e3b9a2e4ce43640a4552fad1b4fdee3d981589b498bcc59f910ae51c4
              • Instruction Fuzzy Hash: FEF01231210B40A7EBE45FB5E84DB29B3A2EB48B59F584129D5174D6D1CE3DC899C600
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: $7- unexpected multithread lock error$e for thread data
              • API String ID: 0-529867808
              • Opcode ID: 9d2ad555cd603ddca3ecd389cd5f4e4cb62492b3c5034ddcfdbf1e8a62fbb2d6
              • Instruction ID: b1e332dce555bcb772479a3b0a20d98950fa849e7266e39dba087e71aa4ae9d7
              • Opcode Fuzzy Hash: 9d2ad555cd603ddca3ecd389cd5f4e4cb62492b3c5034ddcfdbf1e8a62fbb2d6
              • Instruction Fuzzy Hash: 51136176219B848ADBA1CF5AE49469AB7B1F3CDB90F104116EBCD87B69CB39D450CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$ContextDestroyReleasefree
              • String ID:
              • API String ID: 290532017-0
              • Opcode ID: 6ff03d77cfd066ed519229047be80712f78816b05eed70fb051c2aa62c719004
              • Instruction ID: e6be2c00304d9592d7095b73d71fa679fb0b060319fac6b42cfcdfb4bc1045fd
              • Opcode Fuzzy Hash: 6ff03d77cfd066ed519229047be80712f78816b05eed70fb051c2aa62c719004
              • Instruction Fuzzy Hash: C711EC32304B8993EB918B7AE45876A67F1F785B84F958071DA8D8B7A4DF39C844C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: memcmp
              • String ID:
              • API String ID: 1475443563-0
              • Opcode ID: a4e983365a81458328f3ce7d7dcbab1586c46f81c81de4a894f68fbaebfab3c5
              • Instruction ID: c0ab43f9cca60303c618096d22209d5e69eb32d585d5e544526c5f0829d96463
              • Opcode Fuzzy Hash: a4e983365a81458328f3ce7d7dcbab1586c46f81c81de4a894f68fbaebfab3c5
              • Instruction Fuzzy Hash: AC22366BE1869246FF118B64E421BF83751FB25788F440232DE4D93685EF3AD56DC309
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ClearErrorEventLast
              • String ID:
              • API String ID: 1161489092-0
              • Opcode ID: bc87423c1e615ec629d484a1e8730e392066b762436ac5920715abdb538678a8
              • Instruction ID: 475783aaa7bdcd971b2550bb8ae458eaa75497cad09eaa23563593366b23997f
              • Opcode Fuzzy Hash: bc87423c1e615ec629d484a1e8730e392066b762436ac5920715abdb538678a8
              • Instruction Fuzzy Hash: 4E013676B04B81D2E7449BA3B84866A67A1F7CDFD0F598036DE4A97714DE78C4418740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: 5078d417909506b462a0303eb0cde5053897394b9c6e5a927d1f1f97af5c8271
              • Instruction ID: 47590bdc268c5850f3e17bfa7fa29326d17449bebbcaef259ece86e5ec271efb
              • Opcode Fuzzy Hash: 5078d417909506b462a0303eb0cde5053897394b9c6e5a927d1f1f97af5c8271
              • Instruction Fuzzy Hash: 72F0C476A16A00CACB60CF65F444749B3E0F348B64F048222EAAC977A8DA7CC9958F00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: BindingFreefree
              • String ID:
              • API String ID: 1700084352-0
              • Opcode ID: ab010c7b038e844a9bb1cbf83f90ef87de35ddfd70f28d8fe2da2bd55d7067ec
              • Instruction ID: 253f4b6c855d48e73506c9075ce98a72ad9bb7932425fe334e9181d358511bfc
              • Opcode Fuzzy Hash: ab010c7b038e844a9bb1cbf83f90ef87de35ddfd70f28d8fe2da2bd55d7067ec
              • Instruction Fuzzy Hash: FCE09233B15A4092DA66DA46B404A9A77A1F389BB0F564712DE79633D8CB7BC8C38700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: FrameHandler2
              • String ID:
              • API String ID: 438124390-0
              • Opcode ID: 6263d641ec332dac5ed4f08b61926634c6d686e0cac3bee97d0370188f5a9ba6
              • Instruction ID: 9862e5518f027f2be4f72bf3b12bf826962d46635396dfe82feb2dee997e9001
              • Opcode Fuzzy Hash: 6263d641ec332dac5ed4f08b61926634c6d686e0cac3bee97d0370188f5a9ba6
              • Instruction Fuzzy Hash: 35126876601B40DBEB94CFB8D554BAD73E6FB04788F10412ADE4E5BB98EA38D925C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: FrameHandler2
              • String ID:
              • API String ID: 438124390-0
              • Opcode ID: b5c240681e955b447fc7bf8eb3891979a2d5aef16a8a76cb7df7e38ace001278
              • Instruction ID: 28f14342c3e4178f245fea66626741e4b46885812d69b571b608ac4123ffd97b
              • Opcode Fuzzy Hash: b5c240681e955b447fc7bf8eb3891979a2d5aef16a8a76cb7df7e38ace001278
              • Instruction Fuzzy Hash: 0D129972B01B44DAEF608FA8E484BEDB3E5FB24758F414125EE4D67B88EA78D415C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: FrameHandler2
              • String ID:
              • API String ID: 438124390-0
              • Opcode ID: ded8129a0231a52b6a97d285332cd3f418e03d10df9e10029fc08a36bafa33fb
              • Instruction ID: 747543336c72e4faf2d5780911719bc43feb3b884140885fb21ef77f92a9cfa7
              • Opcode Fuzzy Hash: ded8129a0231a52b6a97d285332cd3f418e03d10df9e10029fc08a36bafa33fb
              • Instruction Fuzzy Hash: 51128672B52A44DBEB648FA8E044BAD37F5FB04B98F508129EE4D63B88DB78D455C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: BindingFree
              • String ID:
              • API String ID: 3284907940-0
              • Opcode ID: acae53e96e9fc6aa31ab52ecb856e4557d2507c7944642ca7054feea372b1f09
              • Instruction ID: 8efd7c1231d20108e5e4a2f7919ba298f69210d41bb44ce1648154b7fa0aaf07
              • Opcode Fuzzy Hash: acae53e96e9fc6aa31ab52ecb856e4557d2507c7944642ca7054feea372b1f09
              • Instruction Fuzzy Hash: 38B09271A25A80D2CE08EB21E8890196AB0FBD8345FC00864E38A00524CB68C2BA8B04
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 461ec9fc4d410250812c0571ea337f80e8d0d0decb9976798a79d3b32e64ecf4
              • Instruction ID: 9e5000b8b36989423eeabb20d160457efffb429780e98cb62451c7997c31974b
              • Opcode Fuzzy Hash: 461ec9fc4d410250812c0571ea337f80e8d0d0decb9976798a79d3b32e64ecf4
              • Instruction Fuzzy Hash: D8E149DBF29B9602FB63433964027B457106FA77E4A00D336FDA9B2BD1DF36A2525204
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 05ddf091599fe59af156422c0051f0a862566041c5438f42047b1c2a13c0bca8
              • Instruction ID: 707d0dac03495e01c9792102043491326543a20012ec9068239fb86fc0ecb62c
              • Opcode Fuzzy Hash: 05ddf091599fe59af156422c0051f0a862566041c5438f42047b1c2a13c0bca8
              • Instruction Fuzzy Hash: 45E1CCB3A04B80D6C720CF56E448B9EB7A5F789B94F468126DF8E53B58DB79C841CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$AddressHandleModuleProc
              • String ID: %s (%u.%u Build %u).$%s (%u.%u Build %u, %S).$RtlGetVersion$Unknown$Windows 10$Windows 11$Windows 2000$Windows 7$Windows 8$Windows 8.1$Windows 95$Windows 98$Windows ME$Windows NT 3.51$Windows NT 4.0$Windows Server 2000$Windows Server 2003$Windows Server 2008$Windows Server 2008 R2$Windows Server 2012$Windows Server 2012 R2$Windows Server 2016$Windows Server 2019$Windows Server 2022$Windows Vista$Windows XP$ntdll
              • API String ID: 1762409328-4127402629
              • Opcode ID: 0151111945498b98d08db5d7b1454304525adc47465ab9f356180115c2e38bd6
              • Instruction ID: 07a93e651714c87f5c634a9eb7431b6c90aa076f9d7e2eaba1fe951ba6f61899
              • Opcode Fuzzy Hash: 0151111945498b98d08db5d7b1454304525adc47465ab9f356180115c2e38bd6
              • Instruction Fuzzy Hash: 15713931E0C945B2FA74CBE4E848FAA73A0F7A4350F944253F95A629D4DBF8CA49C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: rand$ErrorHandleLast_snwprintf_s$AddressCloseCreateModuleObjectProcSemaphoreSingleWait
              • String ID: RtlGetVersion$\\.\pipe\%08x%08x$\\localhost\pipe\%08x%08x$ntdll
              • API String ID: 415526046-3272578444
              • Opcode ID: aaa228892d250201629ea1070e6068b62cf8dab70cf740a9fd360d5385ea744d
              • Instruction ID: 6a1712879e47d8ffa65f26468b2b778957da67ae4525c2681c214aab50f5ecfc
              • Opcode Fuzzy Hash: aaa228892d250201629ea1070e6068b62cf8dab70cf740a9fd360d5385ea744d
              • Instruction Fuzzy Hash: 65818132A04A80A7FF24DFA6E84CF9D73A1F784B98F054115DA4A57B98DFB8CA45C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: wprintf$_errno_ftbuf_invalid_parameter_noinfo_output_s_l_stbuf
              • String ID: '%c'$ALPHA$BEGIN$BRANCH$CHAR$CHAR_CLASS$DIGIT$DOT$END$INV_CHAR_CLASS$NOT_ALPHA$NOT_DIGIT$NOT_WHITESPACE$PLUS$QUESTIONMARK$STAR$UNUSED$WHITESPACE$type: %s
              • API String ID: 1178621126-2416194042
              • Opcode ID: 70e0f48b91672c48a44a903a3214981750684f9985e2e9cc8147a8c3077010bc
              • Instruction ID: c32d9cf6f7189c6c8343f911574d261c70506cca54de0dedffeb372aacc54584
              • Opcode Fuzzy Hash: 70e0f48b91672c48a44a903a3214981750684f9985e2e9cc8147a8c3077010bc
              • Instruction Fuzzy Hash: 89412B36A08F50B4EB11DB90E48CBA933E9F714340F9502B6EA9D23761EFB9C959C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: _snwprintf_s$ErrorFileLast$CloseCreateDeleteHandlePathSleepTemp
              • String ID: %s%s.dll$%s\%s.dll$\\.\pipe\%s$rundll32.exe %s,a /p:%s
              • API String ID: 4190469582-3794227474
              • Opcode ID: ad4a13f5fedbb658d10b85932f0655b8b941d26370f3b824bcba0aa0f6ad3ea0
              • Instruction ID: a55439097b23e9cd5fce998b1a83f70f3a34b6027c65777fb6cd38e27e38db72
              • Opcode Fuzzy Hash: ad4a13f5fedbb658d10b85932f0655b8b941d26370f3b824bcba0aa0f6ad3ea0
              • Instruction Fuzzy Hash: 6BC1C532B08B81A6EF25DF65D848BED77B4F784B84F454125EA5A27794DFB8C245C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressProcProcess$FreeLoadMemoryRead$CloseHandleOpenwcsncpy
              • String ID: GetModuleFileNameExW$GetProcessImageFileNameW$NtQueryInformationProcess$QueryFullProcessImageNameW$kernel32$ntdll$psapi
              • API String ID: 3331711018-385265775
              • Opcode ID: d14fca57e017bcff5754da344d94518dfb53903ded2bd8d019f699870b97544b
              • Instruction ID: 46ec43fed65d7d1e2d19ca406fb624bf282632de7d451aee4f8e1b0128006440
              • Opcode Fuzzy Hash: d14fca57e017bcff5754da344d94518dfb53903ded2bd8d019f699870b97544b
              • Instruction Fuzzy Hash: 1B91B471B05B80A2FB79CB92B848F6AA3E5BB88BC0F445015DD4967B98EFBCC555C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: CurrentErrorHandleLastProcess$CloseModuleOpenThreadToken
              • String ID: 8$NtQueryInformationProcess$ntdll
              • API String ID: 580099508-531102638
              • Opcode ID: d88a44817dd1c3a5c2ace7d6417cfea9a23e0f4190742bb8ea4b2fa078c91fb9
              • Instruction ID: bd2e3af5202c854a16ca747fa684638b80996fecd8eddb9afac300b874440bc3
              • Opcode Fuzzy Hash: d88a44817dd1c3a5c2ace7d6417cfea9a23e0f4190742bb8ea4b2fa078c91fb9
              • Instruction Fuzzy Hash: 68719E32A04B81A7EF259B96F84CB6EA3B4F788B94F154425DE4A67754EFB8C844C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: rand$ErrorLast$Handle_snwprintf_s$AddressBindingCloseCodeCreateExitFreeModuleObjectProcSemaphoreSingleSleepThreadWaitfreemalloc
              • String ID: %08x%08x$RtlGetVersion$\\.\pipe\%08x%08x\pipe\srvsvc$\\.\pipe\efsrpc$\\.\pipe\lsarpc$ntdll
              • API String ID: 3287662087-908824396
              • Opcode ID: 98427c97204027ab354b9afd121be21940c96da9cbced9af84c5c453467e33db
              • Instruction ID: b242d257e099612b561793aea2f945aee1521706fba9cb776fbcd10955518403
              • Opcode Fuzzy Hash: 98427c97204027ab354b9afd121be21940c96da9cbced9af84c5c453467e33db
              • Instruction Fuzzy Hash: B8B17032A04681E6FF65DFE6E848F9E33B4FB84784F450425DA09A7698EFB8C545C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: rand$CreateErrorHandleLast_snwprintf_s$AddressCloseFileModuleObjectProcSemaphoreSingleWait
              • String ID: %08x%08x$RtlGetVersion$\\.\pipe\%08x%08x\pipe\spoolss$\\.\pipe\spoolss$ntdll
              • API String ID: 3964341528-2802406934
              • Opcode ID: 4a0b83565edc84a9af4bbb254a91e07f0cb79dc73d6188df7e9242fc923f2136
              • Instruction ID: c64408f5f975fd9a1488b014e8d2928e034b197e1739d4f8a1b19a6d3c0ebd50
              • Opcode Fuzzy Hash: 4a0b83565edc84a9af4bbb254a91e07f0cb79dc73d6188df7e9242fc923f2136
              • Instruction Fuzzy Hash: DB619272A04780ABEF64DFA2E848BDE73A1F785784F454125EA0D57798DFB8C549C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastfree$ObjectSingleWait
              • String ID: PACKET RECEIVE
              • API String ID: 142810606-1195290434
              • Opcode ID: 07f9fef444642629663690db4a4cf7e81b328435c52058d3e77c25889c0c9a4f
              • Instruction ID: 25a7f78220d9de74accd82735731c84169a66c10bbcdc609e8ba07547bb6363d
              • Opcode Fuzzy Hash: 07f9fef444642629663690db4a4cf7e81b328435c52058d3e77c25889c0c9a4f
              • Instruction Fuzzy Hash: 05E11232318A8197EBE09BF5E458B5AB7E1F794784F104125EA9A8BBD4DF7CC844CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Http$Option$FreeGlobalProxy$callocmalloc$ConfigCurrentErrorLastOpenRequestUser
              • String ID: GET$POST
              • API String ID: 560410134-3192705859
              • Opcode ID: 8a8d862797690db45a18254d712e114a475a22c00f5285b508c27356ac15cdf8
              • Instruction ID: 2ebc08431389c3be5d076de6a54b7b13742e53763fef7c550d4dda8af16fda0d
              • Opcode Fuzzy Hash: 8a8d862797690db45a18254d712e114a475a22c00f5285b508c27356ac15cdf8
              • Instruction Fuzzy Hash: 5FF14132204BC593EBE08BA5E44879EB7E2F3D4784F404425DA998BBA4DFBDC484CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressLibraryProc$Load$Free
              • String ID: GetProcessImageFileNameW$GetRawInputData$Psapi.dll$QueryFullProcessImageNameW$RegisterRawInputDevices$kernel32.dll$psapi.dll$user32.dll
              • API String ID: 3890210519-1542674857
              • Opcode ID: feb59df147c5473a825ac57dd1b03a0f38ce1f1d4c0bcab3ca1eeeb4ce05e09e
              • Instruction ID: 8817098ac2948dd48d88080c44f772714c69f190fcea56a79406d82daa3ea01f
              • Opcode Fuzzy Hash: feb59df147c5473a825ac57dd1b03a0f38ce1f1d4c0bcab3ca1eeeb4ce05e09e
              • Instruction Fuzzy Hash: EA31F930A96B01B1FE4ADBD5B85CB2823E0BB59B91F482165D94E66360FFBCC449D340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastLibrary$AddressFreeLoadProcfreehtonl
              • String ID: EnumProcessModules$GetModuleBaseNameA$GetModuleFileNameExA$psapi
              • API String ID: 2185136653-4146384186
              • Opcode ID: 8e41393eec22b54ebdf8f4a96deb0b9a42d068d8aa09ecc381645b8c95c28807
              • Instruction ID: eb86cf51e53aad1182cd1212a4644c5cefcf7fb91b8eac1e181a7ab074ad25cd
              • Opcode Fuzzy Hash: 8e41393eec22b54ebdf8f4a96deb0b9a42d068d8aa09ecc381645b8c95c28807
              • Instruction Fuzzy Hash: 3781C332A05BC0A6EB20CFA2E848BAE77B1F789B94F441115DE5A67794DF78C545C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: malloc$freehtons$AddressHandleModuleProcTable
              • String ID: GetExtendedTcpTable$iphlpapi$tcp$tcp6
              • API String ID: 1620742851-586099951
              • Opcode ID: 834124a8a1628376525c60df4e2f0e827e7c31c27fc153db30b4627f7263699c
              • Instruction ID: d5bfdf111f0b0fe35f144c796bfeb2f92dbb5bf565fae90cd61f643a513f4534
              • Opcode Fuzzy Hash: 834124a8a1628376525c60df4e2f0e827e7c31c27fc153db30b4627f7263699c
              • Instruction Fuzzy Hash: 8091F7B2B40641EBEB50DF56E448B6D77B0F784B84F405016EA8A67B98EFBCD545CB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: mbstowcs$calloc
              • String ID: https$pipe$tcp
              • API String ID: 2743665075-2240554849
              • Opcode ID: b927788af72f2bef9049b920d0eacd2589477780c399542063a4b0e3c01bf675
              • Instruction ID: d2f3de28a1f1ac3115cdc26b77407667388658b791f246bddad92dc4f9a0305f
              • Opcode Fuzzy Hash: b927788af72f2bef9049b920d0eacd2589477780c399542063a4b0e3c01bf675
              • Instruction Fuzzy Hash: B6D1D776218B8097EBA0DB65E45479AB7E1F7C4784F004126EACD8BBA9DF3CC4458F44
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastOpenService$CloseCurrentHandleManagerThread
              • String ID: rpcss
              • API String ID: 3906103551-2843778020
              • Opcode ID: e67824aa28177f17b6e7246a909f3e9673d1fd038dd90d6da0035193d37c218f
              • Instruction ID: 1b7e0bb1554f22309b605541e29a52785dd2969b1b471b40b90917d51b8cf475
              • Opcode Fuzzy Hash: e67824aa28177f17b6e7246a909f3e9673d1fd038dd90d6da0035193d37c218f
              • Instruction Fuzzy Hash: F9315436B01741A7FB659B97B848BA963A0FBC9BA1F454035CE0A16350EF7DC48AC710
              APIs
              • CoInitialize.OLE32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA544609C
              • LoadLibraryA.KERNEL32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA54460B6
              • GetLastError.KERNEL32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA54460C5
              • GetProcAddress.KERNEL32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA54460D7
              • GetLastError.KERNEL32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA54460E6
              • CoCreateInstance.OLE32(?,?,?,?,0000022DA3853710,0000022DA5445D5B), ref: 0000022DA5446155
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$AddressCreateInitializeInstanceLibraryLoadProc
              • String ID: CIMakeICommand$CITextToFullTree$LocateCatalogsW$SystemIndex$query.dll
              • API String ID: 3808765035-973766530
              • Opcode ID: 720d9c328525d2e01154ba9fcf2ad183cbf9d5e9ae928013ab7777fd7446115d
              • Instruction ID: 646a73366bf1bfa926404c0968d686be6972f57416ef041b80d08fc7c84c930d
              • Opcode Fuzzy Hash: 720d9c328525d2e01154ba9fcf2ad183cbf9d5e9ae928013ab7777fd7446115d
              • Instruction Fuzzy Hash: CF311931A01F01E2FB549FA4E848B5833F4F748B88F505566CA4E67364EFB9D55AC380
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$ConnectEventFileNamedOverlappedPipeReadResetResult
              • String ID: m
              • API String ID: 1955163435-3775001192
              • Opcode ID: ca9f08458dd51b7eccf077a122f473f0cca9a460bab1f66125aa79992e2a8cc5
              • Instruction ID: 29ecc0c9e5904a20d1697977b7df68c9131e8fb263f737b68c96585f08b6b249
              • Opcode Fuzzy Hash: ca9f08458dd51b7eccf077a122f473f0cca9a460bab1f66125aa79992e2a8cc5
              • Instruction Fuzzy Hash: B8022332225B8197EBD0DB76E458B5BA7A2F7C4B84F105025FA8D8BBD9DF79C4448B00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID: AND System.DateModified<='%04d-%02d-%02dT%02d:%02d:%02d'$ AND System.DateModified>='%04d-%02d-%02dT%02d:%02d:%02d'$AND DIRECTORY='%s:%s'$AND SCOPE='%s:%s'$size,path,write
              • API String ID: 0-3277289244
              • Opcode ID: 3a568c6cfaf46a1eb5b14276c9e8e4d2cc9399d0cdfa6a6c51111378daefd5bc
              • Instruction ID: 9c6015fa72887430f0428c21c7be0de305e3f5de07ecbb499557b1cb38e5e270
              • Opcode Fuzzy Hash: 3a568c6cfaf46a1eb5b14276c9e8e4d2cc9399d0cdfa6a6c51111378daefd5bc
              • Instruction Fuzzy Hash: 15D12672B41A51AAFB10CFE5D488BAD63B1FB84F88F108116DE1967B98EF79C509C350
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: mbstowcs$calloc
              • String ID: file error$stream error
              • API String ID: 2743665075-348918349
              • Opcode ID: cbadb7eca36bf48e931c61131647eb502b7fdb7439007cd6ab1eb28008616e5d
              • Instruction ID: 50881ffa04d9a91d00b82ff5fb22f538ea6167aaba1b690ac613db7d4dfe3d7f
              • Opcode Fuzzy Hash: cbadb7eca36bf48e931c61131647eb502b7fdb7439007cd6ab1eb28008616e5d
              • Instruction Fuzzy Hash: F0D1C976218BC496EBA0DB59E494B5AB7A1F7C4784F104126EACD8BB99DF38C841CF40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$free$ObjectSingleWaithtonlmallocmemcpy_s
              • String ID: aaaa
              • API String ID: 1131673111-2912478533
              • Opcode ID: 0e0c9b63af85f3fcc5815ddc3e706920e569b2340fb7d03e541fac399018d20b
              • Instruction ID: 3e4447cd97f726c27b77d65b5f13de9a153dc05cac4c4f307df39e38f7d1c907
              • Opcode Fuzzy Hash: 0e0c9b63af85f3fcc5815ddc3e706920e569b2340fb7d03e541fac399018d20b
              • Instruction Fuzzy Hash: CCB14172248B81D7EBA09BF5E45876AB7A2F784754F404025DA998BB98EF7CC444CF01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: malloc$freehtons$AddressHandleModuleProcTable
              • String ID: GetExtendedUdpTable$iphlpapi$udp$udp6
              • API String ID: 1620742851-3210492192
              • Opcode ID: 6f7904d43f2903fe83270e59c48226722c8039f2cf8c5a2c395e228ed9d6931c
              • Instruction ID: 7f938e03abf4027897d203ff67aaf0b1f000b7e2b0bcf1c7836df9de895a214b
              • Opcode Fuzzy Hash: 6f7904d43f2903fe83270e59c48226722c8039f2cf8c5a2c395e228ed9d6931c
              • Instruction Fuzzy Hash: 2581E272B04751A7EB20DF65E448B9C37B0F748BC4F40500AEA4A67B99EBBCC645CB80
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: htonl$ContextErrorLastThread
              • String ID: eax$ebp$ebx$ecx$edi$edx$eflags$eip$esi$esp
              • API String ID: 1258935475-2196928098
              • Opcode ID: 1c01791430a64a393e858c0f0156860ae8d47140e528b6d39dc1d09a848dace4
              • Instruction ID: 41da0a01d3bbc57ad1bf48c7b94cd1a57a7b38b5573fd90132826f875107650c
              • Opcode Fuzzy Hash: 1c01791430a64a393e858c0f0156860ae8d47140e528b6d39dc1d09a848dace4
              • Instruction Fuzzy Hash: 437130B2604B80EAE711CFA1E8487DA77B4F744758F500266EE4D27B68DFB8C559CB40
              APIs
              • LoadLibraryW.KERNEL32 ref: 0000022DA3818940
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA3818964
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA381897B
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA3818992
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA38189A9
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA38189C0
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3818359), ref: 0000022DA38189D7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$LibraryLoad
              • String ID: NtClose$NtCreateSection$NtMapViewOfSection$NtOpenFile$NtOpenSection$NtQueryAttributesFile$ntdll
              • API String ID: 2238633743-2731749698
              • Opcode ID: f441fef43948bcee7ecb6de3abe3450a42319b97b02b5f1982d09cf86147ee70
              • Instruction ID: eb8a7cf7bdbd867a0d9a7473723ed726317dae3946815033cd9e2828dca20163
              • Opcode Fuzzy Hash: f441fef43948bcee7ecb6de3abe3450a42319b97b02b5f1982d09cf86147ee70
              • Instruction Fuzzy Hash: D3510776615B8493DB80DB69E89579AB3B1F788B84F501122EB8D4BB79CF3CC156CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeProc$Load_errno_invalid_parameter_noinfo$DirectorySystem
              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
              • API String ID: 3103270816-744132762
              • Opcode ID: 49a7fb4060bffaa9edbb54fd99750f93a7f2386ba8876c7c90d47abba00b5b16
              • Instruction ID: c005588d278f218e022030f1f37ce8474da3405b53b5dd6f175a3eb866460fd7
              • Opcode Fuzzy Hash: 49a7fb4060bffaa9edbb54fd99750f93a7f2386ba8876c7c90d47abba00b5b16
              • Instruction Fuzzy Hash: 9E416135A09B84A2EB14CB90F84C79A73B4F789B94F544112D98D63B68EFBCC189C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorHandleLastProcess$CloseCurrentModuleOpenToken
              • String ID: NtQueryObject$ntdll
              • API String ID: 2600418564-2921792543
              • Opcode ID: 3dfc1a726c1db6aac0d5cf7d76c209d85ec83de1d41d5c59ffd11e4f0b629a95
              • Instruction ID: 4c197ff8a87ca3b0318d97061ffb787f357a52391455d9001104aff0fd2ed54d
              • Opcode Fuzzy Hash: 3dfc1a726c1db6aac0d5cf7d76c209d85ec83de1d41d5c59ffd11e4f0b629a95
              • Instruction Fuzzy Hash: 03316D75B04B81A7FB108BE3B498B1A67A0F7CDB94F100028DE4A63B64EFB8D4098710
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Handle$AddressModuleProc$Close$_snwprintf_s
              • String ID: %d/%s$CreateToolhelp32Snapshot$Process32First$Process32Next$kernel32
              • API String ID: 3929803966-2034424418
              • Opcode ID: 8a433a1a4b0c835391f3d2169e3388e583cd0be05645b0269c1150c8cf7437a2
              • Instruction ID: c376b42a7ec178355c7b721aa7f3b2197bd5b5b96caa43e48fa559b1a4332ce3
              • Opcode Fuzzy Hash: 8a433a1a4b0c835391f3d2169e3388e583cd0be05645b0269c1150c8cf7437a2
              • Instruction Fuzzy Hash: 2831A131A41B42A6EB14DF91F848B5A23A0F748BE1F482262DD6A73794EFB8C045C740
              APIs
              • LoadLibraryA.KERNEL32 ref: 0000022DA3818C1C
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818C40
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818C57
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818C6E
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818C85
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818C9C
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0000022DA38183EA), ref: 0000022DA3818CB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$LibraryLoad
              • String ID: NtClose$NtCreateSection$NtMapViewOfSection$NtOpenFile$NtOpenSection$NtQueryAttributesFile$ntdll
              • API String ID: 2238633743-2731749698
              • Opcode ID: 5f969a8ceed3163d91c4df8562a099728c35422755aac9032aca25d32bb0763b
              • Instruction ID: be3a8fb09f7deb9216c3cfa9aecf4a31cfea631390b7ab7f4d4f5e4edbbd24fa
              • Opcode Fuzzy Hash: 5f969a8ceed3163d91c4df8562a099728c35422755aac9032aca25d32bb0763b
              • Instruction Fuzzy Hash: 6F31F876615B8093DA909B69F89575AB3B2F788BC4F501113EA9D4BF79DF3DC1018B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast_snwprintf_s$CloseCreateHandleObjectSemaphoreSingleVersionWait
              • String ID: \\.\pipe\%s$cmd.exe /c echo %s > %s
              • API String ID: 93777643-3579833515
              • Opcode ID: 2c58319facc92b515d418c376bf49d2fb8860339db1a4585df2df4eb4354b47f
              • Instruction ID: ad00ef00ac48620b3d476b1c7a77337136340f61842e371f5f6f5c731b024552
              • Opcode Fuzzy Hash: 2c58319facc92b515d418c376bf49d2fb8860339db1a4585df2df4eb4354b47f
              • Instruction Fuzzy Hash: CF61A536B04B41A6FF24DFA1E858BED73A0F789B84F054025DA4A67B99EFB8C545C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$_errnomalloc$AddressAllocHeapLibraryLoadProc_callnewhfree
              • String ID: stdcall
              • API String ID: 3740261583-1361542064
              • Opcode ID: ffde28508f3c91dd3659c8773025320ffe77338ec712f4009d336d049e2fd25a
              • Instruction ID: a44b4c4b7e62082df9ac4030c3ec9297ae4f1391c536ee5dbcaaef8d143a3b63
              • Opcode Fuzzy Hash: ffde28508f3c91dd3659c8773025320ffe77338ec712f4009d336d049e2fd25a
              • Instruction Fuzzy Hash: BB51AF76A05B40A2FB698F85E458BBD73A0F758B91F005225DE5FA7B91DF78C860C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastLibrary$AddressFreeLoadProc
              • String ID: EnumProcessModules$GetModuleBaseNameW$GetModuleFileNameExW$psapi
              • API String ID: 1529210728-3989420880
              • Opcode ID: a415e83e2cbca05cada1bdad8229326d90125f1cbaa71be728496fe88a2b22f1
              • Instruction ID: d437a697dd2b344ba4ddc5cc4e850ef590d04d98fb08c63b7a5d05e929d06fab
              • Opcode Fuzzy Hash: a415e83e2cbca05cada1bdad8229326d90125f1cbaa71be728496fe88a2b22f1
              • Instruction Fuzzy Hash: 2C519375B08B81A2EB64DF96E848B9967B1FB89FC0F584122DE4963755EF7CC109C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastProcessThreadTime$CurrentInformationLibraryObjectOpenSystemTokenUsermalloc$AddressDesktopFileFreeLoadProcStationWindow_invoke_watson_time64memcpy_s
              • String ID:
              • API String ID: 2780990703-0
              • Opcode ID: 49d4ffad9b4d104ce7ca520689330328ca7888229c12ba54f006dd5b0723343a
              • Instruction ID: 32f602255e1295f4b5504d306fecacd427957a79237eb40bba4abcb70f9e8a01
              • Opcode Fuzzy Hash: 49d4ffad9b4d104ce7ca520689330328ca7888229c12ba54f006dd5b0723343a
              • Instruction Fuzzy Hash: C8021036225B8593EBD0DB79E498B6A77A1F7C4B84F105122EE8E8B7A4DF78C445C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$free$FileObjectReadSingleWaitmalloc
              • String ID:
              • API String ID: 1659679957-0
              • Opcode ID: e825ee114b39cab299101a6f160a01cdfb3ba9c493e25820364669a2d13321f8
              • Instruction ID: bfb9e0ed38bde5ca9161aa9d806662a4a0021029219fc8cfb84cc3482832cc9a
              • Opcode Fuzzy Hash: e825ee114b39cab299101a6f160a01cdfb3ba9c493e25820364669a2d13321f8
              • Instruction Fuzzy Hash: 64A1007231874197EB90DBB9E458B5BB7A2F7C4784F104025EA998BBA5EF3DC844CB01
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CreateErrorLastNamedPipe
              • String ID:
              • API String ID: 4201769729-0
              • Opcode ID: 691b40c6b1a78f6856fc8097a292d81d683c53e87015d8029bd5ad61fe9e6c47
              • Instruction ID: 5c1ac54d1523ad992f076ee4ab5e50ce7c6049170bedeec118bf93c8951c7e60
              • Opcode Fuzzy Hash: 691b40c6b1a78f6856fc8097a292d81d683c53e87015d8029bd5ad61fe9e6c47
              • Instruction Fuzzy Hash: FE51A072B05B40A7EB248FA6B488B6EB3E0F784B84F544015EF8663B64DF78CC459B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Http$ErrorLast$ConnectCrackOpenTimeoutsfree
              • String ID: h
              • API String ID: 3038188542-2439710439
              • Opcode ID: b89c176b33d8fa98673e77474a46751e061b29d9860c60b19ab8ee44404e3557
              • Instruction ID: b9cd712978d5897313ce03ae25ecdb5a2f9cd5618c8ca28a1d305e3a253ac7ce
              • Opcode Fuzzy Hash: b89c176b33d8fa98673e77474a46751e061b29d9860c60b19ab8ee44404e3557
              • Instruction Fuzzy Hash: E4616032324B8593E7E09BB5E458B5E77A6F7D4B84F404021EA9E8BB94DF79C505CB00
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9875264fa650dab917d74541518c8323418633a8fa2f5bc5171ff8f8107f930e
              • Instruction ID: 9f31a5b1568223c40ceb5550d497981f9dd9b1740368f93cf62947de6eba96ff
              • Opcode Fuzzy Hash: 9875264fa650dab917d74541518c8323418633a8fa2f5bc5171ff8f8107f930e
              • Instruction Fuzzy Hash: 6751A536B08A8197FF649FA2E848B5D73A0FBC4B80F054525E94A63B54DFB8C4459711
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errnofreemalloc$Call2Client_snwprintf_s$AllocComputerErrorHeapLastName_vsnwprintf_s_l
              • String ID: \\%s$\\localhost/pipe/%s
              • API String ID: 2194898439-1768746761
              • Opcode ID: 7dbba0bd36b181f6a5f43d568556b3d9f366ae2c1c2e95240fce10627b940c37
              • Instruction ID: adef9d37f567028b3cef55026269aaaffcaafcc23e290af40c782cc5cd494313
              • Opcode Fuzzy Hash: 7dbba0bd36b181f6a5f43d568556b3d9f366ae2c1c2e95240fce10627b940c37
              • Instruction Fuzzy Hash: CD311A72A0578062FF25EB91A448B9E72E1F7847A0F060624E9A917BD5DFB8C942C701
              APIs
              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837544
              • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837576
              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA38375A2
              • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA38375BC
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837601
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA383761D
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837665
              • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA38376CB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressHeapProc$AllocFreeHandleLibraryLoadModuleProcess
              • String ID: NtQueryInformationProcess$NtQueryObject$ZwSetIoCompletion$ntdll.dll
              • API String ID: 1214976393-420758874
              • Opcode ID: 605d4673cb5f3103411c7aba26ca9791481e86df32fdcf3d2797515b52ed5af4
              • Instruction ID: ce1ea860d5049a8c585e193958ca70b9a1ba23e344d5c52f4861490f3022bbb6
              • Opcode Fuzzy Hash: 605d4673cb5f3103411c7aba26ca9791481e86df32fdcf3d2797515b52ed5af4
              • Instruction Fuzzy Hash: 8851E931206B04A7FBE4DBB5E89CB5A73E2F788758F504126E5498ABA4EF7DC584C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Library$AddressFreeLoadProc_errnomalloc$AllocCurrentHeapThread_callnewh
              • String ID: NtOpenThread$OpenThread$kernel32.dll$ntdll.dll
              • API String ID: 802756111-1307226884
              • Opcode ID: 8350347ead97729909e964a6ad1955d052de4c230fbbffee2eae7bf3f25f65e0
              • Instruction ID: d252226fffc32fe4a922df8814c84f17e7eb53acc5f7d50031eef4c64b20b55a
              • Opcode Fuzzy Hash: 8350347ead97729909e964a6ad1955d052de4c230fbbffee2eae7bf3f25f65e0
              • Instruction Fuzzy Hash: 7E413C36215B8493E7A0DBA5F45875AB3A1F7C8794F504126EA8E47B68DF7DC248CB00
              APIs
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A108
              • GetProcAddress.KERNEL32(?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A140
              • GetProcAddress.KERNEL32(?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A17A
              • GetProcAddress.KERNEL32(?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A1E0
              • GetProcAddress.KERNEL32(?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A213
              • memset.VCRUNTIME140(?,?,?,?,00000001,00000000,?,00007FF6EF719F54), ref: 00007FF6EF71A330
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$CurrentProcessmemset
              • String ID: SymAddrIncludeInlineTrace$SymFromInlineContextW$SymGetLineFromInlineContextW$SymQueryInlineTrace
              • API String ID: 3017635649-3384281969
              • Opcode ID: 7f69e8346fb470a11e66eacc1235267606e8904ba24019f08f7e2e4d1fcb8a56
              • Instruction ID: 0dff9e8696fa78c5c7fa617b748e9518b97f7e402162e1d132a5f2aa402c1864
              • Opcode Fuzzy Hash: 7f69e8346fb470a11e66eacc1235267606e8904ba24019f08f7e2e4d1fcb8a56
              • Instruction Fuzzy Hash: 19B18F36909AC19AFB718F25B8457E933A0FF44798F040135EE8C87758DF7A92A9D305
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: NamedPipe$CreateErrorHandleLastwcschr$InformationState_snwprintf_scallocwcsstr
              • String ID: W$\\%s\pipe\%s$\\.\$pipe
              • API String ID: 3208180658-1635615219
              • Opcode ID: 620c8e1b58bca11fb51f957a49d7dfca1b6795f404bdba8579dac565fb4a39fa
              • Instruction ID: d69c7274c0cbd21e258a8497390a5f4be93f3a6b75be8c51244c9bdcf7dc83b4
              • Opcode Fuzzy Hash: 620c8e1b58bca11fb51f957a49d7dfca1b6795f404bdba8579dac565fb4a39fa
              • Instruction Fuzzy Hash: 318150B6225B8593EBD09BB5E854B5AA3E2F7C4B84F504121EA5DCBBA4FF38C444C701
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: callocfree$DefaultSystem_vswprintf_c_l_vswprintf_s_lsprintf_sswprintf
              • String ID: #filename = %s$%s\$System$size,path
              • API String ID: 655534614-3779978915
              • Opcode ID: a47f6d8417c004511615c0a4f296ac74ec26502eda3269e0356b4e2cb928c628
              • Instruction ID: 4446af385c746a0bd5d573157200619aaaa29dcea73279742595a332309d6585
              • Opcode Fuzzy Hash: a47f6d8417c004511615c0a4f296ac74ec26502eda3269e0356b4e2cb928c628
              • Instruction Fuzzy Hash: 64616B32B01B50A6FB10CFA6E889B9D77B4F748B98F948126DE4D63B84DB78C549C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressProc$Library$CloseFreeHandleLoadOpenProcess
              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$psapi
              • API String ID: 3215039149-2992890082
              • Opcode ID: bff92e482877fc0ecc1334491efc711ba193bdf259a56558971da66b3f54dfd5
              • Instruction ID: c3ef3b7dc7a99c611e37a973ddb22f46553e91e31217f4d86fefa2719715029c
              • Opcode Fuzzy Hash: bff92e482877fc0ecc1334491efc711ba193bdf259a56558971da66b3f54dfd5
              • Instruction Fuzzy Hash: E6517F36B04E81A6EB34DF65E808ADA73B1FB89788F404125DE4D17B58DFB8C255CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Token_errno$CloseHandleInformationOpenProcess$AccountAllocHeapLookup_callnewh_invalid_parameter_noinfo_snwprintffreemalloc
              • String ID: %s\%s
              • API String ID: 1082786947-4073750446
              • Opcode ID: 1f9715dfa579afbc895f1de3a761c3dc12e32bbf97489d67a09c4987683b5d4b
              • Instruction ID: 0cde1761dc88420784d6d0b28406f8a168d613ca4ca489213e75ae3184f22241
              • Opcode Fuzzy Hash: 1f9715dfa579afbc895f1de3a761c3dc12e32bbf97489d67a09c4987683b5d4b
              • Instruction Fuzzy Hash: 7951B332B04B81A6EB21CFA6E844B9A73B0F785788F444126EA8C17F58DF78C245CB41
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: inet_addr$AddressHandleModuleProc$CreateEntryForward
              • String ID: GetBestInterface$GetIpInterfaceEntry$iphlpapi
              • API String ID: 2699733871-3963187488
              • Opcode ID: 95156e8d080c615f3872da4d588bf0f0e962b448d6bf0bd9f1096277d6db9593
              • Instruction ID: 46445e5db67676186039e8a1d6fa7b2a3f42bfffd6932a844192a30517ef2556
              • Opcode Fuzzy Hash: 95156e8d080c615f3872da4d588bf0f0e962b448d6bf0bd9f1096277d6db9593
              • Instruction Fuzzy Hash: 5E518E32A09B40DAE754CFA1F84869E77F4F788784F14412AEA9DA3B58DF78C554CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$Event$CreateSelectSocketclosesocketconnectgethostbynamehtonsinet_addrmalloc
              • String ID:
              • API String ID: 471021859-0
              • Opcode ID: 3733ca4a708ad8a4a8fa9b9e523cf3e307f05c70f64900cc74d456c1621f5916
              • Instruction ID: 6cc84f9e26e2f35e6ca24421f4267543d6123d0a81414ea15eb0872e9f24f204
              • Opcode Fuzzy Hash: 3733ca4a708ad8a4a8fa9b9e523cf3e307f05c70f64900cc74d456c1621f5916
              • Instruction Fuzzy Hash: BC517F32A05F40A7E794DFA5E858B5A73F4F748B90F004226EEA963B94EFB8C551C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
              • String ID:
              • API String ID: 4099253644-0
              • Opcode ID: b3a0e0396639249c71e9aa26cafc735f66f055ef20655c3ad1bc0635891ce98c
              • Instruction ID: 86a6e5c15ec0ccf86d65c5906c1a4d7d8640ad24b8a0ba218aa39454a244cb34
              • Opcode Fuzzy Hash: b3a0e0396639249c71e9aa26cafc735f66f055ef20655c3ad1bc0635891ce98c
              • Instruction Fuzzy Hash: 69311C35641B00A3FED99FF1E89DF6833A2BB94B94F581225E91A0E7A1DF3CC4408350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
              • String ID:
              • API String ID: 4099253644-0
              • Opcode ID: 7ef4d00cf1373484d145eca789713105cff272003fc2ab18a57462c4f5b4bff1
              • Instruction ID: 8682a4777160d712e96dfa7bcabd8c411a286956d5705de4d4579060c0c7d35a
              • Opcode Fuzzy Hash: 7ef4d00cf1373484d145eca789713105cff272003fc2ab18a57462c4f5b4bff1
              • Instruction Fuzzy Hash: FB31E973F16A41F5FE54ABD5E89DF6972B0BB88B90F091629DE19262E5CFEC84448200
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
              • String ID:
              • API String ID: 4099253644-0
              • Opcode ID: 6ba2539c76f53d1adbfad5b8b6b185f52b19deab08f80fcf734a4da2d236b371
              • Instruction ID: ed5f137eec9d6efdc3cdac389ce7941dd1841721a18164848a6b43ace4631ef4
              • Opcode Fuzzy Hash: 6ba2539c76f53d1adbfad5b8b6b185f52b19deab08f80fcf734a4da2d236b371
              • Instruction Fuzzy Hash: 283170B5E21B01F1FF54DFD6E85EBA523E0BB86B90F480219A919766D6CFECC4108391
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandlecallocmalloc$CreateMutex_snwprintf_sfreestrchr
              • String ID: W$\\%s\pipe\%s
              • API String ID: 110335666-3143433832
              • Opcode ID: 553465560d47cb8b1b4db5094ffc333addb07e77ad577b436cd6a9d095589ff6
              • Instruction ID: daace5740cc9dbb9b6c7a5dc5076cc6bd25683a19759815a6ef2ce7a183af83f
              • Opcode Fuzzy Hash: 553465560d47cb8b1b4db5094ffc333addb07e77ad577b436cd6a9d095589ff6
              • Instruction Fuzzy Hash: CBA12D32218B8193EBD0DBA5E458B6B67A2F7C4794F105125FA8E8BBD9DF7CC4458B00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID: /s /q:%d /p:0x%08X$\\.\pipe\%08X
              • API String ID: 0-3807318313
              • Opcode ID: 117abb5689a1162f575d2938e7a556432ab1682f49f688ad41d18977c0c4886d
              • Instruction ID: d96915203d8168fde58bba83ce8a11a7765ac2be246645b9c6a638670c6a66f4
              • Opcode Fuzzy Hash: 117abb5689a1162f575d2938e7a556432ab1682f49f688ad41d18977c0c4886d
              • Instruction Fuzzy Hash: 5F718072B08B81D6EB509FA5E858BEA77A1F789B84F444036DE4E57B54EFB8C445C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Internet$ErrorLastOpenOption$ConnectCrackfree
              • String ID: h
              • API String ID: 705787303-2439710439
              • Opcode ID: 33c072372aa5e3f7b67a84417e4798b09e3bc52e1f45e5ccf54b372d71b9b0ee
              • Instruction ID: ddfc3bf0af0d4eae3e263b531b290973f4fb8b5cc2ea4d0823a2f87c42922bfe
              • Opcode Fuzzy Hash: 33c072372aa5e3f7b67a84417e4798b09e3bc52e1f45e5ccf54b372d71b9b0ee
              • Instruction Fuzzy Hash: 0E713E76214B8593EBA0DBA6E458B5E77B1F3C5B84F504026EB9D87BA4DF79C804CB00
              APIs
              • LoadLibraryA.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544D880
              • GetProcAddress.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544D8B4
              • GetProcAddress.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544D8C7
              • GetProcAddress.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544D8DA
              • CloseHandle.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544D9FA
                • Part of subcall function 0000022DA544DE40: OpenProcess.KERNEL32 ref: 0000022DA544DE94
                • Part of subcall function 0000022DA544DE40: LoadLibraryA.KERNEL32 ref: 0000022DA544DEBD
                • Part of subcall function 0000022DA544DE40: GetProcAddress.KERNEL32 ref: 0000022DA544DEE1
                • Part of subcall function 0000022DA544DE40: FreeLibrary.KERNEL32 ref: 0000022DA544DFD4
                • Part of subcall function 0000022DA544DE40: FreeLibrary.KERNEL32 ref: 0000022DA544DFEA
                • Part of subcall function 0000022DA544DE40: CloseHandle.KERNEL32 ref: 0000022DA544DFF3
                • Part of subcall function 0000022DA544E1D0: OpenProcess.KERNEL32 ref: 0000022DA544E26C
                • Part of subcall function 0000022DA544E1D0: OpenProcessToken.ADVAPI32 ref: 0000022DA544E289
                • Part of subcall function 0000022DA544E1D0: GetTokenInformation.ADVAPI32 ref: 0000022DA544E2B1
                • Part of subcall function 0000022DA544E1D0: malloc.LIBCMT ref: 0000022DA544E2BD
                • Part of subcall function 0000022DA544E1D0: GetTokenInformation.ADVAPI32 ref: 0000022DA544E2EC
                • Part of subcall function 0000022DA544E1D0: LookupAccountSidW.ADVAPI32 ref: 0000022DA544E339
                • Part of subcall function 0000022DA544E1D0: _snwprintf.LIBCMT ref: 0000022DA544E362
                • Part of subcall function 0000022DA544E1D0: free.LIBCMT ref: 0000022DA544E36F
                • Part of subcall function 0000022DA544E1D0: CloseHandle.KERNEL32 ref: 0000022DA544E37E
                • Part of subcall function 0000022DA544D690: LoadLibraryA.KERNEL32 ref: 0000022DA544D6CB
                • Part of subcall function 0000022DA544D690: GetProcAddress.KERNEL32 ref: 0000022DA544D6EC
                • Part of subcall function 0000022DA544D690: OpenProcess.KERNEL32 ref: 0000022DA544D70B
                • Part of subcall function 0000022DA544D690: OpenProcess.KERNEL32 ref: 0000022DA544D723
                • Part of subcall function 0000022DA544D690: CloseHandle.KERNEL32 ref: 0000022DA544D757
                • Part of subcall function 0000022DA544D690: FreeLibrary.KERNEL32 ref: 0000022DA544D765
              • FreeLibrary.KERNEL32(?,?,00000000,0000022DA544CB25), ref: 0000022DA544DA03
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressOpenProcProcess$CloseFreeHandle$LoadTokenhtonl$Information$AccountLookup_snwprintffreemalloc
              • String ID: CreateToolhelp32Snapshot$Process32FirstW$Process32NextW$kernel32
              • API String ID: 1256634252-2095122823
              • Opcode ID: a3056155ee462b6e1d986dd5dae4f069db05b3049c3b0271eb61a607154bec56
              • Instruction ID: 57cc3d307b50259578ba1ff198170ac31f868efd987ebf2d4b8988eefbf41c27
              • Opcode Fuzzy Hash: a3056155ee462b6e1d986dd5dae4f069db05b3049c3b0271eb61a607154bec56
              • Instruction Fuzzy Hash: 7641B531B08B80A2EB64DF51F448B9AB3B4FB85790F444225DE8957B98EF7CC514CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Heap$Window$DestroyProcess$AllocClassFreeProcUnregisterfree
              • String ID: klwClass
              • API String ID: 3034228609-1480243690
              • Opcode ID: 8dbb3a2c6a82ea43f11baaa397c940cf2cf00c9ace1c0372393bc7d8e16c5198
              • Instruction ID: 3ca9217ffb3d424f0c5d7c423927368326cbc61f3e4a35f5bdd472366de24ba6
              • Opcode Fuzzy Hash: 8dbb3a2c6a82ea43f11baaa397c940cf2cf00c9ace1c0372393bc7d8e16c5198
              • Instruction Fuzzy Hash: 61419472A04740D2F7508FA6F84CB5A73A1F785BA4F444115EA5A63BA8DFFCC885C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastVirtual$FreeObjectSingleWait$AllocCloseCodeExitHandleMemoryProcessProtectThreadWrite
              • String ID: @
              • API String ID: 992791723-2766056989
              • Opcode ID: 9745304e536a44517992c02e6ae44f583c05c5267b49eb1c911084eeea82ab8a
              • Instruction ID: c5dd50d524299b1ef80f002ab2af89524066aa957b4a6a1c8cf16770d9c3f5cc
              • Opcode Fuzzy Hash: 9745304e536a44517992c02e6ae44f583c05c5267b49eb1c911084eeea82ab8a
              • Instruction Fuzzy Hash: 9C318F75B18B40A3FB548BA6B448B5E63A1F789BC4F445112EE8963F98DFBDC405CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: HandleModule$AddressProc
              • String ID: CloseHandle$GetProcAddress$NtReadVirtualMemory$OpenProcess$VirtualQueryEx$kernel32.dll$ntdll.dll
              • API String ID: 1883125708-309972381
              • Opcode ID: f2dd72bdfa2d576fbe2b819714bf4892a22e019f6116347ace411b7de699153d
              • Instruction ID: 16a6e341be8598e0a45290cf44b75fe015c6d7984be3767c8a4b2f4a203e1157
              • Opcode Fuzzy Hash: f2dd72bdfa2d576fbe2b819714bf4892a22e019f6116347ace411b7de699153d
              • Instruction Fuzzy Hash: 0C21D5B1E02F01E2FF49DB99E89AB9523A4BB993A0F440465C50EA2370EEBCC546C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: htonl$callocfreehtons$CreateGuidrealloc
              • String ID:
              • API String ID: 1971261790-0
              • Opcode ID: 35328afc6ea19eb22ab25f0db4b4a4a5eeef8f9253434140f4e37320bd541843
              • Instruction ID: a007271856f6eb46e235f56718a267fd83701ffa3d150be4b640f72c031f3925
              • Opcode Fuzzy Hash: 35328afc6ea19eb22ab25f0db4b4a4a5eeef8f9253434140f4e37320bd541843
              • Instruction Fuzzy Hash: 0502E176315BC49AEBA0CB6AE49479A77A1F7C8B84F104025EE8D8BB95DF7DC441CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorEventLastResetSleepaccept
              • String ID:
              • API String ID: 3917514729-0
              • Opcode ID: 45f8e4729edac4815a2f6e68c02a4714ce222c2d91d748c8d59c1fef3e5a756f
              • Instruction ID: 6e969f717d20eb45dc44d9120f95e6db6880c93a85aeddfb8153b76663fc61f8
              • Opcode Fuzzy Hash: 45f8e4729edac4815a2f6e68c02a4714ce222c2d91d748c8d59c1fef3e5a756f
              • Instruction Fuzzy Hash: 5F619C76B04B90D3DB10CFA2E448A5E73A1F789B91F504126DE8D53B64EF78C899DB00
              APIs
              • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383771F
              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383772A
                • Part of subcall function 0000022DA3837538: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA3837544
                • Part of subcall function 0000022DA3837538: HeapFree.KERNEL32(?,?,?,?,?,?,?,?,0000022DA3837240), ref: 0000022DA38376CB
              • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383777C
              • HeapReAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA383780D
              • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA3837862
              • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA38378A0
              • DuplicateHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA3837916
              • lstrcmpW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA3837963
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA3837974
              • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA3837994
              • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000022DA3837403), ref: 0000022DA38379A6
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Heap$Free$AllocProcess$Handle$CloseCurrentDuplicatelstrcmp
              • String ID:
              • API String ID: 454806775-0
              • Opcode ID: 2488a5446417644ff92a72a24b515ad9633fc2793d0f775129e35f4bc9837350
              • Instruction ID: 1c34ca492dde0cde49f1841f825429160e301b5e82b89a5af72bd29b8c03389d
              • Opcode Fuzzy Hash: 2488a5446417644ff92a72a24b515ad9633fc2793d0f775129e35f4bc9837350
              • Instruction Fuzzy Hash: 2B81EF36208B8197E794CBB5E44871AB7A2F7C57A4F100315EAA98BBE8DF7DC445CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$Free$Global$ErrorHeapLast_errno
              • String ID:
              • API String ID: 3612544453-0
              • Opcode ID: e56d95e6cced8005007d1aa96881f317c93609c1f593c9dfa816aee0a74d4e78
              • Instruction ID: cd089afaf2eb333cd972b634acf8bd9be0ad98d1f4257702767e151df1634cf3
              • Opcode Fuzzy Hash: e56d95e6cced8005007d1aa96881f317c93609c1f593c9dfa816aee0a74d4e78
              • Instruction Fuzzy Hash: 6B61A836204B8892EB649B5AE09875E77B1F3C9B88F510115EA8D4BBB5CF7DC984CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: htonl$free$FreeLocalmalloc
              • String ID: stdcall
              • API String ID: 2516199367-1361542064
              • Opcode ID: f15c183f755dc4f0a415eb9a863517f708337400485c861036c74f7c0c8950ae
              • Instruction ID: 146ded6d32a9d3d49bb48cfc848a906ec01cbef91fcac0088e31ae7941fcdab9
              • Opcode Fuzzy Hash: f15c183f755dc4f0a415eb9a863517f708337400485c861036c74f7c0c8950ae
              • Instruction Fuzzy Hash: D4C16E72B05B549AEB50CFA5E84479E77F4F788788F100129EA8E97B58EF78C505CB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID: tcp$udp
              • API String ID: 0-3725065008
              • Opcode ID: 8a6a6b2c3d467e265fac096d79c7ce88cb79eecba16b540dbe755735aaa90b4f
              • Instruction ID: 6c8046ea2aff608da06af37f40a93fc58c71dc30b3cd321003e64acda980063d
              • Opcode Fuzzy Hash: 8a6a6b2c3d467e265fac096d79c7ce88cb79eecba16b540dbe755735aaa90b4f
              • Instruction Fuzzy Hash: 2081F77AA48A4063FBB5CB95D448B3A72F1FB94784F148125FD9AA33D1EFB8C8459340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: wcschr$_snwprintf_scallocwcsstr
              • String ID: W$file error$or distance symbols$th repeat
              • API String ID: 1285598317-45051827
              • Opcode ID: 0041cb5a921969245a448dec0870fe31d8be99eeb76132152970262b18651a7d
              • Instruction ID: 59e90836cfabbca60e75e79d571a255a45a4e17120079acc070641b642dd3f14
              • Opcode Fuzzy Hash: 0041cb5a921969245a448dec0870fe31d8be99eeb76132152970262b18651a7d
              • Instruction Fuzzy Hash: 39815532325B8593EBD09BA9E454B6EA7E2F784BC4F105121EA5DCB7A4EF39C404CB00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID: 65535$udp
              • API String ID: 0-1267037602
              • Opcode ID: bdc2e146fa44cced18160ef7e12183dd69a4a8af94f1715aa0ed718e9f6321dc
              • Instruction ID: 150caa599f309187f25c63caf57a7a0051796c6d5b182edc7866989579228aa5
              • Opcode Fuzzy Hash: bdc2e146fa44cced18160ef7e12183dd69a4a8af94f1715aa0ed718e9f6321dc
              • Instruction Fuzzy Hash: 2361D335A59680A7FF658BD5F10CB7A66E0F744B94F484212EE8927BD8DBB8C8C1D700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Free$Global$Library$AddressErrorLastLoadProc
              • String ID: WinHttpGetIEProxyConfigForCurrentUser$Winhttp.dll
              • API String ID: 1134048670-1089090160
              • Opcode ID: 4ab3733783c7517397c3ab6066e0788fcb382b80222af4e0e706d9bb7a6af0d2
              • Instruction ID: 07731c13f4000898a689cc55f9bba92e607137cf1384ad4dc0d22d713243c0e3
              • Opcode Fuzzy Hash: 4ab3733783c7517397c3ab6066e0788fcb382b80222af4e0e706d9bb7a6af0d2
              • Instruction Fuzzy Hash: DC315E75B04B80D3EB449B92E948A6E6761FBC9FD0F445066EE4E63B24DFB8C445C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
              • String ID: eax
              • API String ID: 781512312-2472899377
              • Opcode ID: aaebb8aec4a04de5942977555aeb765d9ec2d510871fe3df0c9bab814b5452b9
              • Instruction ID: 622d713994a843c4327c9daa0f072936b97290929e8bf7662a1a41f4241966c0
              • Opcode Fuzzy Hash: aaebb8aec4a04de5942977555aeb765d9ec2d510871fe3df0c9bab814b5452b9
              • Instruction Fuzzy Hash: 0B213D71F04BC4B6FF245BE1958CB6962A0A744BD0F144121E6992BFDEDBECC951CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressErrorLastProc$HandleModule
              • String ID: NtWow64ReadVirtualMemory64$RtlNtStatusToDosError$ntdll.dll
              • API String ID: 3725234143-3639149031
              • Opcode ID: eda5e5130f3b9bdebbbc96bdf620070caff5edc733c6bb22cdced1767e66f3df
              • Instruction ID: 6dbf3187061e4bc2b5d4484a6d65f907f534cba70063115408a71881190ec32d
              • Opcode Fuzzy Hash: eda5e5130f3b9bdebbbc96bdf620070caff5edc733c6bb22cdced1767e66f3df
              • Instruction Fuzzy Hash: 99113635B14B41A6EB149BE2F848B6DA3A1F7C8BC4F490929DE4A57794DFBCC9058700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$Startupgetaddrinfo
              • String ID:
              • API String ID: 54629767-0
              • Opcode ID: 227d07e7736da2bb0a1f16444392481382468d40b52e13d93a013c90c0eee2ef
              • Instruction ID: 550a519db886ad99cf2da9aaa3cd9d52f10527a21f7415a87d9b98a37cde5607
              • Opcode Fuzzy Hash: 227d07e7736da2bb0a1f16444392481382468d40b52e13d93a013c90c0eee2ef
              • Instruction Fuzzy Hash: DE510072218A8097D7A0DFB5E448B5EB7B1F788794F140215EAAA87BA8DF3DC544CF01
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CloseErrorHandleLastOpenProcess
              • String ID:
              • API String ID: 3453201768-0
              • Opcode ID: 7d3c404eb6caa059cd6b0fd9f879b38e38fb9a643e6d5aa9ce91def77071903c
              • Instruction ID: 0d37b62ed153b3162b1c9932d87051f9def7f984684425d5cbaf8a43fd347264
              • Opcode Fuzzy Hash: 7d3c404eb6caa059cd6b0fd9f879b38e38fb9a643e6d5aa9ce91def77071903c
              • Instruction Fuzzy Hash: 01316336F04B40A6EB409BE2A848B6A63A1F789FD5F045025ED8B63758EFBCD8058740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: callocmalloc$_snwprintf_sfreestrchr
              • String ID: W$invalid block type
              • API String ID: 1326561468-4266031648
              • Opcode ID: 8e8b489e526d1fe2fd4891168b032f20f3a221e91aaea9411026d74f6647621a
              • Instruction ID: f9667fcbe04a9f579e7338a05cff7a3a17a5eb0319c10c0fff42a6f84b2a830b
              • Opcode Fuzzy Hash: 8e8b489e526d1fe2fd4891168b032f20f3a221e91aaea9411026d74f6647621a
              • Instruction Fuzzy Hash: BEA15032214B81A3EBD0CB59E498B5A77A2F7C4794F105125FA8E8BBD9DF78C485CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Create$ErrorLast$EventNamedPipe
              • String ID: SeSecurityPrivilege
              • API String ID: 791494041-2333288578
              • Opcode ID: 7238216fa8bfb80d0fb6e22e86afc1dfdafb4e9ad41a8ce211c5c9cfe9337d0c
              • Instruction ID: d6f4eca69d0612ae840c2c3dddd52e33a696067262a5ecb6434f9f79330d2835
              • Opcode Fuzzy Hash: 7238216fa8bfb80d0fb6e22e86afc1dfdafb4e9ad41a8ce211c5c9cfe9337d0c
              • Instruction Fuzzy Hash: 8E518432214A8197E7E0CB74F458B9B77A1F384794F504226EA998BBD4DF7DC545CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$_errnohtons$AllocErrorHeapLastTable_callnewhmallocrealloc
              • String ID: tcp
              • API String ID: 3667466247-2993443014
              • Opcode ID: f61868a484e89f093b37f0acc60c2d6a8b497917efa129030727d4f45dfd85be
              • Instruction ID: 77325c87191b622096cc3bed2ce19d683714e4cf0d0a7a69ce20c9be04b0d8f3
              • Opcode Fuzzy Hash: f61868a484e89f093b37f0acc60c2d6a8b497917efa129030727d4f45dfd85be
              • Instruction Fuzzy Hash: B041D332B40684A7D714DF92E448BAD77B0F344B84F80542ADE5AA3B85EFB8D545CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AllocMemoryProcessVirtualWrite$AddressHandleModuleProc
              • String ID: NtLockVirtualMemory$ntdll
              • API String ID: 1502369038-2974287352
              • Opcode ID: ffdf16f4be959fbba581d0a970159e71194f7cce151e50d95d987598bd5584b6
              • Instruction ID: 20f4e4dc143c59b3b7295606c599be21e24733e98966a13b2752428680d10d98
              • Opcode Fuzzy Hash: ffdf16f4be959fbba581d0a970159e71194f7cce151e50d95d987598bd5584b6
              • Instruction Fuzzy Hash: 1451FC76615B84C7CB90CB59E09475AB7A1F3C8BA0F101216EFAE47BA8CF79C445CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorEventLastResetSleeprecvfrom
              • String ID: 0.0.0.0
              • API String ID: 2877576581-3771769585
              • Opcode ID: e829768a542569bcba86cc34f543e2bdc0c756bbfb874fd027a9c235bc169f16
              • Instruction ID: 92fe4747a455d8382f3641c10b8da01cf8fab5fdad3f45e32ba5c8a8179486f2
              • Opcode Fuzzy Hash: e829768a542569bcba86cc34f543e2bdc0c756bbfb874fd027a9c235bc169f16
              • Instruction Fuzzy Hash: AC416172504B81DAD7208F61F4487AAB7F4F78A794F504226EA8D63B58DFBCC594CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$AddressCreateHandleModuleProcRemoteThread
              • String ID: RtlCreateUserThread$ntdll
              • API String ID: 1699155657-687317052
              • Opcode ID: c8ba533d1ca9a2a55e49f07b6cc1bdd2cf2805416945380d613a0e33ef05ffd3
              • Instruction ID: 15d2369e17855690db49279f479c1c0e6e479a8d16ac73c7e26e6580b7136640
              • Opcode Fuzzy Hash: c8ba533d1ca9a2a55e49f07b6cc1bdd2cf2805416945380d613a0e33ef05ffd3
              • Instruction Fuzzy Hash: 3E510B32108B84DBE7E0CBA5F448B5AB3B6F788754F504125DA8D86BA8DF7DC488CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Message$ClassCreateDispatchRegisterTranslateWindow
              • String ID: P$klwClass
              • API String ID: 2143098044-3097189138
              • Opcode ID: 0c1b0a1ee8904fd3c41a36f6768f220812905632bc2d4d8ac1e0421799b14281
              • Instruction ID: 8cbac3cbd3f22594ca48f74a05cf5e17d7d68bdd26c8e65503299ce8b1ad9667
              • Opcode Fuzzy Hash: 0c1b0a1ee8904fd3c41a36f6768f220812905632bc2d4d8ac1e0421799b14281
              • Instruction Fuzzy Hash: D0316F36A04BC5E2EB608FA4F849B9A73A0F785354F845126D79E63A94DFBCC448CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadOpenProcProcess$CloseHandle
              • String ID: IsWow64Process$kernel32.dll
              • API String ID: 2823223814-3024904723
              • Opcode ID: 84a970f75d5c5ef737604439012858902f14e4dd04343173b399e5aff72e2a80
              • Instruction ID: ad9ff8d7ecf37c1a11445912257df750a327b935d2e89d72ad2dada79acf8da8
              • Opcode Fuzzy Hash: 84a970f75d5c5ef737604439012858902f14e4dd04343173b399e5aff72e2a80
              • Instruction Fuzzy Hash: 3D218135B05B00A3FB159BA6A858B16B3F1BB49BE1F444429DE4D63B94EFBCC845C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressCountErrorFreeLastLoadProcTick
              • String ID: GetLastInputInfo$user32
              • API String ID: 1606095281-2537165897
              • Opcode ID: 03c13e3c6eb630e53ab5b9de262b23798b5969459d683dd310e89929cd089e05
              • Instruction ID: 1b85f2d57a159254babbadc27614e8f615baed3f737adba084883b8ba063c751
              • Opcode Fuzzy Hash: 03c13e3c6eb630e53ab5b9de262b23798b5969459d683dd310e89929cd089e05
              • Instruction Fuzzy Hash: 60216036A04B50E6EB559FE6F848B6D67A0FB89FD0F484061DD0AA3754EFB8C809C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: rand$_snwprintf_s$ErrorLast
              • String ID: Global\%04x%04x
              • API String ID: 2358640472-448994476
              • Opcode ID: 644bd0954b7540b35416f8d1993d22ba7b2ed189cd74b5cf0a3f9630fd6cde91
              • Instruction ID: 87f217ef4ee1b434619ebcbc00509cff1f5be647f97caa9afc6f8e89b6326fa3
              • Opcode Fuzzy Hash: 644bd0954b7540b35416f8d1993d22ba7b2ed189cd74b5cf0a3f9630fd6cde91
              • Instruction Fuzzy Hash: DD11BC32E00740A7EB28DFE4E408599B7A0F7893B0F500B22EB7853AD5EB78D121CB04
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: rand$_snwprintf_s$ErrorLast
              • String ID: Global\%04x%04x
              • API String ID: 2358640472-448994476
              • Opcode ID: 1d9bff088a8ba95a953a715d2d79c325a85283e0cd682b1939a3398df1056525
              • Instruction ID: 77039f709bf635f872c974021abb020eea695d6e102f83073b99aa0acd1c4dfb
              • Opcode Fuzzy Hash: 1d9bff088a8ba95a953a715d2d79c325a85283e0cd682b1939a3398df1056525
              • Instruction Fuzzy Hash: A2119E32E04740A7EB28DFE4E509599B7A0F7893B4F500B22EB7853AD5EB78D521CB04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno
              • String ID:
              • API String ID: 2288870239-0
              • Opcode ID: e56d95e6cced8005007d1aa96881f317c93609c1f593c9dfa816aee0a74d4e78
              • Instruction ID: 330183463e4ae81b0f2a51c659e7c5a376ce0ff94d8f0aece14e207c8f552685
              • Opcode Fuzzy Hash: e56d95e6cced8005007d1aa96881f317c93609c1f593c9dfa816aee0a74d4e78
              • Instruction Fuzzy Hash: 7C615937204B8892EBA09B49E098B5E67B1F3C9F98F950115EA8D4B7B5CF7DC944CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: htonl$freemalloc
              • String ID:
              • API String ID: 1249573706-0
              • Opcode ID: 2a272634d5d3f3d0f97d8cf137b80c410468859dee72902612bf31cb963d6281
              • Instruction ID: 997214a07feda7df80e2d926f896f4acedf4c8d18e4b7f2ab90c28a51cbe3ec8
              • Opcode Fuzzy Hash: 2a272634d5d3f3d0f97d8cf137b80c410468859dee72902612bf31cb963d6281
              • Instruction Fuzzy Hash: 25D1DD32218B8597EBB0CB79E49471AB7E1F785B88F104515EA8D877A8DF7DC845CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: htonssocket$ErrorLastStartup
              • String ID:
              • API String ID: 115665238-0
              • Opcode ID: 180ef382919a3d1acd9061d190789caf16d27d410f500d146d518d6bec267e83
              • Instruction ID: dc1a32ee91b433d572980208b540abff069845a12a7ab5061286f8569ea4faf4
              • Opcode Fuzzy Hash: 180ef382919a3d1acd9061d190789caf16d27d410f500d146d518d6bec267e83
              • Instruction Fuzzy Hash: 995174322186C097E7D08FB5F48875AB3A1F784754F504125EAAA8BBE8EF7DC444CB01
              APIs
              • OpenSCManagerA.ADVAPI32(?,?,?,?,?,?,?,?,00000000,0000022DA54B2B92), ref: 0000022DA54B5A65
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000022DA54B2B92), ref: 0000022DA54B5A73
              • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000,0000022DA54B2B92), ref: 0000022DA54B5AFA
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$ManagerOpen
              • String ID:
              • API String ID: 239337868-0
              • Opcode ID: 95beb3b2230f5ec1893a4063b74f4c1d6fa9daeb2c7f94bb601b3d8c0e38e1e8
              • Instruction ID: 8b4927c01518f0fcf2bd021f6f01ac20efe83f17c5cddcf15b815bd6a7aa25c2
              • Opcode Fuzzy Hash: 95beb3b2230f5ec1893a4063b74f4c1d6fa9daeb2c7f94bb601b3d8c0e38e1e8
              • Instruction Fuzzy Hash: 88215375B05B4097EB549BA7B4887ADA3E1F78DBC0F144428DD4EA3755EEBCC4458B00
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: m
              • API String ID: 0-3775001192
              • Opcode ID: ca8c69a8187a3bcae796801e3bab1b2ea4095d4477118f32287b109b45a345bb
              • Instruction ID: 573a4cffd4b8b5b511f74690e607a57ac9078fd41df8fda671c1dcf0ed3af0e4
              • Opcode Fuzzy Hash: ca8c69a8187a3bcae796801e3bab1b2ea4095d4477118f32287b109b45a345bb
              • Instruction Fuzzy Hash: B6023772224B81A3EBD0DB5AE498B5B77A1F7C4B94F105025EE8E8BB95DF79C450CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$_errno
              • String ID:
              • API String ID: 2288870239-0
              • Opcode ID: b3a0e0396639249c71e9aa26cafc735f66f055ef20655c3ad1bc0635891ce98c
              • Instruction ID: 39c83936ee8d50721cbb2db46fb5a53853313d54050fbcc3dad824321c6e9fca
              • Opcode Fuzzy Hash: b3a0e0396639249c71e9aa26cafc735f66f055ef20655c3ad1bc0635891ce98c
              • Instruction Fuzzy Hash: 7C312172251A00B3FED49BE1E8ADF686393BF56BA1F680225DD190E2D5DF6CC841C350
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$_errno$AllocErrorHeapLastTable_callnewhhtonsmallocrealloc
              • String ID: udp
              • API String ID: 2504828188-4243565622
              • Opcode ID: 7c111bcc891aae01d2795fd6a096e7e894eefa60fd81042b3bb89e12185893e1
              • Instruction ID: 5c552fa16c91515dec86befc3f77d924d94522f1666a0499dcb81a46079f6fd3
              • Opcode Fuzzy Hash: 7c111bcc891aae01d2795fd6a096e7e894eefa60fd81042b3bb89e12185893e1
              • Instruction Fuzzy Hash: B3310672B04601A3EB14DFAAD484B6D77B0FB81BC4F504013EB4AA7A95DEBDC582C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorInternetLast$CloseHandleHttpOpenOptionRequest
              • String ID: GET$POST
              • API String ID: 4051435859-3192705859
              • Opcode ID: 18a1c17c92d67c5bc78f73a82bb78b312b9f4e99f9b287d919cf0d77241c95f0
              • Instruction ID: ee4be3db5fe9a001538339f268cb5d0092ebf25d29088fe465731b5ea4c52697
              • Opcode Fuzzy Hash: 18a1c17c92d67c5bc78f73a82bb78b312b9f4e99f9b287d919cf0d77241c95f0
              • Instruction Fuzzy Hash: 7931FD71208B4197E7A09BBAE44871AB7F1F384784F600425FB998BBA5DF7DC444CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$CloseHandleLibrary$AddressFreeLoadProcResumeSleepThread
              • String ID: ntdll
              • API String ID: 3576214877-3337577438
              • Opcode ID: 403e551419c628f99cc31a171c1a46ec7f9be7557ec6651a45e369247712ff5e
              • Instruction ID: f55474a93163215b4a2f0a5c0743c53c365ecef6098391110a0c46038af3e61c
              • Opcode Fuzzy Hash: 403e551419c628f99cc31a171c1a46ec7f9be7557ec6651a45e369247712ff5e
              • Instruction Fuzzy Hash: 6B31DC32118A80A7F7E1ABB4F45DB9AA3B2F785B51F100425E6564F9E9DF7DC884CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: calloc$CreateMutexQuery_Sleepmalloc
              • String ID:
              • API String ID: 2566062573-0
              • Opcode ID: 02d003f3f96ad69e172ef291a3a705bbe318c9c5b08e0f1a69475a33c14c482c
              • Instruction ID: db1b02dd42fdcfc16782bdcf3149e5969904201057d3709b807b99b25774acba
              • Opcode Fuzzy Hash: 02d003f3f96ad69e172ef291a3a705bbe318c9c5b08e0f1a69475a33c14c482c
              • Instruction Fuzzy Hash: E5022132218B8482EBA4CBA9F09579AF7A5F7C4784F145126EACD47BA8DF7CC444CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: LibraryProcess$AddressCurrentFreeLoadProcSession
              • String ID: ProcessIdToSessionId$kernel32.dll
              • API String ID: 4183634105-3889420803
              • Opcode ID: 456a6c6571a6df7f83d5e704301de544e869e40563afcb8a3ee8e0387a2ff7e8
              • Instruction ID: bd5944b7a954e7ed21715839e114478a0968a44cda924e221867b9bcc2fc554a
              • Opcode Fuzzy Hash: 456a6c6571a6df7f83d5e704301de544e869e40563afcb8a3ee8e0387a2ff7e8
              • Instruction Fuzzy Hash: 5611C931109A00A3E7F0DBB4E85CB1967A2F7887A8F540216D59A4AAE4DF7DC688CB05
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: memcpy_s$malloc
              • String ID:
              • API String ID: 569202530-0
              • Opcode ID: 791ac2ae2d82ca95529055ff973a2c55020dc980d904afdb92c923bb69812a5e
              • Instruction ID: aec2117ca39441ca1034eaef3f84807331b2492968a2fc37dfdc3350e33c82be
              • Opcode Fuzzy Hash: 791ac2ae2d82ca95529055ff973a2c55020dc980d904afdb92c923bb69812a5e
              • Instruction Fuzzy Hash: 5CD1E836205B8597EBE0CB6AE894B5A77B6F7C8B84F104025DE8D87B64EF39C445CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$AllocHeap_callnewhfreemalloc
              • String ID:
              • API String ID: 3198430600-0
              • Opcode ID: 9d6147f037978411f4800d7c51e4620988c43bb1becd94e135de29eb6841a8be
              • Instruction ID: 4285a2b81e43d008750eed88777863123bb40270115888ca7f251adb8303628e
              • Opcode Fuzzy Hash: 9d6147f037978411f4800d7c51e4620988c43bb1becd94e135de29eb6841a8be
              • Instruction Fuzzy Hash: F851D876618A808BD794CF69E49871AB7B2F7C8784F105115FB8A87BA8DB7DC841CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$_write$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty_lseeki64
              • String ID:
              • API String ID: 2111832858-0
              • Opcode ID: a3dcbf415939440a01c2dd42564492f14041436682ecc8e408ae045f9c6a1700
              • Instruction ID: 694048b1d733be316c168e2b837b1b9198091fb01ecd1e3847673db829792419
              • Opcode Fuzzy Hash: a3dcbf415939440a01c2dd42564492f14041436682ecc8e408ae045f9c6a1700
              • Instruction Fuzzy Hash: 47413773E00B44AAEF689FB8C449B6D37A0E744F94F164215DA69573CADBF8C842C780
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$_write$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty_lseeki64
              • String ID:
              • API String ID: 2111832858-0
              • Opcode ID: 21b63f15d3f5de9f638b1b9050342a8e5a65464ee0539fbe78a82d087f4768c0
              • Instruction ID: c96630443d2d8cc98cd8a4a39e5155ad5ba3281354dc9ed5426cdf35e34d215e
              • Opcode Fuzzy Hash: 21b63f15d3f5de9f638b1b9050342a8e5a65464ee0539fbe78a82d087f4768c0
              • Instruction Fuzzy Hash: 60417DB2E01781A6FB288FB8D459B6D3FA0E744BA4F144506DA59573DAEBF4C841CB80
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::___ascii_memicmp_getptd_noexit
              • String ID:
              • API String ID: 2223695500-0
              • Opcode ID: 97b4f2eea6f79403af2afcac34ffac110fbd954abfc93d9417f3026149c9da6a
              • Instruction ID: 6de98dfdd8a3731770e3f3694b3f748989d32483b3ea19e68b3b0346d005c5c9
              • Opcode Fuzzy Hash: 97b4f2eea6f79403af2afcac34ffac110fbd954abfc93d9417f3026149c9da6a
              • Instruction Fuzzy Hash: A6314672F04B80A2FB255FD1954CB697690A755BE0F444121EA992BFDADAF4C881C700
              APIs
              • OpenSCManagerA.ADVAPI32(?,?,?,?,?,?,?,?,?,?,00000000,0000022DA54B30D7), ref: 0000022DA54B5D00
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,0000022DA54B30D7), ref: 0000022DA54B5D0E
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastManagerOpen
              • String ID:
              • API String ID: 2571844144-0
              • Opcode ID: 7df33f87488dc4f949f2feb23e6a6e399e59ce3288290a8b526d959b48c7d65c
              • Instruction ID: f81833eb761acef2c06a5a71c5818dab7dbff248f23750347214811a6d9ddf79
              • Opcode Fuzzy Hash: 7df33f87488dc4f949f2feb23e6a6e399e59ce3288290a8b526d959b48c7d65c
              • Instruction Fuzzy Hash: CC217F35B04B40A3EB64DB93A44CA59A3E5F788BD0F048125EE4E63B54EF78C946CB00
              APIs
              Strings
              • internal error: entered unreachable code/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\alloc\src\vec\mod.rs, xrefs: 00007FF6EF713CA0
              Memory Dump Source
              • Source File: 00000000.00000002.3274803182.00007FF6EF711000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6EF710000, based on PE: true
              • Associated: 00000000.00000002.3274791073.00007FF6EF710000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274820997.00007FF6EF728000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274835833.00007FF6EF730000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3274847356.00007FF6EF731000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6ef710000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$EnvironmentVariable
              • String ID: internal error: entered unreachable code/rustc/90b35a6239c3d8bdabc530a6a0816f7ff89a0aaf\library\alloc\src\vec\mod.rs
              • API String ID: 2691138088-2475256114
              • Opcode ID: 9166a29505e64e3f652031e0a8747539a2815ac7f729185c84f2e6a5a26c7759
              • Instruction ID: 0265f7c131b8b81052c880ef28e52e07ea9dc02f4f94f39e4d0219dd1d4bbb69
              • Opcode Fuzzy Hash: 9166a29505e64e3f652031e0a8747539a2815ac7f729185c84f2e6a5a26c7759
              • Instruction Fuzzy Hash: 2FA1BEABB04AC186EF708F25E8543E97364FB44B98F048135DE5C9B788DF3AD2998305
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$FreeLocal
              • String ID: FormatMessage failed to retrieve the error.$The operation completed successfully.$stdcall
              • API String ID: 3870799717-2326785561
              • Opcode ID: a57a6a84259da3e3b4a187ddbe449388bc614ac268b137e907607f846155ba36
              • Instruction ID: b0dddac2db38a2e953f0110a7c7e0d5957c9b421a283ef2563d7df9745a65b02
              • Opcode Fuzzy Hash: a57a6a84259da3e3b4a187ddbe449388bc614ac268b137e907607f846155ba36
              • Instruction Fuzzy Hash: 25813C32B01B41EAEB54CFA6E848BAD33B5F748B88F554025DE0A67B58EF78C915C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfo_read_nolockmemcpy_s
              • String ID:
              • API String ID: 1864104905-0
              • Opcode ID: e175e0269d499a9dc307894f1e64a10e3b5424bde7628e97d882a694a69ea387
              • Instruction ID: d20389d924d7f9c5eb781a11b7a08affe2aa3fdec2d674a69dd1a54fe2c39d09
              • Opcode Fuzzy Hash: e175e0269d499a9dc307894f1e64a10e3b5424bde7628e97d882a694a69ea387
              • Instruction Fuzzy Hash: FA511631F0C350A2FA689BE65508F6E7691B754BF0F148715AE7963FD6CBB8C8918380
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: strrchr$HandleInformationWcsftimestrstrstrtoxl
              • String ID: tcp
              • API String ID: 2499446636-2993443014
              • Opcode ID: ac5a7b3bf22963c6c55a7b8110cb3e4a829b79b4f665ff11e6ad51071bdcefb7
              • Instruction ID: 6d6aab429a0f17c2c3a1eee0abdd05ea26f7618694ecc6ff27ec3857edfc4c31
              • Opcode Fuzzy Hash: ac5a7b3bf22963c6c55a7b8110cb3e4a829b79b4f665ff11e6ad51071bdcefb7
              • Instruction Fuzzy Hash: 2A513F36218B8196DBD0DBA9E49875EA7A1F3C5784F504022EA8D8BBA9DF3DC501CB01
              APIs
              • malloc.LIBCMT ref: 0000022DA3822B06
                • Part of subcall function 0000022DA3837A78: _FF_MSGBANNER.LIBCMT ref: 0000022DA3837AA8
                • Part of subcall function 0000022DA3837A78: _NMSG_WRITE.LIBCMT ref: 0000022DA3837AB2
                • Part of subcall function 0000022DA3837A78: HeapAlloc.KERNEL32(?,?,00000000,0000022DA3840CB0,?,?,?,0000022DA3840F14,?,?,?,0000022DA3840E13), ref: 0000022DA3837ACD
                • Part of subcall function 0000022DA3837A78: _callnewh.LIBCMT ref: 0000022DA3837AE6
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AF1
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AFC
              • malloc.LIBCMT ref: 0000022DA3822B15
                • Part of subcall function 0000022DA3819F40: GetSystemTime.KERNEL32 ref: 0000022DA3819F49
                • Part of subcall function 0000022DA3819F40: SystemTimeToFileTime.KERNEL32 ref: 0000022DA3819F59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Time_errno$System_callnewhmalloc$AllocFileHeap
              • String ID: cli=$dns://$ns=$req=$sid=
              • API String ID: 2355090500-3157712289
              • Opcode ID: a96a5186951360d153b2f89db9aba4dfebfd2983d2da8990e749ac8ea00b17d6
              • Instruction ID: d15c47d50900f3f6bb16c252a840e4401363a5c9a515864eb2136e3b83e01982
              • Opcode Fuzzy Hash: a96a5186951360d153b2f89db9aba4dfebfd2983d2da8990e749ac8ea00b17d6
              • Instruction Fuzzy Hash: DA514D76204F8592DBA0DFA6E49465EB7A2F7CCB98F404116EA9D8B764DF3CC205CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
              • String ID:
              • API String ID: 1573762532-0
              • Opcode ID: 911eb1c644a15632e93f9d54052e329041cf35298d92e9b3167444eb104fdd5f
              • Instruction ID: b197e452161d1f1d57429f7b38f1ed18d454746884e9641215bc3e6984761fac
              • Opcode Fuzzy Hash: 911eb1c644a15632e93f9d54052e329041cf35298d92e9b3167444eb104fdd5f
              • Instruction Fuzzy Hash: 31413872E08293E5EF64ABA19548BB972E0F740B95F884012EAD477AC6DBA8C941C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$AddrAllocErrorHeapLastTable_callnewhfreemallocrealloc
              • String ID:
              • API String ID: 3247216186-0
              • Opcode ID: 365049d967d77c2c3ac8918f0fbf4aa35973a8c3d2a27438d0569ac3083d7926
              • Instruction ID: b96624295dda5eb24b70e7ad45336ea69cbe8f1f211174b61840ef3b74b7cb4a
              • Opcode Fuzzy Hash: 365049d967d77c2c3ac8918f0fbf4aa35973a8c3d2a27438d0569ac3083d7926
              • Instruction Fuzzy Hash: 1B4190B2B00B95E3EB649B92E408B9E2364F789F94F404021DE4927B58EF7CC647CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
              • String ID:
              • API String ID: 781512312-0
              • Opcode ID: 541cce3268000b5e58aa52ce81f3fb818dd6c461a068b5e465468edd5535fa61
              • Instruction ID: da2fc882f6be222245b1220d1e3ab6384722708226b1ce7e297059537d70dbdf
              • Opcode Fuzzy Hash: 541cce3268000b5e58aa52ce81f3fb818dd6c461a068b5e465468edd5535fa61
              • Instruction Fuzzy Hash: A0415C72E046A2A1FB646B91944CBBD73E0E750BE4FD44026E7D427EC9D7A8C952C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$FreeHandleThreadVirtual$AddressCloseCreateModuleProcRemoteResumeSleepVersion
              • String ID:
              • API String ID: 524593884-0
              • Opcode ID: 5a06ccf97e586fb4dcebf73232ca85bd4bf35fd509d778f6001f57b17094352d
              • Instruction ID: b9c17bdc1397ffde5e8a923873defc5ea89594a7deb80b8bb8e88773736041a7
              • Opcode Fuzzy Hash: 5a06ccf97e586fb4dcebf73232ca85bd4bf35fd509d778f6001f57b17094352d
              • Instruction Fuzzy Hash: DD413271228A8193F7D0DBB5E459B5B77F2F794B98F101025FA868BAE8DF79C4448B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
              • String ID:
              • API String ID: 3191669884-0
              • Opcode ID: 2eb1a5d47409f490b13a0168d73a488cb434f0b05a52dab723d9dcdc236a4a91
              • Instruction ID: d3196ce8bf6e78823a8e0218609a88229faae26be4f81fde33fbbc127f07a674
              • Opcode Fuzzy Hash: 2eb1a5d47409f490b13a0168d73a488cb434f0b05a52dab723d9dcdc236a4a91
              • Instruction Fuzzy Hash: 03319176B04780A6EB64DF91D488B5DB6A4F788BE0F195121EE99A3BC5CBB4CC42C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
              • String ID:
              • API String ID: 3191669884-0
              • Opcode ID: 3694d185819cc235fc92b525f3dfbcbb81233bc255804af67a5dfebb6cefb064
              • Instruction ID: 9cd881238a03e24342b549f1a47e9ac7dd0235decccb6cab2b85a8a30bb5b939
              • Opcode Fuzzy Hash: 3694d185819cc235fc92b525f3dfbcbb81233bc255804af67a5dfebb6cefb064
              • Instruction Fuzzy Hash: 7631D672B04781BAE7219F91D598B5DB7A4F344FE0F148121EE9467BDACBB4C841C704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ComputerDirectoryInformationNameSystemVolume_snwprintf_swcschr
              • String ID: %04x-%04x:%s
              • API String ID: 2490760115-4041933335
              • Opcode ID: 53728fefee931a2ebb508c77460470079659acf6498bbc88df63689f9c6ebc03
              • Instruction ID: 0a825449b426f6701cf84c65599013a8d9acf15255dfb74dffee6ead96df4cbe
              • Opcode Fuzzy Hash: 53728fefee931a2ebb508c77460470079659acf6498bbc88df63689f9c6ebc03
              • Instruction Fuzzy Hash: 27314072218A8193E760DFA4E45479BB7B2F7C5344F504426E7C98AA98DF7DC548CB04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastStartupgethostbynamehtonsinet_addrinet_ntoasocket
              • String ID:
              • API String ID: 1867335311-0
              • Opcode ID: c65c531ffdca6c720613d626d3e0dc5e2288e2160460f4d357a311a5ce442332
              • Instruction ID: c3615b70d62fe270410775ade70facfc1dd6ccda08a3abeba2fe0f6d12be7c34
              • Opcode Fuzzy Hash: c65c531ffdca6c720613d626d3e0dc5e2288e2160460f4d357a311a5ce442332
              • Instruction Fuzzy Hash: 8F31E936218BC497D7909FA5F49875AB7B2F788B80F504025EA9987B68DF7DC544CB00
              APIs
              • GetFileAttributesExW.KERNEL32(?,?,?,?,?,?,?,?,?,0000022DA544562B), ref: 0000022DA5445A97
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,0000022DA544562B), ref: 0000022DA5445AA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AttributesErrorFileLast
              • String ID: .bat$.cmd$.com$.exe
              • API String ID: 1799206407-4019086052
              • Opcode ID: 4a2fd66cf3d7451a24e2c0cae718cd39561c63d9a3574c1d0737895d2d99049f
              • Instruction ID: 956f3b619bd1e4746b44a786ad9e1993b9d50d9b38ab3b853e9b757a6deb01a2
              • Opcode Fuzzy Hash: 4a2fd66cf3d7451a24e2c0cae718cd39561c63d9a3574c1d0737895d2d99049f
              • Instruction Fuzzy Hash: C0210531F8478172FF249B9BB84DBD563B1AB967C0F485121DE59A66CADFA8C440C740
              APIs
              • malloc.LIBCMT ref: 0000022DA544A8F7
              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,0000022DA544A2E1), ref: 0000022DA544A910
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,0000022DA544A2E1), ref: 0000022DA544A920
                • Part of subcall function 0000022DA546BEFC: _errno.LIBCMT ref: 0000022DA546BF14
                • Part of subcall function 0000022DA546BEFC: _invalid_parameter_noinfo.LIBCMT ref: 0000022DA546BF20
                • Part of subcall function 0000022DA544F1D0: GetLastError.KERNEL32 ref: 0000022DA544F265
              • free.LIBCMT ref: 0000022DA544A95F
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast_errno$AddressFreeHandleHeapModuleProc_invalid_parameter_noinfofreemalloc
              • String ID: GetProcAddress$kernel32
              • API String ID: 3678262004-2374084194
              • Opcode ID: 08aac1669c96ad59ab5193a0e92938f479efe0f13da1e685e59d027104f00b27
              • Instruction ID: 2e145a66c94552a62ce203f0ca63a690c659983da586302179c7a24f3b4496b0
              • Opcode Fuzzy Hash: 08aac1669c96ad59ab5193a0e92938f479efe0f13da1e685e59d027104f00b27
              • Instruction Fuzzy Hash: 8621F532A04B84A2E714CF92F844A9D73B0F354BE0F545216EFA923B95DBB8D585C740
              APIs
              • malloc.LIBCMT ref: 0000022DA544A810
              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,00000000,0000022DA544A194), ref: 0000022DA544A829
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,0000022DA544A194), ref: 0000022DA544A839
                • Part of subcall function 0000022DA546BEFC: _errno.LIBCMT ref: 0000022DA546BF14
                • Part of subcall function 0000022DA546BEFC: _invalid_parameter_noinfo.LIBCMT ref: 0000022DA546BF20
                • Part of subcall function 0000022DA544F1D0: GetLastError.KERNEL32 ref: 0000022DA544F265
              • free.LIBCMT ref: 0000022DA544A874
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast_errno$AddressFreeHandleHeapModuleProc_invalid_parameter_noinfofreemalloc
              • String ID: LoadLibraryA$kernel32
              • API String ID: 3678262004-970291620
              • Opcode ID: a18c84848b337dece58bb931048e8b3ff6047285e7a2630bc65a871a896b92d3
              • Instruction ID: 3c9eea8461bb13b342224948286b13efb25ece2f0d77508de7c1778432c4c096
              • Opcode Fuzzy Hash: a18c84848b337dece58bb931048e8b3ff6047285e7a2630bc65a871a896b92d3
              • Instruction Fuzzy Hash: BB21C531A04B4496E700CF92F84475977B0F755BE4F505216FEAA23B99DB7CD482CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastfree$callocmalloc
              • String ID:
              • API String ID: 2740727550-0
              • Opcode ID: 81b584565fd5d297028227f77da06c0b882853ab048de9ed0f142f170e64cf68
              • Instruction ID: 68b66c390fa474682355f0f5ff7ec1e36efe6513e30c5576d6e6b709aada077b
              • Opcode Fuzzy Hash: 81b584565fd5d297028227f77da06c0b882853ab048de9ed0f142f170e64cf68
              • Instruction Fuzzy Hash: 5651C676E01A8495EF149BA69408BA96BA0E745FF0F4C5321DF3E277D5EBB8C881C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastfree$callocmalloc
              • String ID:
              • API String ID: 2740727550-0
              • Opcode ID: 6dbc2973e71f7119dfdd0ef635791dce03aa3bfcd61c41b47fc5d33803883e77
              • Instruction ID: 1deecb0251108d5dfb50140ee21ba213080f1fa3ae3392a7ea3aebd9eb2a8b27
              • Opcode Fuzzy Hash: 6dbc2973e71f7119dfdd0ef635791dce03aa3bfcd61c41b47fc5d33803883e77
              • Instruction Fuzzy Hash: 4E51EA36E01648D6EE15DB9295087AD6BA0F755BF0F585321DE7E277E4EBB8C882C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$malloc
              • String ID:
              • API String ID: 2190258309-0
              • Opcode ID: 2924a211e590096db208adbcee31891b1d165d161d4f9bcb781f0d242ae2354f
              • Instruction ID: 4bf94913c5fcff71e8ed5bb3de0544b3dd76effea600d9de49e450631d88c70e
              • Opcode Fuzzy Hash: 2924a211e590096db208adbcee31891b1d165d161d4f9bcb781f0d242ae2354f
              • Instruction Fuzzy Hash: ABA11532319781A7EB90DB6DE458B5FB7E1F785784F500026EA898B7A5DF78C844CB40
              APIs
              • malloc.LIBCMT ref: 0000022DA381C554
                • Part of subcall function 0000022DA3837A78: _FF_MSGBANNER.LIBCMT ref: 0000022DA3837AA8
                • Part of subcall function 0000022DA3837A78: _NMSG_WRITE.LIBCMT ref: 0000022DA3837AB2
                • Part of subcall function 0000022DA3837A78: HeapAlloc.KERNEL32(?,?,00000000,0000022DA3840CB0,?,?,?,0000022DA3840F14,?,?,?,0000022DA3840E13), ref: 0000022DA3837ACD
                • Part of subcall function 0000022DA3837A78: _callnewh.LIBCMT ref: 0000022DA3837AE6
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AF1
                • Part of subcall function 0000022DA3837A78: _errno.LIBCMT ref: 0000022DA3837AFC
              • GetProcAddress.KERNEL32 ref: 0000022DA381C611
              • GetProcAddress.KERNEL32 ref: 0000022DA381C62D
              • GetProcAddress.KERNEL32 ref: 0000022DA381C649
              • GetProcAddress.KERNEL32 ref: 0000022DA381C665
              • free.LIBCMT ref: 0000022DA381C72E
                • Part of subcall function 0000022DA3837A38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA383C20A,?,?,?,0000022DA383C187,?,?,00000000,0000022DA3838A19), ref: 0000022DA3837A4E
                • Part of subcall function 0000022DA3837A38: _errno.LIBCMT ref: 0000022DA3837A58
                • Part of subcall function 0000022DA3837A38: GetLastError.KERNEL32(?,?,00000000,0000022DA383C20A,?,?,?,0000022DA383C187,?,?,00000000,0000022DA3838A19), ref: 0000022DA3837A60
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$_errno$Heap$AllocErrorFreeLast_callnewhfreemalloc
              • String ID:
              • API String ID: 430833761-0
              • Opcode ID: 444a66838d7445301500daaec5c4ac10f076d86f9ef1e6704d6fa196e5327548
              • Instruction ID: 5b98423b8f01a5ed4cfa9772f2a776727c5d9e33825516663dbf864e7d64931d
              • Opcode Fuzzy Hash: 444a66838d7445301500daaec5c4ac10f076d86f9ef1e6704d6fa196e5327548
              • Instruction Fuzzy Hash: 6A91C976218F4492DBA0CB6AE08471A77B5F3C8BD4F144516EA8D4BBB8DF79C581CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: InputSend$MetricsSystem
              • String ID:
              • API String ID: 1046123477-0
              • Opcode ID: c58d8cc90110062565105966792f55e9f177975f02ce3faa13cdd42963eddbb9
              • Instruction ID: 2cd2e11c6024cab7b80e40b7f045de9cddee5b3fc3e91967715c42025511b119
              • Opcode Fuzzy Hash: c58d8cc90110062565105966792f55e9f177975f02ce3faa13cdd42963eddbb9
              • Instruction Fuzzy Hash: 3461EE36F20A50DAFB51CBB9D448B9C33B1B749794F108226CE1BB7784EBB48885CB10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorEventLastRead_errno$AllocHeap_callnewhfreemalloc
              • String ID:
              • API String ID: 3766589139-0
              • Opcode ID: f1cbed1f684efea136e6ed17d8ac8dbfb5c67acecf9f3f8172b76b83d9252347
              • Instruction ID: 19ee106629a16b7f822d7fff16d4b2556507d9817aad971ba74749df4335568f
              • Opcode Fuzzy Hash: f1cbed1f684efea136e6ed17d8ac8dbfb5c67acecf9f3f8172b76b83d9252347
              • Instruction Fuzzy Hash: B8517B76B00B90E7DBA08FA2E948B6A6761F789FD0F144022DE8E63B55DF78D855C700
              APIs
              • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,0000022DA544F923), ref: 0000022DA5450AAB
              • calloc.LIBCMT ref: 0000022DA5450AD0
                • Part of subcall function 0000022DA546AEF4: _calloc_impl.LIBCMT ref: 0000022DA546AF04
                • Part of subcall function 0000022DA546AEF4: _errno.LIBCMT ref: 0000022DA546AF17
                • Part of subcall function 0000022DA546AEF4: _errno.LIBCMT ref: 0000022DA546AF21
              • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,0000022DA544F923), ref: 0000022DA5450B01
              • free.LIBCMT ref: 0000022DA5450BD5
                • Part of subcall function 0000022DA5450420: free.LIBCMT ref: 0000022DA5450513
                • Part of subcall function 0000022DA5450420: calloc.LIBCMT ref: 0000022DA5450545
                • Part of subcall function 0000022DA5450420: SetLastError.KERNEL32(00000000,00000000,?,0000022DA5450B60,?,?,?,?,?,?,?,?,0000022DA544F923), ref: 0000022DA5450555
                • Part of subcall function 0000022DA5450420: free.LIBCMT ref: 0000022DA5450601
              • free.LIBCMT ref: 0000022DA5450B86
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • free.LIBCMT ref: 0000022DA5450BFC
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$_errno$ErrorLastQueryValuecalloc$FreeHeap_calloc_impl
              • String ID:
              • API String ID: 3084246691-0
              • Opcode ID: f75a3c969e001daa7a393804a44f63590950462704e3f5a69417c00f7993bf87
              • Instruction ID: 996a3caea4793ea957caa76d4963727cf365c2840b75292341a1360a7698eaa1
              • Opcode Fuzzy Hash: f75a3c969e001daa7a393804a44f63590950462704e3f5a69417c00f7993bf87
              • Instruction Fuzzy Hash: ED518176A04B81D7EB64DF96A848B6E77A0F789FC0F144025DE4E63B54EE78C845CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_callnewhmalloc
              • String ID: NtQueryObject$RtlGetVersion$ZwSetIoCompletion$eryInformationProcess
              • API String ID: 661295742-4117932401
              • Opcode ID: c3e2c0a078b40758424f9ad967fb538ecd7246e2e0d4d9e4506b99119c5b4195
              • Instruction ID: 2f918c7be666353c61679af28f54d766b0d1689f2eedba2e8aa49249a9255148
              • Opcode Fuzzy Hash: c3e2c0a078b40758424f9ad967fb538ecd7246e2e0d4d9e4506b99119c5b4195
              • Instruction Fuzzy Hash: 1E510B36204B89D3DBA0DB95E49465E77A2F7C8BD8F504126EE8D8B764DF38C606CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: EnumValue_errnofree$InfoQuery_calloc_implcalloc
              • String ID:
              • API String ID: 3915807233-0
              • Opcode ID: 6a2763e74ed5711b130198dbd27d85c688d94f932cbd2809e19751c319e88d1a
              • Instruction ID: 382b02982211c669710ccaae6a108bb261b971785522e9f251d33c33e5e88b1e
              • Opcode Fuzzy Hash: 6a2763e74ed5711b130198dbd27d85c688d94f932cbd2809e19751c319e88d1a
              • Instruction Fuzzy Hash: 20415A36608B8097E760CB66F884B5AB7A9F789B90F544125EFCE53B28DF78C454CB04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: wcsncpy$wcscpy
              • String ID:
              • API String ID: 58731003-0
              • Opcode ID: 3afe515ccca787da4b8cd8b7d803b652c833aa8cc9bb52540bff7f60c8713fc4
              • Instruction ID: 4a7d8dd62a3c4815627ef5ec8d595e6ce5faf49c94cbc3ab821e968ece72cc93
              • Opcode Fuzzy Hash: 3afe515ccca787da4b8cd8b7d803b652c833aa8cc9bb52540bff7f60c8713fc4
              • Instruction Fuzzy Hash: 0651F876704B4582EFA0CB5AE094B1A67A2F7C9BC8F504125EF8D8B7A5DF39C845CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: wcsncpy$wcscpy
              • String ID:
              • API String ID: 58731003-0
              • Opcode ID: 764537a2a5afd9bfb38099af9eba761009025697c048a1809a03572ce4e2e3b3
              • Instruction ID: 6dd67efc54c21ba0a6c958922e8212ddd6459ad6ff72d9a40db962dc30986b24
              • Opcode Fuzzy Hash: 764537a2a5afd9bfb38099af9eba761009025697c048a1809a03572ce4e2e3b3
              • Instruction Fuzzy Hash: 7A51E876704B4582EBA4DBAED09875A67A2F7C9BC8F100125EF8D8B7A5DF39C441CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$EnvironmentVariable$malloc
              • String ID:
              • API String ID: 1318801561-0
              • Opcode ID: 133b088d16df7b7019a12885803ce409e39ee2c3a360c1c40228a5c69d451d67
              • Instruction ID: 0ca23e99edee8f16a878390f6f7d5bba3d321b7643c2e89517fe9c6ff4ee217d
              • Opcode Fuzzy Hash: 133b088d16df7b7019a12885803ce409e39ee2c3a360c1c40228a5c69d451d67
              • Instruction Fuzzy Hash: 2E41F572B00B9092EB549FA3A818B6E67D0F78AFC0F485021DE8B67B55DE7CC442C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Librarymalloc$CurrentErrorFreeLastLoadProcess
              • String ID:
              • API String ID: 956524601-0
              • Opcode ID: e05b62aa72fa9048d230cdb91fb37554d1463ff26985787a0f1a9d1a11e3426e
              • Instruction ID: 8eef272cd5fb36be22993d3d95eebad0b7559d5ba6b466a9610d4826f598deb4
              • Opcode Fuzzy Hash: e05b62aa72fa9048d230cdb91fb37554d1463ff26985787a0f1a9d1a11e3426e
              • Instruction Fuzzy Hash: 0941B372A05B40A3FB559BD3A808BAE67B2F789FD0F584021DD4967B54EFB8C481C340
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5d53ae265ed818472e7ebf757b5697b586dd8e39efb7bc364705298cd18c0929
              • Instruction ID: 211ca78d1244e85ad1d1a700504101609a25ce2474620478864c45af15176803
              • Opcode Fuzzy Hash: 5d53ae265ed818472e7ebf757b5697b586dd8e39efb7bc364705298cd18c0929
              • Instruction Fuzzy Hash: 3C41C272A05B8097EBA0CFA1E488B5E77B0F789B50F148126DE8963B54DF78C8459B40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: MemoryProcessRead_errnocalloc$ErrorLast_calloc_implfree
              • String ID:
              • API String ID: 2427788749-0
              • Opcode ID: 7ea07f29334364c2d4685d9aa688f24c38482693598f0f38b5f4dc1d61a76cf3
              • Instruction ID: 838f2ddf38c67240da01bbbee0f44918ece089e1c32050ed85eddcf5712b7a4f
              • Opcode Fuzzy Hash: 7ea07f29334364c2d4685d9aa688f24c38482693598f0f38b5f4dc1d61a76cf3
              • Instruction Fuzzy Hash: 6C417E32A05B40A2FB208F6AF448B5AB7E5F788B94F564125DE8D67764DF78C845CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Enum_errnofree$InfoQuery_calloc_implcalloc
              • String ID:
              • API String ID: 3908565598-0
              • Opcode ID: 3c2bc61c779a6dabc6de36b31d91c07013ad77ae4d8a620056ae0c0044b09962
              • Instruction ID: 4d678db473797fedfd8fa8204ff2834a7bf053152832d6a3f6ece55eab77223c
              • Opcode Fuzzy Hash: 3c2bc61c779a6dabc6de36b31d91c07013ad77ae4d8a620056ae0c0044b09962
              • Instruction Fuzzy Hash: 89417236704BC096EB64CBA6B894B6EB7A4F789BC0F544025DE8E63B55EF78C845C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: freemallocrealloc
              • String ID:
              • API String ID: 197341925-0
              • Opcode ID: f6daa87061b71052a5e8d7de5c52011f9cda202e2a2ecc8122e233af98821786
              • Instruction ID: ab47ce8237632d2b9547ff65f6e62fa4692f406ba49f361211e090053776ef17
              • Opcode Fuzzy Hash: f6daa87061b71052a5e8d7de5c52011f9cda202e2a2ecc8122e233af98821786
              • Instruction Fuzzy Hash: 6441EBB661864087DB64CFA9E494B1AB7A2F7C8794F104115EB8D87B68CB7CD845CF00
              APIs
              • malloc.LIBCMT ref: 0000022DA54491FB
                • Part of subcall function 0000022DA546AF78: _FF_MSGBANNER.LIBCMT ref: 0000022DA546AFA8
                • Part of subcall function 0000022DA546AF78: _NMSG_WRITE.LIBCMT ref: 0000022DA546AFB2
                • Part of subcall function 0000022DA546AF78: HeapAlloc.KERNEL32(?,?,0000000D,0000022DA5477AB4,?,?,?,0000022DA5477D9C,?,?,?,0000022DA5477C9B,?,?,0000000D,0000022DA5471C43), ref: 0000022DA546AFCD
                • Part of subcall function 0000022DA546AF78: _callnewh.LIBCMT ref: 0000022DA546AFE6
                • Part of subcall function 0000022DA546AF78: _errno.LIBCMT ref: 0000022DA546AFF1
                • Part of subcall function 0000022DA546AF78: _errno.LIBCMT ref: 0000022DA546AFFC
              • WSACreateEvent.WS2_32 ref: 0000022DA544922B
              • WSAGetLastError.WS2_32 ref: 0000022DA544923A
              • WSAEventSelect.WS2_32 ref: 0000022DA5449252
              • WSAGetLastError.WS2_32 ref: 0000022DA544925D
              • free.LIBCMT ref: 0000022DA54492F8
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast_errno$EventHeap$AllocCreateFreeSelect_callnewhfreemalloc
              • String ID:
              • API String ID: 472862634-0
              • Opcode ID: a215cec91a7d63ac7f325a131e6027c5252de390ab7df3612c3f1dcb9557ded0
              • Instruction ID: b4a1b251b44bdddb3f75841095711a558347c4ba9f9978f60e96b7eae67ff5cb
              • Opcode Fuzzy Hash: a215cec91a7d63ac7f325a131e6027c5252de390ab7df3612c3f1dcb9557ded0
              • Instruction Fuzzy Hash: F4316A32A15F8092EB84CF65F848B5A73F4F789B84F144129EA9D93B58EF78C460C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastProcess$CloseHandleOpenTerminatehtonl
              • String ID:
              • API String ID: 71079760-0
              • Opcode ID: 2721868255f1aacb77f3d04f4d59bbd12ef2fb55a40fbe540329c80e90f8efdd
              • Instruction ID: fc57c39af35f390e63b233aabf7da7305bf253f33bf7d0b73731d9e483a9719e
              • Opcode Fuzzy Hash: 2721868255f1aacb77f3d04f4d59bbd12ef2fb55a40fbe540329c80e90f8efdd
              • Instruction Fuzzy Hash: E7218E36B04A6097E754DFA2A808B6AA7E1F789FD1F494126DE4AA3724DFB8C105C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_wopenfile
              • String ID:
              • API String ID: 2917438572-0
              • Opcode ID: 2c1e0e690f0faa1a1be827e41460c57e1209367e6fcff44c2fe0c2915a9e3f53
              • Instruction ID: b59825d0d8a2c4867feefa4ef6c8015999956a32e6f9af44abb130d8861196a4
              • Opcode Fuzzy Hash: 2c1e0e690f0faa1a1be827e41460c57e1209367e6fcff44c2fe0c2915a9e3f53
              • Instruction Fuzzy Hash: 7C212971B08385B1FB105FD6A818B2EB2B17B44BC0F0048216E8977F9BEBBCC8419710
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$mallocmemcpy_s
              • String ID: empty distance tree with lengths
              • API String ID: 3228596553-1599073622
              • Opcode ID: fdcef176d2e3cd7c2100b21721ec6986f25585f6f17376425f8ddb058785bd5c
              • Instruction ID: 9058549df1e59b3314917f239499e63e4585424ec7b5bb33da7bf5eae145ad8d
              • Opcode Fuzzy Hash: fdcef176d2e3cd7c2100b21721ec6986f25585f6f17376425f8ddb058785bd5c
              • Instruction Fuzzy Hash: C1B14072208BD197EBA08BA5E45975BB7A2F7C4794F004025DA898BB95EF7CC448CF40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: strrchr$Wcsftimestrstrstrtoxl
              • String ID: oversubscribed dynamic bit lengths tree
              • API String ID: 2674253548-3896287439
              • Opcode ID: 6f42fd81d3b10d1dc50917501a6ca4722e4fa581d99a151bcdde38ab6bebfcf9
              • Instruction ID: b617a2fc6b8916d64d7a6ce93a2be8672f63d2bd8d7e1053fc239bd665678f5c
              • Opcode Fuzzy Hash: 6f42fd81d3b10d1dc50917501a6ca4722e4fa581d99a151bcdde38ab6bebfcf9
              • Instruction Fuzzy Hash: E1512D36218B8196E7D0DB69E48875EA7A2F7C5BC4F105026EA8D8BBA5DF3DC405CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _wgetenvswscanf
              • String ID: %ld%c$JPEGMEM$x
              • API String ID: 2353447129-3402169052
              • Opcode ID: 53edf71d2590f30500fd9bee9edd56da98a5a7114dc558a95a86df3063b861dd
              • Instruction ID: a35d8af9e64fc6dfb4d15220652c942dd5495ecd33e1048fe59abdf30287c9e4
              • Opcode Fuzzy Hash: 53edf71d2590f30500fd9bee9edd56da98a5a7114dc558a95a86df3063b861dd
              • Instruction Fuzzy Hash: C6416032615B80A6EB41CF65E48479D37F8F748B88F50412AEA8F53768EF78C955C780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: ProcessIdToSessionId$kernel32.dll
              • API String ID: 145871493-3889420803
              • Opcode ID: f5c07b316afeeaae3df54012d40d518287d5aa9d213152fe4b5eb8805c0c94b0
              • Instruction ID: f86efd69e6ceabc6a56a152f6d65703650a84a9617a28f81b65797cda4e49cf0
              • Opcode Fuzzy Hash: f5c07b316afeeaae3df54012d40d518287d5aa9d213152fe4b5eb8805c0c94b0
              • Instruction Fuzzy Hash: F5115AB1B15740A2FF98CB95F4C8A6973B0E78C7A0F445025EA5F57764DF78C8809700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 145871493-192647395
              • Opcode ID: f9144159a94ecbe2b9332d8ceb7004389a9aec0873ba4f9bd88d8412bde9f250
              • Instruction ID: 06a57168c35e898912abb7618eeb7e51745876526b495339cbf1228764586d33
              • Opcode Fuzzy Hash: f9144159a94ecbe2b9332d8ceb7004389a9aec0873ba4f9bd88d8412bde9f250
              • Instruction Fuzzy Hash: BC115A32B15B0092EB608B51E88866D72F5F788B80F054539DA9D93354EF79CA00CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 145871493-192647395
              • Opcode ID: 91b4001e747ae214535c209cc716b75a2d3acc7bdfba024cf91300cd0eecf4a1
              • Instruction ID: bbe0778ddfdbdb3950f3ed19f5d697ea824c9f96581a26d08c6a8173c39c8387
              • Opcode Fuzzy Hash: 91b4001e747ae214535c209cc716b75a2d3acc7bdfba024cf91300cd0eecf4a1
              • Instruction Fuzzy Hash: EE115732B09B0092EB608F95E84872D72E5F74CB80F058136DAADA3350EFB8CA44CB50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Library$AddressFreeLoadProc
              • String ID: WTSGetActiveConsoleSessionId$kernel32.dll
              • API String ID: 145871493-2743965321
              • Opcode ID: cb38db8ac66084356a66413303b3f8781eea74fe0e263c13ac51d946d92f83bb
              • Instruction ID: b9cf85ed696864e2259e48a1f52b1f8d05edc921efa9b0ec51fb22cbe7b8a23b
              • Opcode Fuzzy Hash: cb38db8ac66084356a66413303b3f8781eea74fe0e263c13ac51d946d92f83bb
              • Instruction Fuzzy Hash: CBF04F71A42B01B3FF448BD9B848B1553E0AB49B90F589435C90EA63A0EEB8C855C250
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: malloc
              • String ID: @$buffer error$mpatible version
              • API String ID: 2803490479-928677456
              • Opcode ID: 1011aa9bef5c62dbc200150169c76b0e372b639647ab671715a595af9ce66285
              • Instruction ID: 074e07b35644838bcc98dc22157519aa9560a3147548b6518ef269df6d99dc3c
              • Opcode Fuzzy Hash: 1011aa9bef5c62dbc200150169c76b0e372b639647ab671715a595af9ce66285
              • Instruction Fuzzy Hash: 0C121431119BC1A7F7E09BA9E458B6BB7E2F784784F504025EA8A8BB94DF7DC444CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: callocfree$realloc
              • String ID:
              • API String ID: 3532980479-0
              • Opcode ID: ed9d0478292aff0bb0ff41c6eb372e2df8ab086baffa9bdd4ca0657a5db33009
              • Instruction ID: d6ee8741b12befef74b3e840090edb8f227fe68b8e3397101d885c8e23d9713a
              • Opcode Fuzzy Hash: ed9d0478292aff0bb0ff41c6eb372e2df8ab086baffa9bdd4ca0657a5db33009
              • Instruction Fuzzy Hash: D6022F76305BC4DAEBA0CB6AE49479A77A1F7C8B84F104025EE8D8BB55DF79C451CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: callocmalloc
              • String ID: IoCompletion
              • API String ID: 1635859522-2167567656
              • Opcode ID: def9d216b9ea24561024c6f685b2adc64e7dc3bfb9425c4402de36753f1953f2
              • Instruction ID: dd036ad0ee91268e5de292b497b537e89088e7a693eaa82ef938b58ce0dcc134
              • Opcode Fuzzy Hash: def9d216b9ea24561024c6f685b2adc64e7dc3bfb9425c4402de36753f1953f2
              • Instruction Fuzzy Hash: 30F1F132208BC597E7A08B55E45879EB7E6F3C4BD4F504425DA898BBA8DF79C488CF40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Time$Systemrand$FileSleep
              • String ID:
              • API String ID: 3199569092-0
              • Opcode ID: 5458d583ebc1a2179058ed294e10a48a736a9e4fca760fd71e5d77958432c93c
              • Instruction ID: e0cf7746e555af57a3c42f465920822953ff8263e4770f5225a139efd2459f32
              • Opcode Fuzzy Hash: 5458d583ebc1a2179058ed294e10a48a736a9e4fca760fd71e5d77958432c93c
              • Instruction Fuzzy Hash: CAE10E7221874197EBA0CBBAE45871AB7E1F7C8B94F100525FA9D8BBA5DB78C444CF01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errnomalloc$_callnewh$free
              • String ID: stream error
              • API String ID: 2522206970-3905021454
              • Opcode ID: 0dc374131a1903f30db0cb4fcc86ee01ac6b701a5e2c5482a167e838d2151210
              • Instruction ID: cd01571906d478de22d0749369e09110b166655964b5137325fcb927fa385860
              • Opcode Fuzzy Hash: 0dc374131a1903f30db0cb4fcc86ee01ac6b701a5e2c5482a167e838d2151210
              • Instruction Fuzzy Hash: 86C1F532218B4593EB90CB5AE494B6A77E1F3C8B94F544126EA8D8B7A5DF38C545CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errnomalloc$_callnewh$AllocHeapfree
              • String ID: https
              • API String ID: 1282991897-1056335270
              • Opcode ID: fcdadbf60aca2c88c7e86dc93bdc864658fe16372a8526a01dbfb0313e400af8
              • Instruction ID: 66573ded46d7bc7723df5f71392b6c278a1b44232be56cb188b9d17ed16654c7
              • Opcode Fuzzy Hash: fcdadbf60aca2c88c7e86dc93bdc864658fe16372a8526a01dbfb0313e400af8
              • Instruction Fuzzy Hash: AEC12936614B4593EB90CBAAE49476A77E1F3C8B84F104126FE8E8B7A5DF38C541CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: cvtdate$_errno_get_daylight_invalid_parameter_noinfo_invoke_watson
              • String ID:
              • API String ID: 1447642234-0
              • Opcode ID: c717f58b61fabb93384f06f529ff7be971ac10c0f43f0954e917759a1e431396
              • Instruction ID: 63e362fd6def7a5af4b77bd81e84579e9358b02db13a25ddbeecb5570c6c7dbd
              • Opcode Fuzzy Hash: c717f58b61fabb93384f06f529ff7be971ac10c0f43f0954e917759a1e431396
              • Instruction Fuzzy Hash: B1815FB3E14250EBEB748F85E448E2AFBE5F398744F15511AEA8563AA8D7F8C540CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$AllocErrorHeapLastTable_callnewhfreemallocswprintf
              • String ID:
              • API String ID: 1746394769-0
              • Opcode ID: 5ac1e9e33e70036c5149f37b110cffd040cce6d41ebf7450485b1192e357c043
              • Instruction ID: d7f0fe3b7e8e542148a98362ea4233b23fad13dda86225e14b3cabbd44974bd7
              • Opcode Fuzzy Hash: 5ac1e9e33e70036c5149f37b110cffd040cce6d41ebf7450485b1192e357c043
              • Instruction Fuzzy Hash: C951DF33641AC0ABEB31CF64E844BDA77A4F384368F405115DA9A57B88DB78C646CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
              • String ID:
              • API String ID: 2998201375-0
              • Opcode ID: 661c5b9ba275ff4e5bf902f70c604f74e02c38ab4a62dc1d77f1c21cb65c6a9f
              • Instruction ID: 625b514362f7b572f2b9e558e2fdfc3f476edfb4d79c1b902aec8dea9ee37a1e
              • Opcode Fuzzy Hash: 661c5b9ba275ff4e5bf902f70c604f74e02c38ab4a62dc1d77f1c21cb65c6a9f
              • Instruction Fuzzy Hash: 9441C53232478097E7E08F65E548B29BBA6FB98F84F148125FB895BF95DB78C4618700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
              • String ID:
              • API String ID: 2998201375-0
              • Opcode ID: bb500fa1f9681e3ff1c3bd5ac37acf72c22b924064050129ccdf58f699b715e5
              • Instruction ID: 361f7c52d367e6afd90bcb811b2423514accd66ed3b8081570f0ec609934915e
              • Opcode Fuzzy Hash: bb500fa1f9681e3ff1c3bd5ac37acf72c22b924064050129ccdf58f699b715e5
              • Instruction Fuzzy Hash: 7E41D536A0478097EF608F65D584B2DBBA5FBD4FC0F2A4125EB896BB95CB78C8518700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
              • String ID:
              • API String ID: 2998201375-0
              • Opcode ID: b04b0ad383ec3e336078602d6af8b39561975d207cd1c59c949de03cade90b0e
              • Instruction ID: 5810e58462d2eeecf7cf8b262cce04a5e8ff61f1d05313f49324394f00413610
              • Opcode Fuzzy Hash: b04b0ad383ec3e336078602d6af8b39561975d207cd1c59c949de03cade90b0e
              • Instruction Fuzzy Hash: 1541D932A147819AE7608F55D588B6D7BF5F784FC0F188125EF896BB99EB78C841C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast_errno$AllocHeapMemoryProcessRead_callnewhfreemalloc
              • String ID:
              • API String ID: 1082828278-0
              • Opcode ID: d6e3e4dbab309babc6095987cc6d779e96ab9c6683f6db230d54e8c5aec90de9
              • Instruction ID: f7f70e9e287b6983ecb9160d8c63ed5e97db73502ca97a0e0d6c7d9174edb956
              • Opcode Fuzzy Hash: d6e3e4dbab309babc6095987cc6d779e96ab9c6683f6db230d54e8c5aec90de9
              • Instruction Fuzzy Hash: E131C4B6B00B4193EB149BA3A808B6A63A1B789FC0F540032DD0D77B65EFB8C445C344
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorEventLastResetSleeprecvselect
              • String ID:
              • API String ID: 2565462947-0
              • Opcode ID: 7ff08507b991db5d8e799856edb0927d5906ac72714c7171890ce3b41740d667
              • Instruction ID: 6b7a0f1207590c974dc833a035de1aa99da6821f37db57b6547fe303c2962ae9
              • Opcode Fuzzy Hash: 7ff08507b991db5d8e799856edb0927d5906ac72714c7171890ce3b41740d667
              • Instruction Fuzzy Hash: AE319272B08A81A2EB709B65F888B6E63A0FBC5784F854121DB5963A98DF78C444CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Virtual$Protect$CacheFlushInstructionMemoryProcessQueryWrite
              • String ID:
              • API String ID: 834688674-0
              • Opcode ID: 5ebdedb7cf474a5ac70c0ba1df02ce31ed7c10c00178b883543388ffadd1ac77
              • Instruction ID: 2966988ce9a2e3b21b8b0b92827c95c7b7166da7b8697cae42e66e5ea8e1ce48
              • Opcode Fuzzy Hash: 5ebdedb7cf474a5ac70c0ba1df02ce31ed7c10c00178b883543388ffadd1ac77
              • Instruction Fuzzy Hash: 8621B976218BC086CB60CF6AE45465AB761F3C9BA4F504206EEEE43BA8CF3DC445CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$CurrentDuplicateErrorHandleLastProcess_calloc_implcallocfree
              • String ID:
              • API String ID: 461984912-0
              • Opcode ID: 9d57ffffa63c1059fcfc04dfa408433c05a265e70f195dc81d1451cadfc5e6b0
              • Instruction ID: dae3cb40f262dcb3a3c398e56f67df36a4101cd2060cd3319e69cddcd77569b6
              • Opcode Fuzzy Hash: 9d57ffffa63c1059fcfc04dfa408433c05a265e70f195dc81d1451cadfc5e6b0
              • Instruction Fuzzy Hash: 5B114936608B8083EBA0CFA5E84475AB3B1F7C5B84F604015EACD8BB58DF7EC4448B40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: ThreadToken$CurrentErrorInformationLastOpen
              • String ID:
              • API String ID: 1989924565-0
              • Opcode ID: 5084d3087fa723fc127976a8fcbcba8c3f86658a42e98295b28540321170cdb4
              • Instruction ID: 57c1c70b1b060636d589c14a665f1a329847604b1107356a311560cfde8316ba
              • Opcode Fuzzy Hash: 5084d3087fa723fc127976a8fcbcba8c3f86658a42e98295b28540321170cdb4
              • Instruction Fuzzy Hash: A0014C76A14A4593EB108BA1F44CB9AA3B0FB84BA5F440025EA4957764DFBCC189CB00
              APIs
              • SetLastError.KERNEL32 ref: 0000022DA5456104
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 8112e8dad5f93f916fb8fc8fa314a8115170b58fc8da1b1524b40cf92251e3a6
              • Instruction ID: e32feaab2ac5e382c4a6b43e35ef38af88380d67778d912ba802f1c0c8a138a0
              • Opcode Fuzzy Hash: 8112e8dad5f93f916fb8fc8fa314a8115170b58fc8da1b1524b40cf92251e3a6
              • Instruction Fuzzy Hash: 32017836605B8092E7759F94F41879A73A0F3887B4F005226DEAA63BE4CF7CC595CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Virtual$Protect$CacheFlushInstructionMemoryProcessQueryWrite
              • String ID:
              • API String ID: 834688674-0
              • Opcode ID: 0ea2f94e7a4911aa9e781b1710ab951ce4168249ac3ef494bda480926371a858
              • Instruction ID: 028dbe4ae70ecfccfafa2bf17c9e5aa779dd7ada74acd68e1d94af834de0c02f
              • Opcode Fuzzy Hash: 0ea2f94e7a4911aa9e781b1710ab951ce4168249ac3ef494bda480926371a858
              • Instruction Fuzzy Hash: 2911D376218B8092CA50DBA6E44464AB761F38ABB1F505306EAB943BA8CF39C548CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: File$Attributes$DeleteErrorLastfree
              • String ID:
              • API String ID: 2038201108-0
              • Opcode ID: e197a73acfeac47e54e21bb698cdcb07d383d7de37e41704fa9242023943988f
              • Instruction ID: 47228fd1125742b7dc60e72793a13823bbb16d7e5186f975d97c1d6ec1fd1d3e
              • Opcode Fuzzy Hash: e197a73acfeac47e54e21bb698cdcb07d383d7de37e41704fa9242023943988f
              • Instruction Fuzzy Hash: 3EF09631F00A0063EB585BB9B85CB2812A06B89BA4F581121E91BB33E4EE78C8418340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errnorealloc$_callnewhmallocwcsncpy
              • String ID: 0
              • API String ID: 2375943163-4108050209
              • Opcode ID: b3af0ea5103111c20113669314b2e1010a481647de944de36a472201f2889a52
              • Instruction ID: dd3381a2c7c8f6ea74a1c0b1fb9dd2e3ca707297087e1b96c9129cac4f85202b
              • Opcode Fuzzy Hash: b3af0ea5103111c20113669314b2e1010a481647de944de36a472201f2889a52
              • Instruction Fuzzy Hash: E391DC76218A8097DBA4DB5DE49461EB7E1F7C8B98F105126FB8E87B69DB38C540CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errnorealloc$AllocHeap_callnewhmallocwcsncpy
              • String ID: 0
              • API String ID: 3789742870-4108050209
              • Opcode ID: 6e337077695a3da8e3e38612885043905c52aa8fb0f9a32c029affb8ddb49b58
              • Instruction ID: d1e2fd6f0a3f06143ffb99c6a86c8ef17c9be90d01df39a0e59b10e7d3230784
              • Opcode Fuzzy Hash: 6e337077695a3da8e3e38612885043905c52aa8fb0f9a32c029affb8ddb49b58
              • Instruction Fuzzy Hash: 0791FA76618A8487DBA4CB69E49461EB7E2F7C8B94F144125FA8E87B69DF7CC440CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: DriveDrivesLogicalType_vswprintf_s_lswprintf
              • String ID: %c:
              • API String ID: 1363219177-1226554575
              • Opcode ID: ec7240422976610c5bedee10c6040ecc02fe58a08a6f64066682a8b2fafc924c
              • Instruction ID: 14e2cfc1c323c28f264a5f1c9c745c8ec8cee71b097f2dc615927ed55832038e
              • Opcode Fuzzy Hash: ec7240422976610c5bedee10c6040ecc02fe58a08a6f64066682a8b2fafc924c
              • Instruction Fuzzy Hash: 5611E733A0479097D700DBD2F84499EFB60F785BA0F548521EF4553BA4EBB8C596C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastNamedObjectPeekPipeSingleSleepWait
              • String ID: m
              • API String ID: 52212926-3775001192
              • Opcode ID: 2a087c1654404f3cba168cfebb68e741b99618bd2fb40eaf1b4424191ad5eb22
              • Instruction ID: d5ca3f3197f17bb11b6c207b17ba236a6d64c1d31ffc95dcbedaebd963c0d81e
              • Opcode Fuzzy Hash: 2a087c1654404f3cba168cfebb68e741b99618bd2fb40eaf1b4424191ad5eb22
              • Instruction Fuzzy Hash: 96210E72228B4497E790DFB5E498B0AB7B6F3C5744F005015FA9987B68EB78C444CF01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_calloc_impl_vswprintf_c_lcallocswprintfwcsncpy
              • String ID: lengths
              • API String ID: 3410861999-1062732404
              • Opcode ID: 87eecd65fb8786f2cda938ccf28df036d67f4295e8f31c338da4c49d5774e372
              • Instruction ID: cee2689600eba125a147e498b5270e001363422ccb386eda2f18c1e8769c8158
              • Opcode Fuzzy Hash: 87eecd65fb8786f2cda938ccf28df036d67f4295e8f31c338da4c49d5774e372
              • Instruction Fuzzy Hash: 99219C76608B84C6DB44DF4AE49055ABBB1F3CAB84F104026EF8D47B68DF39D441CB44
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_calloc_impl_vswprintf_c_lcallocswprintfwcsncpy
              • String ID: dns://%s?ns=%s&sid=%s&req=%d&cli=%s&
              • API String ID: 3410861999-2401398329
              • Opcode ID: 0c344751d3f3fd0527c9ead608822f9737a900d632749d6064372a82e50f1a25
              • Instruction ID: 20bfa06cd1d84593dda3331c41b8091878405fbc0d4be7f2ae83b653647ee61d
              • Opcode Fuzzy Hash: 0c344751d3f3fd0527c9ead608822f9737a900d632749d6064372a82e50f1a25
              • Instruction Fuzzy Hash: 0021997A608B84C6DB44DF5AE49055ABBB1F3CAB84F104026EF8D47B68DF39D441CB00
              APIs
              • _callnewh.LIBCMT ref: 0000022DA546DF32
              • malloc.LIBCMT ref: 0000022DA546DF3E
                • Part of subcall function 0000022DA546AF78: _FF_MSGBANNER.LIBCMT ref: 0000022DA546AFA8
                • Part of subcall function 0000022DA546AF78: _NMSG_WRITE.LIBCMT ref: 0000022DA546AFB2
                • Part of subcall function 0000022DA546AF78: HeapAlloc.KERNEL32(?,?,0000000D,0000022DA5477AB4,?,?,?,0000022DA5477D9C,?,?,?,0000022DA5477C9B,?,?,0000000D,0000022DA5471C43), ref: 0000022DA546AFCD
                • Part of subcall function 0000022DA546AF78: _callnewh.LIBCMT ref: 0000022DA546AFE6
                • Part of subcall function 0000022DA546AF78: _errno.LIBCMT ref: 0000022DA546AFF1
                • Part of subcall function 0000022DA546AF78: _errno.LIBCMT ref: 0000022DA546AFFC
              • _CxxThrowException.LIBCMT ref: 0000022DA546DF87
                • Part of subcall function 0000022DA5476AD0: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000022DA546DF8C), ref: 0000022DA5476B3E
                • Part of subcall function 0000022DA5476AD0: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000022DA546DF8C), ref: 0000022DA5476B7D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
              • String ID: bad allocation
              • API String ID: 1214304046-2104205924
              • Opcode ID: a4dff509c1b450b50239fdaaf582110b6f2ffdfed158d55507b24e56f87aede7
              • Instruction ID: c9e92c2c80d53ac6600b1a23c97340bda1acfcc26083b6477147815cfe8cb11a
              • Opcode Fuzzy Hash: a4dff509c1b450b50239fdaaf582110b6f2ffdfed158d55507b24e56f87aede7
              • Instruction Fuzzy Hash: 75018471F15B4AB0EE289BD5B549B946395AB44384F540020EA4D17BAAEFB8C595C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errno$_invalid_parameter_noinfo
              • String ID: getaddrinfo
              • API String ID: 2819658684-300660673
              • Opcode ID: 5a71fc66c6ae65eb85523488547b2812afc48b5ed6f6ec9191721f6554cae090
              • Instruction ID: 88afc1bd9cc009061bb5b11b5f1dff83b76e1e2b3c11af02c0324442734f78d6
              • Opcode Fuzzy Hash: 5a71fc66c6ae65eb85523488547b2812afc48b5ed6f6ec9191721f6554cae090
              • Instruction Fuzzy Hash: 0101D6B1E153C2B4FE6E17F4095DF7819549B35388F2454619D81B7EFBE19A09098B10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: RtlGetVersion$ntdll.dll
              • API String ID: 1646373207-1489217083
              • Opcode ID: 4ce185e765b8ed62a937bc797e23cad37f9017e2dff122add8c46e7daac59a1a
              • Instruction ID: e8b2074a63fd1e0a7199c5e6ad625fe6dd0594da8fd6b9f02211e07f788f09b4
              • Opcode Fuzzy Hash: 4ce185e765b8ed62a937bc797e23cad37f9017e2dff122add8c46e7daac59a1a
              • Instruction Fuzzy Hash: F9116132224681E7EBF98BB4E80CB9F62E2F788744F404135E6598AB94EB3DC545CA00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseErrorHandleHttpInternetLastOpenRequest
              • String ID: GET
              • API String ID: 1146521569-1805413626
              • Opcode ID: bb7178db5e6b1158cbd72e94d60813d83f63c8d5a3b73460fda560e7555ca803
              • Instruction ID: be4e5a8a8a25aeb139ad98d77be5cc142c9b5879a482a593f3f377c3b63b5579
              • Opcode Fuzzy Hash: bb7178db5e6b1158cbd72e94d60813d83f63c8d5a3b73460fda560e7555ca803
              • Instruction Fuzzy Hash: 0F11CC75618B4197E7A09BBAE498B1AB7E1F388784F100425FB998ABA4DF7DC444CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: IsWow64Process$kernel32.dll
              • API String ID: 1646373207-3024904723
              • Opcode ID: 84acbf0e931c3169ce0b8c9159b8d8034a38f356f1932ab86e08c3c25272fb96
              • Instruction ID: 077aeea60e4f3deb67b7949bb4215c8c9a49039c236e9005e0acfd357f275c6f
              • Opcode Fuzzy Hash: 84acbf0e931c3169ce0b8c9159b8d8034a38f356f1932ab86e08c3c25272fb96
              • Instruction Fuzzy Hash: B1F08172B19B40A6EF448B96F888A55A3A0EB88790F442025EA5F97728EB78C480C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: AddMandatoryAce$advapi32.dll
              • API String ID: 2574300362-673174713
              • Opcode ID: 68499263ec1485bfceb7fa33467269506552c86d2a9c13e46f4cc5c5e3ea6af0
              • Instruction ID: 040195c0c940bc773192a4bf4cda128a2d3e58cc1d1310053a574d7064d1a7ab
              • Opcode Fuzzy Hash: 68499263ec1485bfceb7fa33467269506552c86d2a9c13e46f4cc5c5e3ea6af0
              • Instruction Fuzzy Hash: 7F114471115B40E7E790CFA4F84CB4A77A2F788394F800115E58646BA8DF7DD544CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: NtQueryInformationFile$ntdll.dll
              • API String ID: 1646373207-181822193
              • Opcode ID: 39ba8088b34ae59a6fbe3a01f1636c490dd6f5b50f95a0a0b8c71051aec04e10
              • Instruction ID: 8c258f1a4c4ce3ef841115ca7442d3cf2c86cb66eebc96f0c16f17b0021e0563
              • Opcode Fuzzy Hash: 39ba8088b34ae59a6fbe3a01f1636c490dd6f5b50f95a0a0b8c71051aec04e10
              • Instruction Fuzzy Hash: 26F0AFB2B04780A2EF408B95F448B697370FB88BE0F084219AA5E13794DFB8C5548B00
              APIs
              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,00000003,0000022DA54B194A), ref: 0000022DA54B1C57
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000003,0000022DA54B194A), ref: 0000022DA54B1C7A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: NtSetInformationFile$ntdll.dll
              • API String ID: 1646373207-3010545110
              • Opcode ID: cb995a7f299b8f2775c46e46b3ed55ae0de372c79064a784bacaa018ddac6808
              • Instruction ID: b6c788f74849e6b9a92340db5a341eff6da5330d13be7b4b9be327ed1d7a2dc4
              • Opcode Fuzzy Hash: cb995a7f299b8f2775c46e46b3ed55ae0de372c79064a784bacaa018ddac6808
              • Instruction Fuzzy Hash: EBF0AFB2B04780A2EF408B95F448B697370FB88BE0F484219EA6E13794DFB8C5548B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: NameTextVirtual_errno_invalid_parameter_noinfo_snwprintf
              • String ID: <%ls>
              • API String ID: 2821865448-2980182092
              • Opcode ID: 1e82099169b0d0845da0a024a725ada71ab5f1f3fd4df013d42e2c021da26f45
              • Instruction ID: a516ec45c3657f19c75c29563ea6a97514cb0dc4be20408ae54262928532937c
              • Opcode Fuzzy Hash: 1e82099169b0d0845da0a024a725ada71ab5f1f3fd4df013d42e2c021da26f45
              • Instruction Fuzzy Hash: DAF06232B04911E7E715DBE5E848BA913A1E785791F440026DA4EB7664DF78C486C700
              APIs
              • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,00000057,0000022DA544A36A), ref: 0000022DA544A9CA
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000057,0000022DA544A36A), ref: 0000022DA544A9DA
                • Part of subcall function 0000022DA544F1D0: GetLastError.KERNEL32 ref: 0000022DA544F265
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AddressErrorHandleLastModuleProc
              • String ID: FreeLibrary$kernel32
              • API String ID: 4275029093-3113479021
              • Opcode ID: d37b889259aa068871e5ec1da0ce01602f64094439f74c0884ade4aae4340260
              • Instruction ID: 116d19f11f6e9eec687dc864376924e184c8e5bdc3e78798763bf4a7141121aa
              • Opcode Fuzzy Hash: d37b889259aa068871e5ec1da0ce01602f64094439f74c0884ade4aae4340260
              • Instruction Fuzzy Hash: D7018F32A08B85A6EB40CF54F848B5AB770F399784F101156FB8917A18DFBCC144CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: NameTextVirtual_errno_invalid_parameter_noinfo_snwprintf
              • String ID: <%ls>
              • API String ID: 2821865448-2980182092
              • Opcode ID: 258f5956f3b5b113d786c2b90a34cf0952a954b1aa396ab112bcd8015f24b372
              • Instruction ID: a440385ad438d256d24fcd1345e0417720eacb30404a0b701d14d345dc1486e1
              • Opcode Fuzzy Hash: 258f5956f3b5b113d786c2b90a34cf0952a954b1aa396ab112bcd8015f24b372
              • Instruction Fuzzy Hash: 6C014F75B00A08E2E710CB92E448FDD63B6F789B90F894066DA5DB3758DFB8C945C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _snwprintf$_errno_invalid_parameter_noinfo
              • String ID: <LAlt>$<RAlt>
              • API String ID: 3682513478-2751853527
              • Opcode ID: dd63d83ceec4b95eca76c606194d6cfd8bbe9f629a2d0d0c00b368c3f4db30d8
              • Instruction ID: 8465e6b5637f1e6e2f20d84e646ac988bc49f0410578f471a02a5966f5481725
              • Opcode Fuzzy Hash: dd63d83ceec4b95eca76c606194d6cfd8bbe9f629a2d0d0c00b368c3f4db30d8
              • Instruction Fuzzy Hash: 16F06576E4CA10F2F711DBD5F849BE913A0A3D47A0F850122990EB22E5EFB8C8C2C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _snwprintf$_errno_invalid_parameter_noinfo
              • String ID: <LAlt>$<RAlt>
              • API String ID: 3682513478-2751853527
              • Opcode ID: a9f0457a17a344acafc6d0b291cc38d65f985b71abf054ea728c7e7b4c76ee66
              • Instruction ID: 129a367d0b074d2a8e64019c3a0b11b3b2cbfdba055c1890b33e8c9fe798a704
              • Opcode Fuzzy Hash: a9f0457a17a344acafc6d0b291cc38d65f985b71abf054ea728c7e7b4c76ee66
              • Instruction Fuzzy Hash: D5F03A76A08A44F1E720DB91E409BD923B4F348BA0F5501A2991EB3350DFA4C945C380
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: SetThreadErrorMode$kernel32.dll
              • API String ID: 2574300362-2080226504
              • Opcode ID: 083609c2db1c679f84eaa94bb10d9947de6566112fb50a4adefca3b3c2697270
              • Instruction ID: 821bda292443d3996e0d21f9f205e982e03153da9872f0710b710c810475d033
              • Opcode Fuzzy Hash: 083609c2db1c679f84eaa94bb10d9947de6566112fb50a4adefca3b3c2697270
              • Instruction Fuzzy Hash: F1E01A31104E4093E7A0DB64E80875973A2F78C394F440212D59D06A74DF7DC299C701
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: calloc$malloc
              • String ID:
              • API String ID: 1849211866-0
              • Opcode ID: 07ab07a60ab9044aa467c59ba9eda5ccefc7ec7a827272b935809317b253664b
              • Instruction ID: 117123e2593e88649eee1f352a436c460b4220a4dc3e7e80d464a6bea6983bee
              • Opcode Fuzzy Hash: 07ab07a60ab9044aa467c59ba9eda5ccefc7ec7a827272b935809317b253664b
              • Instruction Fuzzy Hash: E102DB32218B8492E7A4CB59F49979AB7A5F7C4784F149126EACD4BBA8DF7CC444CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID: @$data error
              • API String ID: 1294909896-2003774022
              • Opcode ID: b9bfb66e13597722efd53f610cecb8fb5c2cbbf8338c398701cb5df2b7c2b290
              • Instruction ID: 8510fd5be6a68018e26b44a219f5c190a2fd42ecbeeecf8b5ae7c4fdf83b3a5a
              • Opcode Fuzzy Hash: b9bfb66e13597722efd53f610cecb8fb5c2cbbf8338c398701cb5df2b7c2b290
              • Instruction Fuzzy Hash: 5E22BF76208B81A7EBA0CB69F458B9BB7E1F785784F104125DAC98BB58DF7DC844CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: 9d3fae3b913182020316e8d408d92b0493f9235b373a96aff1a0586f213521b9
              • Instruction ID: 0565654567e03431c3d3195826454c7ed6ae87e9bb0488c358bee1e40b7798d7
              • Opcode Fuzzy Hash: 9d3fae3b913182020316e8d408d92b0493f9235b373a96aff1a0586f213521b9
              • Instruction Fuzzy Hash: F5E11432218681D7EBE09BA9E458B1E77E1F7847D4F144525EA8D8B794DF78C848CF04
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: 767ccf97320330de263f9bb40be07dc8994c01f3744b01c4d393c73c94bb1f21
              • Instruction ID: de501bce9192c25bbf5446c358d38b0490e30d047f751d842d20d33db7d0e00b
              • Opcode Fuzzy Hash: 767ccf97320330de263f9bb40be07dc8994c01f3744b01c4d393c73c94bb1f21
              • Instruction Fuzzy Hash: F5218337214B8893EBB09B56E09871EA7B1F389B88F554215EACC4B7A4CF7CC945CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: 767ccf97320330de263f9bb40be07dc8994c01f3744b01c4d393c73c94bb1f21
              • Instruction ID: 959ac72778c9e36182bb3f0e904cc4ed668390f3f20eaacc5fd7f839d7f16b80
              • Opcode Fuzzy Hash: 767ccf97320330de263f9bb40be07dc8994c01f3744b01c4d393c73c94bb1f21
              • Instruction Fuzzy Hash: E221A336204B8893EBA49B56E08871AA7B1F788B48F514215EACD4BBA4CF7DC944CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: rand
              • String ID:
              • API String ID: 415692148-0
              • Opcode ID: ed6bf554bfff6b9a45289098e7d7e6728f9cbadbeda906988a6a97ac9c1bfca1
              • Instruction ID: 0b1262d7296730a3851e068e4d6abdc9bf66975df4c80cbbb0e2cc8b87eeb453
              • Opcode Fuzzy Hash: ed6bf554bfff6b9a45289098e7d7e6728f9cbadbeda906988a6a97ac9c1bfca1
              • Instruction Fuzzy Hash: 1EE1CE7720874597EBE0CB59E458B1AB7E1F788BD4F500126EA8D8BBA8DB78C544CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: ae1c41e8f55a2c86926dd828d29fa380c44f6c1b7a24ec4ecad43b64ee6fdbcc
              • Instruction ID: c89c45aeb4263557c4bd1d25f4ee3832194c463f5d0b2daea3d9fe5b1e33bad8
              • Opcode Fuzzy Hash: ae1c41e8f55a2c86926dd828d29fa380c44f6c1b7a24ec4ecad43b64ee6fdbcc
              • Instruction Fuzzy Hash: 6DD113333186819BE7F0DBA9E458B5EB7A1F784784F100525EA89CBB94DB79D448CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: callocmallocmemcpy_smemmove_s
              • String ID:
              • API String ID: 3989352486-0
              • Opcode ID: 19822e133ba44aaf2f2c473610b63a3d3511321b07b0f4c8c329c773f98d5a3d
              • Instruction ID: d5c14696500531077421b70c37342b6c4ee3c3668eb29e5085ae80eaf15cb555
              • Opcode Fuzzy Hash: 19822e133ba44aaf2f2c473610b63a3d3511321b07b0f4c8c329c773f98d5a3d
              • Instruction Fuzzy Hash: 72A11136214B85A7EBD0CBADE458B1AB7E1F7C5794F104025EA8A8BB64EF39C444CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: malloc$_snprintf
              • String ID: %s %s
              • API String ID: 4147802357-2939940506
              • Opcode ID: 68435554cd36b2d1dce5ab45086c9abcdae0e98eabb7d57b0f1df9df5d6140f3
              • Instruction ID: 464e69b2a74b2444a42a82290acaeb9fde9c6f74149db391f35b23d1fe2b81a3
              • Opcode Fuzzy Hash: 68435554cd36b2d1dce5ab45086c9abcdae0e98eabb7d57b0f1df9df5d6140f3
              • Instruction Fuzzy Hash: 6E811832B44F8496FB55CBA69408B6A6BE0F745B84F488125DF9A573C6EFB8C406C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free
              • String ID: *.*$iehistory$mapi
              • API String ID: 1294909896-3549654276
              • Opcode ID: 1abf7f794f6d09191c47d3ff15f83a8a805e85731a9abce61c457e3347678866
              • Instruction ID: 3b0a641bc673649aa58815e7ed9f4a555d25cba07da33427d35428e005de85f2
              • Opcode Fuzzy Hash: 1abf7f794f6d09191c47d3ff15f83a8a805e85731a9abce61c457e3347678866
              • Instruction Fuzzy Hash: 61919E72B40B40AAEF50DFA1D454AED33B1F754B88F808526DE4A63B98EF74C646C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastcallocfree
              • String ID: P%
              • API String ID: 2550761543-2959514604
              • Opcode ID: df2ba7436967e8bccd8a96100c71055cb77cbea2f05700d2d21d1939547bb40e
              • Instruction ID: 975354632d07b76fa8cf257364a485249c92174d6872a85521bac29e59881df1
              • Opcode Fuzzy Hash: df2ba7436967e8bccd8a96100c71055cb77cbea2f05700d2d21d1939547bb40e
              • Instruction Fuzzy Hash: C191EA36258B8497EBA0CBA5E45871EB7E1F7C8B94F100116FA9D87BA8DF78C544CB01
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3ab69efb2d87fd3e200a71f991c6a03de737a1530dffe167a31e300fc4d83295
              • Instruction ID: b9bcb5c04b24181cf2590fc8ae5aec80653ba8314f5964a8efab3d45a0ed5c99
              • Opcode Fuzzy Hash: 3ab69efb2d87fd3e200a71f991c6a03de737a1530dffe167a31e300fc4d83295
              • Instruction Fuzzy Hash: C781D236224B4497EB90DB6AE458B2A77A2F7C4B94F105515EE5E4B7E8DF38C844CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free$htonlmalloc
              • String ID:
              • API String ID: 568810363-0
              • Opcode ID: c1e2e4b3b834b2742be366ddb8f7aca5c01035fc9f29b6706ebf7d245d5260da
              • Instruction ID: 4525efb410821bb9ba7bbcb12f57f7c37522672a46a93b38f21dfa55e895c71a
              • Opcode Fuzzy Hash: c1e2e4b3b834b2742be366ddb8f7aca5c01035fc9f29b6706ebf7d245d5260da
              • Instruction Fuzzy Hash: A9819976218B8497DBA0DF65E088B5AB7A1F7C5B84F505016EBCA47BA8DF78C844CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$_callnewhfreemalloc
              • String ID:
              • API String ID: 3099215566-0
              • Opcode ID: bab57fdc92ed76bceed7fbf4e3f5a12e51f6b3f23785cdf08656ac47bfd46250
              • Instruction ID: 4480af88e32bcb615b4b85aed295b52f8965c56bbf62ba48dcd7a86438e91ca6
              • Opcode Fuzzy Hash: bab57fdc92ed76bceed7fbf4e3f5a12e51f6b3f23785cdf08656ac47bfd46250
              • Instruction Fuzzy Hash: 7E51F8726186809BD794CF68E494B1AB7B2F7C8784F205115FB8A8BB69DF79C841CF00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: htonl$Library$AddressFreeLoadProc
              • String ID:
              • API String ID: 3905280739-0
              • Opcode ID: f6cc4356139d136595636d18eaa36b4af537126db05a3b2cff5b69ba0107ec73
              • Instruction ID: 2cc4518296190ad62c0716b0f3b04639aca7f6bf37c5bf95af4c9754f2c52934
              • Opcode Fuzzy Hash: f6cc4356139d136595636d18eaa36b4af537126db05a3b2cff5b69ba0107ec73
              • Instruction Fuzzy Hash: EB5125B6A01B94DEE714CFB5D8887AD3BB1F744B98F00402ADE4A27B98DB78C459C744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ContextThread$ErrorLasthtonl
              • String ID:
              • API String ID: 3697063647-0
              • Opcode ID: 3e72485e887547924d30ecf914f6c77d810e540657494fd566ea8b9ed8e36e3f
              • Instruction ID: 66d5b8a675e4dcb798f1d9200c86f23da94ed659154133da1b1dd1cd852bec77
              • Opcode Fuzzy Hash: 3e72485e887547924d30ecf914f6c77d810e540657494fd566ea8b9ed8e36e3f
              • Instruction Fuzzy Hash: 81418172704B8593EB60CFA2E808B6A67A0F789FC5F544026DE4D97B59EFB8C505C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: _errnohtonl$AddressHandleModuleProc_calloc_implcallocfree
              • String ID:
              • API String ID: 3702241348-0
              • Opcode ID: a353da6aecc8a7f68d040641dd10a9fce14beae6869e57e0acc3eeedaa22756d
              • Instruction ID: 0c178640fb1fb54419be20002822981cfcb2547f015460f909dbfc62e821f11f
              • Opcode Fuzzy Hash: a353da6aecc8a7f68d040641dd10a9fce14beae6869e57e0acc3eeedaa22756d
              • Instruction Fuzzy Hash: D55146B2A04B80DEE750CFA4E44879D37B1F345368F404216EBAA67BC8DBB8C599C744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: htonl$freemalloc
              • String ID:
              • API String ID: 1249573706-0
              • Opcode ID: 1a4d609c4260e32384f4063f2ebf364937de1ec6e9471f5c1dd6f826de14de3a
              • Instruction ID: 685a277bd3021136931dfc91f39fcf41cf61029b8890708df67253616f6f7511
              • Opcode Fuzzy Hash: 1a4d609c4260e32384f4063f2ebf364937de1ec6e9471f5c1dd6f826de14de3a
              • Instruction Fuzzy Hash: A151AB766186408BD7A4CF69E094B1AB7E1F3C8748F505215FACA87BA8DB3DD5418F40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _amsg_exit_flush_lock_mtinitlocknum
              • String ID:
              • API String ID: 595854648-0
              • Opcode ID: f080c6d54ebb1e9bcab9313a283e6dd19c5f31b0f3fd22aa36b5dfeb18049f6a
              • Instruction ID: b0728be382fcb04f1ae9845a1417d12d1f98a42b797a22a1a9980478c475c944
              • Opcode Fuzzy Hash: f080c6d54ebb1e9bcab9313a283e6dd19c5f31b0f3fd22aa36b5dfeb18049f6a
              • Instruction Fuzzy Hash: 01317B3520074463FBE48FF6948EB6A9693AB8CF94F1816159E570FBE2CB38C481C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorFileLastNamedPeekPipeReadSleep
              • String ID:
              • API String ID: 3382443847-0
              • Opcode ID: 36464be5b928ddf9bf3cd2c32f09305229afb0ca037eddb2ed834c8bc830af9f
              • Instruction ID: 4a1fd698ed3bd52d4cd1913c53bdcee8d582d2d43bdbebfd5dd156f75bd17c89
              • Opcode Fuzzy Hash: 36464be5b928ddf9bf3cd2c32f09305229afb0ca037eddb2ed834c8bc830af9f
              • Instruction Fuzzy Hash: BB316D72B04F8297E7609BA2B848F5A63A0F789B84F454135EF89A3B54DF78C551C704
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: b2b9c30d6c31285107972dcce0f46adf72b66fbdda8aaac270d6c5b502cf59c1
              • Instruction ID: 1c500888439e33844cd1da307eeafd990ac2018d2c87a6ea2c0ef89f16a07a73
              • Opcode Fuzzy Hash: b2b9c30d6c31285107972dcce0f46adf72b66fbdda8aaac270d6c5b502cf59c1
              • Instruction Fuzzy Hash: 94416236605F8496DBA08F69E88074A77A4F388B98F144126DE8D97B68EF78C494CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: a7086a2882efe9afe4d72891320daf46dba836480783308d765adedd4aa15e32
              • Instruction ID: 178203d565fcb22b4a3c000a560401c738cb53953ad932eba38de329cc54abab
              • Opcode Fuzzy Hash: a7086a2882efe9afe4d72891320daf46dba836480783308d765adedd4aa15e32
              • Instruction Fuzzy Hash: 7A417336605F8496DBA08F69F48074E77A4F388B98F144126DF8D97B68EF78C494CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: b62e60b3f5ccbe2dd8ced59e8c39c202014cff6376ae91b59b90259bf114bf12
              • Instruction ID: 37e5896667dca903d20a26e2c36faf94d75172d377d255c7870c533f64c0ea4c
              • Opcode Fuzzy Hash: b62e60b3f5ccbe2dd8ced59e8c39c202014cff6376ae91b59b90259bf114bf12
              • Instruction Fuzzy Hash: 38416336605F8496DBA08F69F48074E77A4F388B98F144126DF8D97B68EF78C494CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: afe8c316c84c62fd3a065a4fb5e2c1b7341d8d05d04b75254077d39522da13dd
              • Instruction ID: e71e6bc07d3bf527b7bcb6d221a55f6ac77d37ecb5f99395abe17f3a3bc65828
              • Opcode Fuzzy Hash: afe8c316c84c62fd3a065a4fb5e2c1b7341d8d05d04b75254077d39522da13dd
              • Instruction Fuzzy Hash: 81317336605F8496DBA08F69F48074E77A4F388B98F104126DF8D93B68EF78C494CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 4a3bbf87ac19936af28eada4c7b5a692c00e025f3a5cc7bd92504db1154ef4a3
              • Instruction ID: be91ad74cad3b6371d485dbfd961b4a98a340a0b50e56b274cbeb747604f1ea8
              • Opcode Fuzzy Hash: 4a3bbf87ac19936af28eada4c7b5a692c00e025f3a5cc7bd92504db1154ef4a3
              • Instruction Fuzzy Hash: 00318336605F8486DBA08F69F48074E77A4F388B98F104126DF8D93B68EF78C494CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 61041e40f2561606ef8fbee9ff4edd0bbc4608b1d614a04faf459b7a51c4705a
              • Instruction ID: 53e7d7e77619863e9818aad44eb534f6d48b657ed7d20b9f9fc710afbc05c1c9
              • Opcode Fuzzy Hash: 61041e40f2561606ef8fbee9ff4edd0bbc4608b1d614a04faf459b7a51c4705a
              • Instruction Fuzzy Hash: 8F319336605F8486DBA08F69F48074E77A4F388B98F104126DF8D93B68EF78C494CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$CloseHandleNextThread32
              • String ID:
              • API String ID: 3034546079-0
              • Opcode ID: aec4a2b0bd95f6241514bc863d71b2255e2469b591946cd59780e87da6ecd847
              • Instruction ID: ad3bf0b606ce6241f1cdf4c72ad8929f7d851204a6fb1de0d9d87cd54993db2b
              • Opcode Fuzzy Hash: aec4a2b0bd95f6241514bc863d71b2255e2469b591946cd59780e87da6ecd847
              • Instruction Fuzzy Hash: 6C21A476B44B40D7EB609BA2E54876A63A1F78CFD0F444021DE89A3B55EFBCD501CB05
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 4a2fea5c17112d8d44599e0dfd56ec231b93e85a9a2e4f668c695b4ea578e954
              • Instruction ID: e6e7f2171471667c0d05765054c483b610a440b25842d1b090eb7420caf2a56e
              • Opcode Fuzzy Hash: 4a2fea5c17112d8d44599e0dfd56ec231b93e85a9a2e4f668c695b4ea578e954
              • Instruction Fuzzy Hash: C2319336605F8486DBA08F69F48074E77A4F388B98F104126DF8D93B68EF78C494CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Virtual$Alloc$LibraryLoadMemoryProcessWrite$AddressFreeHandleModuleProcstrrchr
              • String ID:
              • API String ID: 76982856-0
              • Opcode ID: e140eef7ca3731698891a2bcd5c82b68a28e790e871516885fcf39ade51d6b3d
              • Instruction ID: d648d77dc8c9da060ea76437013df58eb7031108f3844d7e3896820519ded4e3
              • Opcode Fuzzy Hash: e140eef7ca3731698891a2bcd5c82b68a28e790e871516885fcf39ade51d6b3d
              • Instruction Fuzzy Hash: 38310B31204B4093EB90DBB9F899B5AB3A2F7C8794F540125D98E4B7A4CF7DC585C700
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: d2dc9cc98bb9ba40a4f696e00e912281e306063a425ac1303bc342a991d4438c
              • Instruction ID: a98cf614145edde84a773aeea463a51667432be7acd3ab454853d79406dc397a
              • Opcode Fuzzy Hash: d2dc9cc98bb9ba40a4f696e00e912281e306063a425ac1303bc342a991d4438c
              • Instruction Fuzzy Hash: B931C436605F8486DBA08F69F48074E77A4F388BA8F104126DF8D53B68DF78C494CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
              • String ID:
              • API String ID: 4151157258-0
              • Opcode ID: b0d23f3fa0da5fa6e20ae43454cc5ba0bbb08d20c2c924f3f09bd53aa0dde170
              • Instruction ID: a4149ae2163325d176cb492a18684bb14b3f6b1c0ac418e58bc2f9cd9d38304b
              • Opcode Fuzzy Hash: b0d23f3fa0da5fa6e20ae43454cc5ba0bbb08d20c2c924f3f09bd53aa0dde170
              • Instruction Fuzzy Hash: 9C215CB2E043E071FB7067A59158B3DA6F0E3C0BD6F5D4525EA872BAC5C9ACC842C720
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 7a7d32f20e1435e171047a9ea03d0246d898c516d5e0b66592470f9daaafcd6c
              • Instruction ID: 17643ff67e11aefb4915eea4c29069867e17b2d710e7068ba9c96b29c5e7519c
              • Opcode Fuzzy Hash: 7a7d32f20e1435e171047a9ea03d0246d898c516d5e0b66592470f9daaafcd6c
              • Instruction Fuzzy Hash: F931B436605F4496DB648F69F48075E77A4F388BA8F101126DF8D53B68DF78C491CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
              • String ID:
              • API String ID: 4151157258-0
              • Opcode ID: 0905ea5d1d6877d7788902e3141d2462c87efc777c415f618fc4460f7ebd8957
              • Instruction ID: f2b031b380619ba4e1044f32a1373e7b9ddc6d92f978624eef1a53b146025143
              • Opcode Fuzzy Hash: 0905ea5d1d6877d7788902e3141d2462c87efc777c415f618fc4460f7ebd8957
              • Instruction Fuzzy Hash: 3F213672E082A2B1FB6017A19058B7DA6D1E380BD4F2C5421EB976BECACBA8C541C750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLastSleepselectsend
              • String ID:
              • API String ID: 3306477828-0
              • Opcode ID: 918c14bd7b12d78cf174c339a8be75b4101ecdb4595a4efdf14ad4e6086214c0
              • Instruction ID: eff1ba1978e910c01c9d3f11152138d88f9a36296f48e539fab4562ecf3c7630
              • Opcode Fuzzy Hash: 918c14bd7b12d78cf174c339a8be75b4101ecdb4595a4efdf14ad4e6086214c0
              • Instruction Fuzzy Hash: 83215632B18784A7EB60DFA1E48CB9E77B4F798B80F404526DA59A3B94DB78C444C780
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: AsyncCreateStateThreadcallocfree
              • String ID:
              • API String ID: 1391261026-0
              • Opcode ID: 8ea331d521ac2e4e81fa7cebc09ca57b493a23f257400f372c72906feae4b1c2
              • Instruction ID: 6f8f8a672f75c4dc6d7e0ac4179497965d1cfb1645c4cbd2b25c89562fb1d639
              • Opcode Fuzzy Hash: 8ea331d521ac2e4e81fa7cebc09ca57b493a23f257400f372c72906feae4b1c2
              • Instruction Fuzzy Hash: F4212F76A04B40E2FB04DF91F849B6A77A1F785B94F584426DA4A677A4DFBCC841C700
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 72ac9c761ac106d7e91ce607d9d103776cad95955984c88a7651a8bd569ced3c
              • Instruction ID: 10aa4cb1eb603cd3aecc1c0d865ca9491e94458a8711974e684d0e63c7bb9f5b
              • Opcode Fuzzy Hash: 72ac9c761ac106d7e91ce607d9d103776cad95955984c88a7651a8bd569ced3c
              • Instruction Fuzzy Hash: 8621C436605F8496DB648FA9F48075E77A4F388BA8F101126DF8E53B68DF78C491CB50
              APIs
              • CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CD3C
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CD4F
              • WriteFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CD97
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CDE2
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseCreateErrorHandleLastWrite
              • String ID:
              • API String ID: 1150274393-0
              • Opcode ID: e9829b33afac3a2a8b328ce8f451d27958ebe7d243e94f6bf6aa11b7a932b998
              • Instruction ID: 9dd967ebc3d689728e671b288aafb8ff47256accf29b36f79590c8da203378f5
              • Opcode Fuzzy Hash: e9829b33afac3a2a8b328ce8f451d27958ebe7d243e94f6bf6aa11b7a932b998
              • Instruction Fuzzy Hash: C631DB726186409BD760CF68F458B1ABBB1F3857A4F200219E7A987BD8DB7EC844CF40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorEventFileLastOverlappedReadResetResult
              • String ID:
              • API String ID: 1039749767-0
              • Opcode ID: ada5fe50e06014838f7bd00c876b089099aa9aa3267754176ada25cef5078a95
              • Instruction ID: b4323221b69ea0010e79b4e9ce3829621ce344c1a859e129652aa1f7ad0bf2d4
              • Opcode Fuzzy Hash: ada5fe50e06014838f7bd00c876b089099aa9aa3267754176ada25cef5078a95
              • Instruction Fuzzy Hash: B521F77622578197EBD18BB5E458B6BA7A1F7D4B84F005025FA4A8BBD8DF38C444CB40
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 90e69e9afa06c3974bfe8eed0568bedde42f048f28e75a4b8f22642663fa2f80
              • Instruction ID: e2cfbcfd0e35721dff6ec295b31f7b34a77c7afaceeafea28a0051af54ba4c6e
              • Opcode Fuzzy Hash: 90e69e9afa06c3974bfe8eed0568bedde42f048f28e75a4b8f22642663fa2f80
              • Instruction Fuzzy Hash: 1721D436605F8496DB648F99F48075E77A4F388BA8F101126DE8E53B68DF78C490CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: c0cd1c77f6e24788377c665dbfa692fac731fa66b160a37af0283adeed89901f
              • Instruction ID: 359194bc7a4a74ea1125fc29370492f4e0a76854f6aac6f9a188040b6f3e1a27
              • Opcode Fuzzy Hash: c0cd1c77f6e24788377c665dbfa692fac731fa66b160a37af0283adeed89901f
              • Instruction Fuzzy Hash: F021E436605F8496DB648F99F48075E77A4F388BA8F001126DE8E53B68DF78C490CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: b17048f3605008b953b34addcec862f7b0ac59f864253739523679d245e9a739
              • Instruction ID: 8d770a6c726de6a51698f98eb3edbad20eb4cbbbe6e922a26a88f74c68822bfc
              • Opcode Fuzzy Hash: b17048f3605008b953b34addcec862f7b0ac59f864253739523679d245e9a739
              • Instruction Fuzzy Hash: 2B21F436605B4496DB648F95F48475E77A4F388BA8F005126DE8E63B68DF78C490CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 976423b9656a6452779b8b9f5782de351ca9c0e93b353db427e95054c90f20a7
              • Instruction ID: 6886796e7655d1864697c4fde3dc8689e09a3a613e00c467c3f9f9efa9d9c1a1
              • Opcode Fuzzy Hash: 976423b9656a6452779b8b9f5782de351ca9c0e93b353db427e95054c90f20a7
              • Instruction Fuzzy Hash: 78212636605B4492EB648F95F48475E77B4F388BA8F005126DF8E63B68DF78C490CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide
              • String ID:
              • API String ID: 626452242-0
              • Opcode ID: 50c998272f27af9edd0328b38f89847052232a433b433938d757d35aa8247f7a
              • Instruction ID: 0bb7462c6a456fd74228face1373edc5f4b44fb1a769ac1b7302bb65d23c2995
              • Opcode Fuzzy Hash: 50c998272f27af9edd0328b38f89847052232a433b433938d757d35aa8247f7a
              • Instruction Fuzzy Hash: 2121FE32118B8097EBA0DBA6F45871BB7A2F785798F200519E7D94BB98DB7DC4448B01
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 5746d89d0b83ca40719fd2205ef5d53485dd379b7d5e7dc2ed8fecbcec8729ef
              • Instruction ID: 7bd3e265efc519f311cc358b0940d4aeb5683a8c8f6237597b4249570fbdc04f
              • Opcode Fuzzy Hash: 5746d89d0b83ca40719fd2205ef5d53485dd379b7d5e7dc2ed8fecbcec8729ef
              • Instruction Fuzzy Hash: 9E114836605B4092EB64CF95F48475E73A4F388BE8F005126DE8E63B58DF78C491CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 3e7628819223a86f227a963dcdc278a61384c0858bbf9d0acf65b33bb884723a
              • Instruction ID: 5ffba628dbf1db85d879d5e239f1fa8c3019e6bf049888d175b95d6eccb5f7c7
              • Opcode Fuzzy Hash: 3e7628819223a86f227a963dcdc278a61384c0858bbf9d0acf65b33bb884723a
              • Instruction Fuzzy Hash: 60113976605B4092EB64CF95F44475E73A4F388BE8F005126DE8E63B98DF78C495CB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: htonl
              • String ID:
              • API String ID: 2009864989-0
              • Opcode ID: fbdfd50c4e506deb77010849facf6a1ce5b8e026f1ed61bb804bfe40a57c883e
              • Instruction ID: cfed76c6952eaca8b8c26e465c4f95de77f4d74b36ff7bb446239b5ad4c40ec0
              • Opcode Fuzzy Hash: fbdfd50c4e506deb77010849facf6a1ce5b8e026f1ed61bb804bfe40a57c883e
              • Instruction Fuzzy Hash: 6A017CB3A00A81EBE7489FF2944924C37E1E709B34B18C325C6358A3D8EB7884D5CB20
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: aa98f7de1584b15507fa4a17be37555005ee15de53e15ded06f3532a50d7947d
              • Instruction ID: b50b4e940b7f4e9418c10fb57eff57f0b95c25c4d63ac5a4ed00838a1867fee8
              • Opcode Fuzzy Hash: aa98f7de1584b15507fa4a17be37555005ee15de53e15ded06f3532a50d7947d
              • Instruction Fuzzy Hash: 30115776605B4092EB248F95F44475E73A0F388BE8F004126DE8E63B98DF78C895CB50
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: b3f75b19b86892c7e106ed7e682513adc9095eceb4867b26c013f3c14fadee07
              • Instruction ID: 1bd918bf97a26802cb74dc9628bf29e588fba0e04f0130defd39867e64f9169a
              • Opcode Fuzzy Hash: b3f75b19b86892c7e106ed7e682513adc9095eceb4867b26c013f3c14fadee07
              • Instruction Fuzzy Hash: E6014876605B8092EB249F95F444B5E73A0F388BE8F004527DE8E63B98DF78C895C760
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 4b2e10e7c265b51ea59fecfb19629960b8adc43bfa9454758584f0ee8daf7f0b
              • Instruction ID: bb29e2fd2c6cb7d92f90dd51a8005988470119aa0885b2ee2defc727defbbbba
              • Opcode Fuzzy Hash: 4b2e10e7c265b51ea59fecfb19629960b8adc43bfa9454758584f0ee8daf7f0b
              • Instruction Fuzzy Hash: DE017C36604B4092E7249F95F444B5D63A0F388BE8F004427DE4A63794DF78C895C760
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 82d95210de489c2020ff652dbb332ce7a9a788ce6543578b6c6512c5c306744d
              • Instruction ID: 1c95a312b8e11ce6789ca3b12f028256ff470a316e00b2d4129de2bedf420139
              • Opcode Fuzzy Hash: 82d95210de489c2020ff652dbb332ce7a9a788ce6543578b6c6512c5c306744d
              • Instruction Fuzzy Hash: 6C018B36604B80A3EB249F94F444B6E63A0F388BE8F004427CE4A63B94DF78C8958760
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 4185a86188baf1e1936c135ccb65691e905285086dcb3ac576645b517027c0f9
              • Instruction ID: 6ecdcc706842829c84a6fdfea060d448b68597996c8f306a6c2b6e916032ae92
              • Opcode Fuzzy Hash: 4185a86188baf1e1936c135ccb65691e905285086dcb3ac576645b517027c0f9
              • Instruction Fuzzy Hash: 7C016D36605B40A3EB259F94F454B6E63A0F388BE4F005426DE4A63B94DF78C8958750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _errno$DuplicateErrorLastSocket_calloc_implcallocfree
              • String ID:
              • API String ID: 3321659797-0
              • Opcode ID: 91b43d0b998da2d443010618f3202ab0a2297b850d1b2379a2656786b8e2a99c
              • Instruction ID: 27f049ae769156f7587e7f2ae51aba88a30cc5ef2d0fde2c3dad7e1a707bbfbe
              • Opcode Fuzzy Hash: 91b43d0b998da2d443010618f3202ab0a2297b850d1b2379a2656786b8e2a99c
              • Instruction Fuzzy Hash: 47012536608B8493EBA0DBA5E45471AB3B1F3C8B84F104125EACD4BB69CF3CC655CB40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$CopyErrorFileLast
              • String ID:
              • API String ID: 2361750919-0
              • Opcode ID: 08b971a8897f4b3d9b7cd8a5975e4d2a662702f8203bbf77f7ff7a5d2b3de6a2
              • Instruction ID: 6130dfd8212ca00fce4b61c7469cc5e6eff46f0e71c20c1845ddb2afa151fd7d
              • Opcode Fuzzy Hash: 08b971a8897f4b3d9b7cd8a5975e4d2a662702f8203bbf77f7ff7a5d2b3de6a2
              • Instruction Fuzzy Hash: 73F04431B12B90D3FF949BA6A84CB6D63A1AB89FD0F485031ED0DA7B59DE78C4428740
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: 834f1d2574a2003f595f742e9d9cbb98ec3646baca90f34c204d0f9219fd8df1
              • Instruction ID: c31e793489da766f0562ff1081b7a5b75b4ea968d3d269f3c0e5319446ccc9c2
              • Opcode Fuzzy Hash: 834f1d2574a2003f595f742e9d9cbb98ec3646baca90f34c204d0f9219fd8df1
              • Instruction Fuzzy Hash: 0D018C32A05B40A3EB259FD4F458B6E62A0F3887E4F004426DE4B63B94DFBCC8958750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: LibraryStationWindow$AddressCloseCurrentDesktopsEnumFreeLoadOpenProcProcess
              • String ID:
              • API String ID: 688010510-0
              • Opcode ID: 7a9cdac373a70054b3c20df1c9dbe98048ed7a927ed2ccc06e9498efc7f87123
              • Instruction ID: 619eb208342cad2923f6b88ac1fb220a92e90c4592c6f3bcd06e6ad94548119e
              • Opcode Fuzzy Hash: 7a9cdac373a70054b3c20df1c9dbe98048ed7a927ed2ccc06e9498efc7f87123
              • Instruction Fuzzy Hash: 8C014471A14B4092EB109F51F84865AB7A4F78C7C0F444529E98E53B58EF7CC5058B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$ErrorFileLastMove
              • String ID:
              • API String ID: 2579794736-0
              • Opcode ID: 291b5438e7529929f52d0f386ec5ed61ff3bfae22bc219a404e2f600446a0a82
              • Instruction ID: 12bf290048b227deb6f3f5baf6b38457d84aa512ccc46779bba3d98adc526f00
              • Opcode Fuzzy Hash: 291b5438e7529929f52d0f386ec5ed61ff3bfae22bc219a404e2f600446a0a82
              • Instruction Fuzzy Hash: E0F04435B01B9093EF44AB92B84876D52A1A788FD0F485031ED09A7758DE78C8428740
              APIs
              • GetLastError.KERNEL32 ref: 0000022DA545611A
              • FormatMessageA.KERNEL32 ref: 0000022DA5456153
              • free.LIBCMT ref: 0000022DA5456175
                • Part of subcall function 0000022DA546AF38: RtlFreeHeap.NTDLL(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF4E
                • Part of subcall function 0000022DA546AF38: _errno.LIBCMT ref: 0000022DA546AF58
                • Part of subcall function 0000022DA546AF38: GetLastError.KERNEL32(?,?,00000000,0000022DA5471DA2,?,?,0000000D,0000022DA546F979,?,?,?,?,0000022DA546B016,?,?,0000000D), ref: 0000022DA546AF60
              • SetLastError.KERNEL32 ref: 0000022DA545617D
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: ErrorLast$FormatFreeHeapMessage_errnofree
              • String ID:
              • API String ID: 1334669472-0
              • Opcode ID: eaec3b1fcbc6324a5b24d51297b381d9c3f5b9d9b04bce02bb7abc97fde0c2db
              • Instruction ID: c8805acf7352cbb188ab5f869302aad29b492995e378895ad35dc48ffe94fada
              • Opcode Fuzzy Hash: eaec3b1fcbc6324a5b24d51297b381d9c3f5b9d9b04bce02bb7abc97fde0c2db
              • Instruction Fuzzy Hash: 1001AF32A05B40A3F7259FD0F408B6E62A0F3887E4F004426DE4B63B90DF7CC4958750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: CloseHandle$ProcessTerminatefree
              • String ID:
              • API String ID: 2486429917-0
              • Opcode ID: 412f049ddc23010ba7421f2826d06794b0c0760214997c0c1134fd8403da04d2
              • Instruction ID: fec5f5cb244ba9a23836ffa3184825a889c3ca0aaf3b3556782e6140c46c2ab0
              • Opcode Fuzzy Hash: 412f049ddc23010ba7421f2826d06794b0c0760214997c0c1134fd8403da04d2
              • Instruction Fuzzy Hash: 58F03A31B00B40A2EB48DFB2E999B3923A0FB89FC1F089121DE5AA7755CF78C4948340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _itow_s$xtow_s
              • String ID: nce tree
              • API String ID: 1082565867-362744757
              • Opcode ID: 9d0118cebba9a1c756e1499f0c9946bbbdd878b5642ec9ce9b0ae3c1da530d1d
              • Instruction ID: 3d8afb46d3584f7d9a81baae77015f69287cabea67636ea110a15496a0b97473
              • Opcode Fuzzy Hash: 9d0118cebba9a1c756e1499f0c9946bbbdd878b5642ec9ce9b0ae3c1da530d1d
              • Instruction Fuzzy Hash: F891A036219F8486DAA0CB5AF49475AB7A5F7C9B88F500126EACD87B69DF3CC1518B00
              APIs
                • Part of subcall function 0000022DA381CCE8: CreateFileA.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CD3C
                • Part of subcall function 0000022DA381CCE8: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CD4F
                • Part of subcall function 0000022DA381CCE8: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000022DA381C46D), ref: 0000022DA381CDE2
              • LoadLibraryA.KERNEL32 ref: 0000022DA381C491
              • GetLastError.KERNEL32 ref: 0000022DA381C4A4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$CloseCreateFileHandleLibraryLoad
              • String ID: W
              • API String ID: 3673398112-655174618
              • Opcode ID: e3eee38003e3cf380294a744880cad7600cb3248acc840b3d5760d4c8fa9dda4
              • Instruction ID: 87dd6a8be66e9b93cd0e87a1730757a1ec2416706f335f089dd9278676e1ea16
              • Opcode Fuzzy Hash: e3eee38003e3cf380294a744880cad7600cb3248acc840b3d5760d4c8fa9dda4
              • Instruction Fuzzy Hash: FF71F232118B8197E7D08BB5E498B5BB7F1F7C5784F101025FA8A8AAD9DF78C484DB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: Query_Sleep
              • String ID: %d.%s.%s
              • API String ID: 3064896189-4117531494
              • Opcode ID: b7551569b396200f6caaa90a9c90138e43f0c7a073e5991dea3db6b24b91ce12
              • Instruction ID: 89b8a7e9ebce6b842c37a98ece8a721f06e72d479b256cfeeefeead2ace5dda3
              • Opcode Fuzzy Hash: b7551569b396200f6caaa90a9c90138e43f0c7a073e5991dea3db6b24b91ce12
              • Instruction Fuzzy Hash: 7441D736628A8487DB908BA9E49471AB7E1F3D8B84F101116FB9A87B68DB78C541CF00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: callocswprintf
              • String ID: ree with lengths
              • API String ID: 2821977984-1206687603
              • Opcode ID: a13eb21bdaf03c154b25a5ef7839ee663a8d9d07b3730e9c2d6b5dff98bec649
              • Instruction ID: 742663577db0577207e102d591903af43a62f34382d77522470250ff2a8ce485
              • Opcode Fuzzy Hash: a13eb21bdaf03c154b25a5ef7839ee663a8d9d07b3730e9c2d6b5dff98bec649
              • Instruction Fuzzy Hash: 2F311036214B5593EBA08B59E49576AB7E1F3C8B88F504122EE8D8B7A4DF3CC945CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: _snwprintf_swcschr
              • String ID: compression method
              • API String ID: 1488494685-2394989468
              • Opcode ID: 53728fefee931a2ebb508c77460470079659acf6498bbc88df63689f9c6ebc03
              • Instruction ID: 34adb5114d6b6ccd60ae62ffa7c3748805c3102a5a54dbfe85f17fdfe4de0949
              • Opcode Fuzzy Hash: 53728fefee931a2ebb508c77460470079659acf6498bbc88df63689f9c6ebc03
              • Instruction Fuzzy Hash: 93316072218A81A3E760DF69E49479BB3A2F7C4744F504026E7C98AA98DF7DC548CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3274725884.0000022DA54B1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA54B0000, based on PE: true
              • Associated: 00000000.00000002.3274713840.0000022DA54B0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274741051.0000022DA54C7000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D0000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274754544.0000022DA54D4000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274778327.0000022DA54D5000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da54b0000_iDaD62by4N.jbxd
              Similarity
              • API ID: CloseHandleOpenProcess
              • String ID: \lsass.exe
              • API String ID: 39102293-316735421
              • Opcode ID: bf0a33010513eedd848553df734bc68e1ba21984676a669285f0801cc9d95d52
              • Instruction ID: dd703b3c5b58220df38c3c3ac12a07427de1718d84d5f6309a58327d0f339de3
              • Opcode Fuzzy Hash: bf0a33010513eedd848553df734bc68e1ba21984676a669285f0801cc9d95d52
              • Instruction Fuzzy Hash: B711E931B1468053EF34DBA6F5447D9A3E1FB8C7C4F450124EB5993789EFA8CA458600
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: freemalloc
              • String ID:
              • API String ID: 3061335427-0
              • Opcode ID: a05b3f4f0f8d26311a36f74e8274fc892ae58491887857d4bc6903f23e4cad06
              • Instruction ID: 83feff75f16f46ade7780198929becbeeb09e33466f2e402c4c42a8ded2a1775
              • Opcode Fuzzy Hash: a05b3f4f0f8d26311a36f74e8274fc892ae58491887857d4bc6903f23e4cad06
              • Instruction Fuzzy Hash: 1CD1DE32218AC5ABEBA0CB69E494B5AB7F1F7C9798F104115EA8D8B764DF3DC544CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274635801.0000022DA5441000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA5440000, based on PE: true
              • Associated: 00000000.00000002.3274624232.0000022DA5440000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274659850.0000022DA5481000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274675258.0000022DA5492000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA549C000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274688453.0000022DA54A1000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da5440000_iDaD62by4N.jbxd
              Similarity
              • API ID: free$EnvironmentErrorExpandLastStrings
              • String ID:
              • API String ID: 3442589191-0
              • Opcode ID: baed30adc81c547e3d95290c397dd71a1272d571384f4b9c6af5bc305874585a
              • Instruction ID: 8f3f8f029f9bac03bbd0fa2fb8666263724865c2847da666261651dcadc65ad4
              • Opcode Fuzzy Hash: baed30adc81c547e3d95290c397dd71a1272d571384f4b9c6af5bc305874585a
              • Instruction Fuzzy Hash: 0A21A436B05B8096EF64DB96A44476EA3B0FB59BC0F480121EE8DA3B59EFBCC4418744
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: rand$_getptd_time64
              • String ID:
              • API String ID: 245728536-0
              • Opcode ID: a82ec2cefcb129ea57a8b14f2c34b17ec677154b6f58ddc472dc0c179104e35e
              • Instruction ID: effad05f1a00a2761081a9c8813fc89f63de0c467134234108a5d1979f24a3fa
              • Opcode Fuzzy Hash: a82ec2cefcb129ea57a8b14f2c34b17ec677154b6f58ddc472dc0c179104e35e
              • Instruction Fuzzy Hash: 8E1123A1FA10C96BE79D967DDC2BB6855CB83D6309F2CD1389105CEFEAD82884018B80
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: rand$_getptd_time64
              • String ID:
              • API String ID: 245728536-0
              • Opcode ID: 0e148f07ddb71317180c8bd904ae471086d3e8f99d4f9070a4ddb8e7832b84cc
              • Instruction ID: 1bd117ea8981fb9b9c90c407c58b9a7fa85d3bf882cf234df6ba0d212d796f53
              • Opcode Fuzzy Hash: 0e148f07ddb71317180c8bd904ae471086d3e8f99d4f9070a4ddb8e7832b84cc
              • Instruction Fuzzy Hash: 031136A1BB11C55BE75C563DCC2BB6859CB43D5305F0CD13C9606CEFDADC2994158740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: 2a37156ca432fdc115037b5e2f48d20ad8716e6770901dbf48966f541b417b0c
              • Instruction ID: b1102936eef41a26b85059f997f950e30fe036aa09b6c358578b7edb89ca6c01
              • Opcode Fuzzy Hash: 2a37156ca432fdc115037b5e2f48d20ad8716e6770901dbf48966f541b417b0c
              • Instruction Fuzzy Hash: BA21DF36214A44A3E6A0DB5AD498B1E67B2F7C9F50F614111EB8D4B7A5CF39C844CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: d4d9540287774547a4cb37d8ebbd3f4ef39f27859966a3cd75a83bf78070c9e3
              • Instruction ID: 1a137bda8815c7ac6a9741f7e61b2aed45e0680b7f443787454bbd179d101e31
              • Opcode Fuzzy Hash: d4d9540287774547a4cb37d8ebbd3f4ef39f27859966a3cd75a83bf78070c9e3
              • Instruction Fuzzy Hash: C121FC36214A4493EAA4DB66D498B5EA7B2F7C5B40F504111EFCD8B7E5CF7DC9448B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandlefree
              • String ID:
              • API String ID: 3486141430-0
              • Opcode ID: 838ed654071c40631eda68f631fbb792f4393b7b9ff441844346000101387389
              • Instruction ID: a2d4df9bf2ffeb50d2900a6cfc7930deee04dc49d67cac4efcf01f9d903ff49e
              • Opcode Fuzzy Hash: 838ed654071c40631eda68f631fbb792f4393b7b9ff441844346000101387389
              • Instruction Fuzzy Hash: B6313332225F8592EBD18B65D498B5A63A1F7C4F60F401321FAAE8B7E4DF38C941C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274464449.0000022DA37C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000022DA37C0000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da37c0000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: e2e7b0ecd4029482a230d8a698a84c1a780103b3f3023d1571aef2a8f1808391
              • Instruction ID: a4bf19229405a140c6bac44e35ebdd638d4b07174fb74ec332d6f1af8ef63780
              • Opcode Fuzzy Hash: e2e7b0ecd4029482a230d8a698a84c1a780103b3f3023d1571aef2a8f1808391
              • Instruction Fuzzy Hash: BA218636224B89A2EBD19B5AE498B5E77A1F7C4F44F511012FE8E4BBA4CF78C844C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: e2e7b0ecd4029482a230d8a698a84c1a780103b3f3023d1571aef2a8f1808391
              • Instruction ID: 82ab1bfaa579ccd34efaee77a137c0d6925c757eb4b9d6338c9e569b236f8253
              • Opcode Fuzzy Hash: e2e7b0ecd4029482a230d8a698a84c1a780103b3f3023d1571aef2a8f1808391
              • Instruction Fuzzy Hash: F821AC76635B4892EB949B96D488B1EA7A1F3C4B40F511011FE5A4B7A4DF78C444C741
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$free
              • String ID:
              • API String ID: 1609210156-0
              • Opcode ID: 357d3d16d2c0a9f6b64f96e843bc8c51d6786ed4f0a8e0156c311bf668da9696
              • Instruction ID: c07e501d7d91dc1ed29b693a10e0e8fc7db7dbba1c7b98267ecea024f3715986
              • Opcode Fuzzy Hash: 357d3d16d2c0a9f6b64f96e843bc8c51d6786ed4f0a8e0156c311bf668da9696
              • Instruction Fuzzy Hash: 48219A36204B8892DBA0DB66E89875A77B1F7C8B84F454122EE8D47BA5DF3DC581CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3274501460.0000022DA3811000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000022DA3810000, based on PE: true
              • Associated: 00000000.00000002.3274489665.0000022DA3810000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274522975.0000022DA3848000.00000002.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3852000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274536335.0000022DA3859000.00000004.00001000.00020000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.3274561789.0000022DA385B000.00000002.00001000.00020000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_22da3810000_iDaD62by4N.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide
              • String ID:
              • API String ID: 626452242-0
              • Opcode ID: 7d43caf65be07134105767492c5b0294db6c666b17a0894c8eb58e72d45b9cff
              • Instruction ID: 2f4bf29b921be9a9b81d0983fe3a0ccb4b7979dda4831bcdc557f2442b2626e2
              • Opcode Fuzzy Hash: 7d43caf65be07134105767492c5b0294db6c666b17a0894c8eb58e72d45b9cff
              • Instruction Fuzzy Hash: 2A113372618B809BE7E09BB1E44871AA7A2F7C4794F101115FA9A4BBD4DB7CC0448B41