Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vYeaC4s9zP.exe

Overview

General Information

Sample name:vYeaC4s9zP.exe
renamed because original name is a hash value
Original sample name:26cb6c247cdfb5215bc60ac7abd12322.exe
Analysis ID:1583860
MD5:26cb6c247cdfb5215bc60ac7abd12322
SHA1:d1ca8142469039a57cb43d3bebe369d0a00aa08b
SHA256:da7c7cbc0d451b55c5a9312532b3e07d52e25399cb10e96cb2479a10407d4600
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry

Classification

  • System is w10x64
  • vYeaC4s9zP.exe (PID: 1216 cmdline: "C:\Users\user\Desktop\vYeaC4s9zP.exe" MD5: 26CB6C247CDFB5215BC60AC7ABD12322)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
vYeaC4s9zP.exeJoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: vYeaC4s9zP.exe PID: 1216JoeSecurity_GhostRatYara detected GhostRatJoe Security
      SourceRuleDescriptionAuthorStrings
      0.0.vYeaC4s9zP.exe.7ff6b2990000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
        0.2.vYeaC4s9zP.exe.7ff6b2990000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 27.124.4.60, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\vYeaC4s9zP.exe, Initiated: true, ProcessId: 1216, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-03T18:47:02.929641+010020528751A Network Trojan was detected192.168.2.54970427.124.4.604433TCP
          2025-01-03T18:48:08.634869+010020528751A Network Trojan was detected192.168.2.54970427.124.4.604433TCP
          2025-01-03T18:49:15.394711+010020528751A Network Trojan was detected192.168.2.54997927.124.4.6010443TCP
          2025-01-03T18:50:19.461038+010020528751A Network Trojan was detected192.168.2.54998227.124.4.604433TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: vYeaC4s9zP.exeReversingLabs: Detection: 52%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: vYeaC4s9zP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: z:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: x:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: v:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: t:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: r:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: p:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: n:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: l:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: j:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: h:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: f:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: b:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: y:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: w:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: u:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: s:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: q:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: o:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: m:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: k:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: i:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: g:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: e:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile opened: [:Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B299F410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C3EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6B29C3EF0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.5:49704 -> 27.124.4.60:4433
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.5:49979 -> 27.124.4.60:10443
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.5:49982 -> 27.124.4.60:4433
          Source: global trafficTCP traffic: 192.168.2.5:49704 -> 27.124.4.60:4433
          Source: Joe Sandbox ViewASN Name: BCPL-SGBGPNETGlobalASNSG BCPL-SGBGPNETGlobalASNSG
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: unknownTCP traffic detected without corresponding DNS query: 27.124.4.60
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2993B00 select,recv,timeGetTime,0_2_00007FF6B2993B00

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: [esc]0_2_00007FF6B299ADB0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A0E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B29A0E20
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A0E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B29A0E20
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A0E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B29A0E20
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B299FD10
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2997250 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF6B2997250
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AC1B0: CreateFileA,DeviceIoControl,0_2_00007FF6B29AC1B0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6B299E3E9
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6B299E4EE
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6B299E46D
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B8C100_2_00007FF6B29B8C10
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299F4100_2_00007FF6B299F410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB5000_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29915000_2_00007FF6B2991500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299FD100_2_00007FF6B299FD10
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29979E00_2_00007FF6B29979E0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F00_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29972500_2_00007FF6B2997250
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29980400_2_00007FF6B2998040
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C1DA80_2_00007FF6B29C1DA8
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AAD800_2_00007FF6B29AAD80
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299B4100_2_00007FF6B299B410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299D4100_2_00007FF6B299D410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B536C0_2_00007FF6B29B536C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B73400_2_00007FF6B29B7340
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BB3500_2_00007FF6B29BB350
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BC51C0_2_00007FF6B29BC51C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BFD300_2_00007FF6B29BFD30
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C5D340_2_00007FF6B29C5D34
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BA4F80_2_00007FF6B29BA4F8
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BAC800_2_00007FF6B29BAC80
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BF21C0_2_00007FF6B29BF21C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B62280_2_00007FF6B29B6228
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B51680_2_00007FF6B29B5168
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C714C0_2_00007FF6B29C714C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BD3200_2_00007FF6B29BD320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29993200_2_00007FF6B2999320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A92500_2_00007FF6B29A9250
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C20240_2_00007FF6B29C2024
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C37600_2_00007FF6B29C3760
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B4F5C0_2_00007FF6B29B4F5C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C27440_2_00007FF6B29C2744
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B6F3C0_2_00007FF6B29B6F3C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29997A00_2_00007FF6B29997A0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B577C0_2_00007FF6B29B577C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A78F00_2_00007FF6B29A78F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A09000_2_00007FF6B29A0900
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B4D580_2_00007FF6B29B4D58
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299CD400_2_00007FF6B299CD40
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AA5A00_2_00007FF6B29AA5A0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299ADB00_2_00007FF6B299ADB0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B65AC0_2_00007FF6B29B65AC
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C85840_2_00007FF6B29C8584
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B55780_2_00007FF6B29B5578
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C3EF00_2_00007FF6B29C3EF0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29A2EC00_2_00007FF6B29A2EC0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2992E500_2_00007FF6B2992E50
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29BF6B00_2_00007FF6B29BF6B0
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6B299E3E9
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6B299E4EE
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF6B299E46D
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2999320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6B2999320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B299F410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29979E0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CoCreateInstance,wsprintfW,RegOpenKeyExW,RegQueryValueExW,lstrcatW,lstrcatW,RegCloseKey,lstrlenW,lstrcatW,CloseHandle,lstrcatW,lstrcatW,0_2_00007FF6B29979E0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeMutant created: \Sessions\1\BaseNamedObjects\????
          Source: vYeaC4s9zP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: vYeaC4s9zP.exeReversingLabs: Detection: 52%
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: dinput8.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: inputhost.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
          Source: vYeaC4s9zP.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: vYeaC4s9zP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: vYeaC4s9zP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299E36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF6B299E36A
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-21519
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeStalling execution: Execution stalls by calling Sleepgraph_0-21060
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeWindow / User API: threadDelayed 3355Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeWindow / User API: threadDelayed 5945Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-21550
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-21595
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 6180Thread sleep count: 149 > 30Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 6180Thread sleep time: -149000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 2228Thread sleep count: 3355 > 30Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 2228Thread sleep time: -33550s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 6180Thread sleep count: 5945 > 30Jump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exe TID: 6180Thread sleep time: -5945000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B299F410
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C3EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6B29C3EF0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29991A0 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_00007FF6B29991A0
          Source: vYeaC4s9zP.exe, 00000000.00000002.4457353364.00000232B0997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: vYeaC4s9zP.exe, 00000000.00000002.4457353364.00000232B0997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AC70C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6B29AC70C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29962F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2998690 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_00007FF6B2998690
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29ABCD0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF6B29ABCD0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29B3A6C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B29B3A6C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AE8E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6B29AE8E0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AE54C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B29AE54C
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AE6F4 SetUnhandledExceptionFilter,0_2_00007FF6B29AE6F4

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2999320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6B2999320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B2999320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF6B2999320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF6B2999320
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: vYeaC4s9zP.exe, 00000000.00000002.4457353364.00000232B0A2D000.00000004.00000020.00020000.00000000.sdmp, vYeaC4s9zP.exe, 00000000.00000003.3401375137.00000232B0A5C000.00000004.00000020.00020000.00000000.sdmp, vYeaC4s9zP.exe, 00000000.00000003.2993766265.00000232B0A62000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
          Source: vYeaC4s9zP.exe, 00000000.00000002.4457353364.00000232B0A3B000.00000004.00000020.00020000.00000000.sdmp, vYeaC4s9zP.exe, 00000000.00000002.4457721462.00000232B3750000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29CC8C0 cpuid 0_2_00007FF6B29CC8C0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6B29962F0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6B29C7BA0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetLocaleInfoW,0_2_00007FF6B29C0D10
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: EnumSystemLocalesW,0_2_00007FF6B29C7B08
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: EnumSystemLocalesW,0_2_00007FF6B29C7A38
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetLocaleInfoW,0_2_00007FF6B29C7FF0
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6B29C7F40
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6B29C8124
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: EnumSystemLocalesW,0_2_00007FF6B29C0838
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: GetLocaleInfoW,0_2_00007FF6B29C7DE8
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6B29C76DC
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29AB500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF6B29AB500
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B29C1DA8 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6B29C1DA8
          Source: C:\Users\user\Desktop\vYeaC4s9zP.exeCode function: 0_2_00007FF6B299FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B299FD10
          Source: vYeaC4s9zP.exe, 00000000.00000000.2002290232.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmp, vYeaC4s9zP.exe, 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: vYeaC4s9zP.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.vYeaC4s9zP.exe.7ff6b2990000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.vYeaC4s9zP.exe.7ff6b2990000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: vYeaC4s9zP.exe PID: 1216, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: vYeaC4s9zP.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.vYeaC4s9zP.exe.7ff6b2990000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.vYeaC4s9zP.exe.7ff6b2990000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: vYeaC4s9zP.exe PID: 1216, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Replication Through Removable Media
          12
          Native API
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Modify Registry
          121
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Screen Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Windows Service
          1
          Virtualization/Sandbox Evasion
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol121
          Input Capture
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
          Process Injection
          1
          Access Token Manipulation
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          211
          Process Injection
          NTDS3
          Process Discovery
          Distributed Component Object Model3
          Clipboard Data
          Protocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Indicator Removal
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials11
          Peripheral Device Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          vYeaC4s9zP.exe53%ReversingLabsWin64.Trojan.SpywareX
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          27.124.4.60
          unknownSingapore
          64050BCPL-SGBGPNETGlobalASNSGtrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1583860
          Start date and time:2025-01-03 18:46:08 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 46s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:vYeaC4s9zP.exe
          renamed because original name is a hash value
          Original Sample Name:26cb6c247cdfb5215bc60ac7abd12322.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 43
          • Number of non-executed functions: 118
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45, 4.245.163.56
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • VT rate limit hit for: vYeaC4s9zP.exe
          TimeTypeDescription
          12:47:29API Interceptor6249292x Sleep call for process: vYeaC4s9zP.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          BCPL-SGBGPNETGlobalASNSGPayment Receipt.exeGet hashmaliciousFormBookBrowse
          • 134.122.133.80
          BrSgiTp1iH.exeGet hashmaliciousGhostRatBrowse
          • 134.122.135.95
          http://smbc.usobd.comGet hashmaliciousUnknownBrowse
          • 134.122.128.92
          zhuzhu.exeGet hashmaliciousGhostRat, XRedBrowse
          • 118.107.44.219
          017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
          • 27.124.34.140
          Lets-x64.exeGet hashmaliciousNitol, ZegostBrowse
          • 202.79.169.178
          KL-3.1.16.exeGet hashmaliciousNitol, ZegostBrowse
          • 143.92.60.116
          Whyet-4.9.exeGet hashmaliciousNitol, ZegostBrowse
          • 118.107.45.13
          QQyisSetups64.exeGet hashmaliciousGhostRatBrowse
          • 118.107.44.219
          wyySetups64.exeGet hashmaliciousGhostRatBrowse
          • 118.107.44.219
          No context
          No context
          Process:C:\Users\user\Desktop\vYeaC4s9zP.exe
          File Type:data
          Category:dropped
          Size (bytes):30
          Entropy (8bit):2.6616157143988106
          Encrypted:false
          SSDEEP:3:tblM6lEjln:tbhEZn
          MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
          SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
          SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
          SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
          Malicious:true
          Reputation:moderate, very likely benign file
          Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.060229389313906
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:vYeaC4s9zP.exe
          File size:389'632 bytes
          MD5:26cb6c247cdfb5215bc60ac7abd12322
          SHA1:d1ca8142469039a57cb43d3bebe369d0a00aa08b
          SHA256:da7c7cbc0d451b55c5a9312532b3e07d52e25399cb10e96cb2479a10407d4600
          SHA512:188e695ca51398726ead3b322f9069c0984779fbd58dbbddaf5bf50175eb09231c0ecb32b90625e1dd4deb805c34cff779add38e5c184450b2909f5508fcb649
          SSDEEP:6144:gKtL0RSVgMoEao8ItdKwzBFdYmT+xmyiRLBVgLhkM:ltwSqEao8It4wlDCxmPkx
          TLSH:B2848E49F79405F8E5678138C9634916EBB27C6D03A09BDF33A4866A2F237D0AD3E711
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........A...A...A.......D...............@.......@...Q(..K...Q(..S...Q(..........U.......X...A...m....)..S....)..@...RichA..........
          Icon Hash:00928e8e8686b000
          Entrypoint:0x14001e13c
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x677168C7 [Sun Dec 29 15:20:39 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:d7444b6dc7c8cddb50fba5269ad57bce
          Instruction
          dec eax
          sub esp, 28h
          call 00007F94BD06CB60h
          dec eax
          add esp, 28h
          jmp 00007F94BD06C3B7h
          int3
          int3
          dec eax
          sub esp, 28h
          dec ebp
          mov eax, dword ptr [ecx+38h]
          dec eax
          mov ecx, edx
          dec ecx
          mov edx, ecx
          call 00007F94BD06C552h
          mov eax, 00000001h
          dec eax
          add esp, 28h
          ret
          int3
          int3
          int3
          inc eax
          push ebx
          inc ebp
          mov ebx, dword ptr [eax]
          dec eax
          mov ebx, edx
          inc ecx
          and ebx, FFFFFFF8h
          dec esp
          mov ecx, ecx
          inc ecx
          test byte ptr [eax], 00000004h
          dec esp
          mov edx, ecx
          je 00007F94BD06C555h
          inc ecx
          mov eax, dword ptr [eax+08h]
          dec ebp
          arpl word ptr [eax+04h], dx
          neg eax
          dec esp
          add edx, ecx
          dec eax
          arpl ax, cx
          dec esp
          and edx, ecx
          dec ecx
          arpl bx, ax
          dec edx
          mov edx, dword ptr [eax+edx]
          dec eax
          mov eax, dword ptr [ebx+10h]
          mov ecx, dword ptr [eax+08h]
          dec eax
          mov eax, dword ptr [ebx+08h]
          test byte ptr [ecx+eax+03h], 0000000Fh
          je 00007F94BD06C54Dh
          movzx eax, byte ptr [ecx+eax+03h]
          and eax, FFFFFFF0h
          dec esp
          add ecx, eax
          dec esp
          xor ecx, edx
          dec ecx
          mov ecx, ecx
          pop ebx
          jmp 00007F94BD06C55Ah
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          cmp ecx, dword ptr [00036E59h]
          jne 00007F94BD06C552h
          dec eax
          rol ecx, 10h
          test cx, FFFFh
          jne 00007F94BD06C543h
          ret
          dec eax
          ror ecx, 10h
          jmp 00007F94BD06CC5Bh
          int3
          int3
          dec eax
          mov dword ptr [esp+00h], ebx
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x523b00x104.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3420.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc80.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7b00x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6700x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x918.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x3dbf00x3dc00d3f6189e43bbd290b28f7518c02b76a1False0.5461593813259109data6.462564110280856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x3f0000x1519e0x1520013c0b12c937ab96a5d21e4441a19f16cFalse0.4149986131656805data4.932093126288018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x550000xaa6c0x7c0038d4eff7b357db402101654f0fe35b27False0.10600428427419355DOS executable (block device driver \377\3)1.5549509551669303IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x600000x34200x360020b7b9769859dd90801ea597a1d992beFalse0.4626736111111111data5.517914471579984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x640000xc800xe00316f5780e4a2c74c1946985bacab1ae4False0.4916294642857143data5.228910762857474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          DLLImport
          KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetVersion, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, HeapFree, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
          USER32.dllMsgWaitForMultipleObjects, GetWindowTextW, wsprintfW, GetForegroundWindow, GetLastInputInfo, GetClipboardData, CloseClipboard, OpenClipboard, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, ExitWindowsEx, EmptyClipboard, GetSystemMetrics, GetDC, GetInputState, PostThreadMessageA, TranslateMessage, DispatchMessageW, PeekMessageW, ShowWindow
          GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
          ADVAPI32.dllOpenProcessToken, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, RegQueryInfoKeyW, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
          SHELL32.dllSHGetFolderPathW
          ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoInitialize, CoUninitialize, CoCreateInstance
          OLEAUT32.dllSysFreeString
          WS2_32.dllWSASetLastError, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, WSAGetLastError, WSACleanup, WSAIoctl, closesocket, WSACreateEvent, select, WSAStartup, send, socket, connect, recv, htons, setsockopt, inet_ntoa, WSACloseEvent, gethostbyname, gethostname, shutdown
          WINMM.dlltimeGetTime
          gdiplus.dllGdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipCloneImage, GdipAlloc, GdiplusShutdown, GdipDrawImageI, GdipCreateBitmapFromScan0, GdipCreateBitmapFromHBITMAP, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipFree, GdipGetImagePixelFormat, GdipDisposeImage, GdipSaveImageToStream, GdipBitmapLockBits, GdipGetImagePaletteSize, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders
          dxgi.dllCreateDXGIFactory
          DINPUT8.dllDirectInput8Create
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-01-03T18:47:02.929641+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.54970427.124.4.604433TCP
          2025-01-03T18:48:08.634869+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.54970427.124.4.604433TCP
          2025-01-03T18:49:15.394711+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.54997927.124.4.6010443TCP
          2025-01-03T18:50:19.461038+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.54998227.124.4.604433TCP
          TimestampSource PortDest PortSource IPDest IP
          Jan 3, 2025 18:47:01.539664030 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:01.544502974 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:01.544594049 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:02.318195105 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:02.323122025 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.323139906 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.323151112 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.323277950 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.832179070 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.884821892 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:02.924619913 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:02.929469109 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.929480076 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.929488897 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.929569960 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:02.929641008 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:02.934348106 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:18.541146040 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:18.545909882 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:18.841541052 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:18.884809971 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:35.744191885 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:35.749047995 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:36.044631004 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:36.088000059 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:52.135030985 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:47:52.139791012 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:52.584821939 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:47:52.634732008 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:08.634869099 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:08.634964943 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:08.639667034 CET44334970427.124.4.60192.168.2.5
          Jan 3, 2025 18:48:08.639723063 CET497044433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:13.589364052 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:13.594346046 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:13.594434023 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:14.445863008 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:14.450746059 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:14.450762987 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:14.450771093 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:14.450844049 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.024406910 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.141279936 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:15.146148920 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.146173954 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.146184921 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.146217108 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:15.146363974 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:15.151034117 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:29.541017056 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:29.541117907 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:29.545862913 CET104434997727.124.4.60192.168.2.5
          Jan 3, 2025 18:48:29.545917988 CET4997710443192.168.2.527.124.4.60
          Jan 3, 2025 18:48:34.503190994 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:34.508099079 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:34.508199930 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:35.338960886 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:35.343863010 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.343880892 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.343939066 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.344003916 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.696419954 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.744044065 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:35.798353910 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:35.803508043 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.803527117 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.803539038 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.803553104 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:35.803558111 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:35.808348894 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:51.651451111 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:48:51.656332016 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:51.959949017 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:48:52.009646893 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:08.244127035 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:08.244180918 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:08.250267982 CET44334997827.124.4.60192.168.2.5
          Jan 3, 2025 18:49:08.250327110 CET499784433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:13.197494030 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:13.202337027 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:13.202416897 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:14.749775887 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:14.754604101 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:14.754693985 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:14.754703045 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:14.754762888 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.309130907 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.353349924 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:15.389827967 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:15.394653082 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.394663095 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.394670010 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.394711018 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:15.394778967 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:15.399530888 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:29.556636095 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:29.556749105 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:29.562632084 CET104434997927.124.4.60192.168.2.5
          Jan 3, 2025 18:49:29.562691927 CET4997910443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:34.510080099 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:34.514926910 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:34.515021086 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:35.289638042 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:35.294584990 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.294595957 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.294651031 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.294658899 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.645710945 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.697072029 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:35.754518986 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:35.759339094 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.759349108 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.759356022 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.759394884 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:35.759496927 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:35.764121056 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:51.165927887 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:51.165990114 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:51.170815945 CET44334998027.124.4.60192.168.2.5
          Jan 3, 2025 18:49:51.170876980 CET499804433192.168.2.527.124.4.60
          Jan 3, 2025 18:49:56.119447947 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:56.124392986 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:56.127475023 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:56.988761902 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:57.171279907 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.171341896 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.171353102 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.171361923 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.580425978 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.679378986 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:57.684276104 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.684319019 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:49:57.684355021 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.684401035 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.684411049 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:49:57.689100027 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:50:12.556510925 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:12.556545019 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:12.561317921 CET104434998127.124.4.60192.168.2.5
          Jan 3, 2025 18:50:12.561408043 CET4998110443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:17.510011911 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:17.514879942 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:17.515064001 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:18.994870901 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:19.000178099 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.000191927 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.000252008 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.000262022 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.346244097 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.400150061 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:19.456024885 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:19.460963011 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.460987091 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.460995913 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.461004972 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:19.461038113 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:19.465773106 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:34.790818930 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:34.790875912 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:34.795619011 CET44334998227.124.4.60192.168.2.5
          Jan 3, 2025 18:50:34.797878981 CET499824433192.168.2.527.124.4.60
          Jan 3, 2025 18:50:39.744297028 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:39.749154091 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:39.750062943 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:40.617860079 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:40.622762918 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:40.622776031 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:40.622783899 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:40.622916937 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.187941074 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.243880033 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:41.442517042 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:41.447504044 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.447518110 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.447525978 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.447534084 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:41.447587013 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:41.452334881 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:55.853358030 CET4998310443192.168.2.527.124.4.60
          Jan 3, 2025 18:50:55.858172894 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:56.155967951 CET104434998327.124.4.60192.168.2.5
          Jan 3, 2025 18:50:56.243864059 CET4998310443192.168.2.527.124.4.60

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:12:46:53
          Start date:03/01/2025
          Path:C:\Users\user\Desktop\vYeaC4s9zP.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\vYeaC4s9zP.exe"
          Imagebase:0x7ff6b2990000
          File size:389'632 bytes
          MD5 hash:26CB6C247CDFB5215BC60AC7ABD12322
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:7.6%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:38%
            Total number of Nodes:1041
            Total number of Limit Nodes:42
            execution_graph 22207 7ff6b299b3e0 CloseHandle RtlPcToFileHeader RaiseException 22289 7ff6b29a1ce0 48 API calls 22291 7ff6b29adedc 59 API calls 2 library calls 22294 7ff6b29c3ef0 54 API calls 5 library calls 22211 7ff6b2993ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22295 7ff6b29ae0ee GetModuleHandleW BuildCatchObjectHelperInternal 22212 7ff6b2999df0 49 API calls 22213 7ff6b299eff2 188 API calls 22214 7ff6b29c7de8 55 API calls 4 library calls 22299 7ff6b29bc8e8 11 API calls 22216 7ff6b299e3e9 14 API calls 21021 7ff6b29adfc0 21044 7ff6b29adc60 21021->21044 21024 7ff6b29adfe1 21027 7ff6b29ae121 21024->21027 21029 7ff6b29adfff 21024->21029 21025 7ff6b29ae117 21064 7ff6b29ae54c 7 API calls 2 library calls 21025->21064 21065 7ff6b29ae54c 7 API calls 2 library calls 21027->21065 21030 7ff6b29ae024 21029->21030 21035 7ff6b29ae041 __scrt_release_startup_lock 21029->21035 21050 7ff6b29bcb44 21029->21050 21032 7ff6b29ae12c BuildCatchObjectHelperInternal 21033 7ff6b29ae0aa 21054 7ff6b29bc44c 21033->21054 21035->21033 21061 7ff6b29bbd34 47 API calls 21035->21061 21037 7ff6b29ae0af 21060 7ff6b29abcd0 10 API calls 21037->21060 21039 7ff6b29ae0cc 21062 7ff6b29ae6a0 GetModuleHandleW 21039->21062 21041 7ff6b29ae0d3 21041->21032 21063 7ff6b29adde4 7 API calls 21041->21063 21043 7ff6b29ae0ea 21043->21030 21045 7ff6b29adc68 21044->21045 21046 7ff6b29adc74 __scrt_dllmain_crt_thread_attach 21045->21046 21047 7ff6b29adc7d 21046->21047 21048 7ff6b29adc81 21046->21048 21047->21024 21047->21025 21048->21047 21066 7ff6b29b0128 7 API calls 2 library calls 21048->21066 21051 7ff6b29bcb7a 21050->21051 21052 7ff6b29bcb49 21050->21052 21051->21035 21052->21051 21067 7ff6b2991000 WSAStartup 21052->21067 21055 7ff6b29bc45c 21054->21055 21058 7ff6b29bc471 21054->21058 21055->21058 21074 7ff6b29bc108 50 API calls __free_lconv_num 21055->21074 21057 7ff6b29bc47a 21057->21058 21075 7ff6b29bc2d8 12 API calls 3 library calls 21057->21075 21058->21037 21060->21039 21061->21033 21062->21041 21063->21043 21064->21027 21065->21032 21066->21047 21070 7ff6b29ade4c 21067->21070 21073 7ff6b29ade10 50 API calls 21070->21073 21072 7ff6b299103a 21072->21052 21073->21072 21074->21057 21075->21058 22218 7ff6b299bfc0 GdipDisposeImage GdipFree 22305 7ff6b29918d0 47 API calls Concurrency::cancel_current_task 22221 7ff6b299bbd0 GetStringTypeW 22306 7ff6b299bcd0 LCMapStringEx __crtLCMapStringW 22223 7ff6b29cddd0 RegCloseKey RegCloseKey 22224 7ff6b299e3c7 ExitProcess 22309 7ff6b299e2c8 144 API calls BuildCatchObjectHelperInternal 22225 7ff6b29b1dcc 61 API calls 5 library calls 22226 7ff6b299e01f 71 API calls memcpy_s 22228 7ff6b2999220 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22229 7ff6b299c020 GdipCloneImage GdipAlloc 22311 7ff6b299ef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22231 7ff6b299e217 TerminateThread CloseHandle 22313 7ff6b299b331 17 API calls 22314 7ff6b2991130 HeapAlloc 22316 7ff6b29a1b30 50 API calls 22317 7ff6b29c5d34 56 API calls 3 library calls 22233 7ff6b29cea30 WSACleanup 21076 7ff6b29ab500 21130 7ff6b29b9c1c 21076->21130 21079 7ff6b29ab573 21081 7ff6b29ab580 GetCurrentProcess OpenProcessToken 21079->21081 21082 7ff6b29ab64f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21079->21082 21080 7ff6b29ab543 21083 7ff6b29ade98 std::_Facet_Register 49 API calls 21080->21083 21085 7ff6b29ab59f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21081->21085 21086 7ff6b29ab5f4 GetModuleHandleA GetProcAddress 21081->21086 21138 7ff6b29b8940 21082->21138 21084 7ff6b29ab54d 21083->21084 21088 7ff6b29b8940 52 API calls 21084->21088 21085->21086 21086->21082 21089 7ff6b29ab619 GetCurrentProcessId OpenProcess 21086->21089 21091 7ff6b29ab56a CloseHandle 21088->21091 21089->21082 21091->21079 21095 7ff6b29ab6ec 21163 7ff6b29aad80 RegOpenKeyExW 21095->21163 21098 7ff6b29ab789 21102 7ff6b29ab792 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21098->21102 21113 7ff6b29ab80d 21098->21113 21099 7ff6b29ab75b CheckTokenMembership 21100 7ff6b29ab775 21099->21100 21101 7ff6b29ab77c FreeSid 21099->21101 21100->21101 21101->21098 21102->21113 21103 7ff6b29b87a0 47 API calls std::_Locinfo::_Locinfo_ctor 21103->21113 21104 7ff6b29b9c1c ProcessCodePage 47 API calls 21105 7ff6b29ab91d SleepEx 21104->21105 21106 7ff6b29b9c1c ProcessCodePage 47 API calls 21105->21106 21106->21113 21107 7ff6b29b9c1c ProcessCodePage 47 API calls 21107->21113 21108 7ff6b29ab992 CreateEventA 21209 7ff6b29b87a0 21108->21209 21111 7ff6b29aba3c Sleep 21115 7ff6b29aba30 21111->21115 21112 7ff6b29aba72 Sleep 21112->21113 21113->21103 21113->21104 21113->21107 21113->21108 21114 7ff6b29abad5 CloseHandle 21113->21114 21113->21115 21116 7ff6b29abae9 21113->21116 21196 7ff6b2993820 ResetEvent timeGetTime socket 21113->21196 21218 7ff6b29962f0 21113->21218 21114->21113 21115->21111 21115->21112 21115->21114 21343 7ff6b29b3d58 21116->21343 21131 7ff6b29b9c4c 21130->21131 21348 7ff6b29b9480 21131->21348 21134 7ff6b29b9ca0 21136 7ff6b29ab52b SleepEx 21134->21136 21368 7ff6b29b394c 47 API calls 2 library calls 21134->21368 21136->21079 21136->21080 21139 7ff6b29b8960 21138->21139 21140 7ff6b29b8977 21138->21140 21384 7ff6b29b8afc 11 API calls _get_daylight 21139->21384 21377 7ff6b29b88dc 21140->21377 21144 7ff6b29b8965 21385 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21144->21385 21145 7ff6b29ab6ca CloseHandle 21156 7ff6b29ade98 21145->21156 21146 7ff6b29b898a CreateThread 21146->21145 21148 7ff6b29b89ba GetLastError 21146->21148 21386 7ff6b29b8a70 11 API calls 2 library calls 21148->21386 21150 7ff6b29b89c7 21151 7ff6b29b89d0 CloseHandle 21150->21151 21152 7ff6b29b89d6 21150->21152 21151->21152 21153 7ff6b29b89df FreeLibrary 21152->21153 21154 7ff6b29b89e5 21152->21154 21153->21154 21387 7ff6b29be6bc 21154->21387 21159 7ff6b29adea3 21156->21159 21157 7ff6b29ab6dd 21162 7ff6b29936e0 WSAStartup CreateEventW 21157->21162 21159->21156 21159->21157 21405 7ff6b29bca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21159->21405 21406 7ff6b29acb90 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21159->21406 21407 7ff6b29919d0 49 API calls Concurrency::cancel_current_task 21159->21407 21162->21095 21164 7ff6b29aadbf RegQueryValueExW 21163->21164 21165 7ff6b29aadec memcpy_s 21163->21165 21164->21165 21166 7ff6b29aae22 RegQueryValueExW lstrlenW 21165->21166 21194 7ff6b29ab471 AllocateAndInitializeSid 21165->21194 21408 7ff6b29cd7b0 21166->21408 21169 7ff6b29aaf18 lstrlenW 21170 7ff6b29cd7b0 memcpy_s 21169->21170 21171 7ff6b29aaf3d lstrlenW lstrlenW 21170->21171 21172 7ff6b29aafe8 lstrlenW lstrlenW 21171->21172 21181 7ff6b29aaf6a BuildCatchObjectHelperInternal 21171->21181 21173 7ff6b29ab07a lstrlenW 21172->21173 21178 7ff6b29ab011 21172->21178 21174 7ff6b29cd7b0 memcpy_s 21173->21174 21175 7ff6b29ab09f lstrlenW lstrlenW 21174->21175 21177 7ff6b29ab148 lstrlenW 21175->21177 21186 7ff6b29ab0cc BuildCatchObjectHelperInternal 21175->21186 21176 7ff6b29aae99 BuildCatchObjectHelperInternal 21176->21169 21179 7ff6b29cd7b0 memcpy_s 21177->21179 21178->21173 21180 7ff6b29ab16d lstrlenW lstrlenW 21179->21180 21182 7ff6b29ab218 lstrlenW lstrlenW 21180->21182 21191 7ff6b29ab19a BuildCatchObjectHelperInternal 21180->21191 21181->21172 21183 7ff6b29ab2aa lstrlenW 21182->21183 21189 7ff6b29ab241 21182->21189 21184 7ff6b29cd7b0 memcpy_s 21183->21184 21185 7ff6b29ab2cf lstrlenW lstrlenW 21184->21185 21187 7ff6b29ab378 lstrlenW 21185->21187 21193 7ff6b29ab2fc BuildCatchObjectHelperInternal 21185->21193 21186->21177 21188 7ff6b29cd7b0 memcpy_s 21187->21188 21190 7ff6b29ab39d lstrlenW lstrlenW 21188->21190 21189->21183 21192 7ff6b29ab448 lstrlenW lstrlenW 21190->21192 21195 7ff6b29ab3ca BuildCatchObjectHelperInternal 21190->21195 21191->21182 21192->21194 21193->21187 21194->21098 21194->21099 21195->21192 21197 7ff6b2993893 lstrlenW WideCharToMultiByte 21196->21197 21198 7ff6b2993ad9 21196->21198 21199 7ff6b29aded4 21197->21199 21198->21113 21200 7ff6b29938d4 lstrlenW WideCharToMultiByte gethostbyname 21199->21200 21201 7ff6b299391d 21200->21201 21201->21198 21202 7ff6b299392e htons connect 21201->21202 21202->21198 21203 7ff6b2993971 setsockopt setsockopt setsockopt setsockopt 21202->21203 21204 7ff6b2993a86 21203->21204 21205 7ff6b2993a37 WSAIoctl 21203->21205 21206 7ff6b29b8940 52 API calls 21204->21206 21205->21204 21207 7ff6b2993ab0 21206->21207 21208 7ff6b29b8940 52 API calls 21207->21208 21208->21198 21210 7ff6b29b87ad 21209->21210 21211 7ff6b29b87b7 21209->21211 21210->21211 21216 7ff6b29b87d3 21210->21216 21410 7ff6b29b8afc 11 API calls _get_daylight 21211->21410 21213 7ff6b29b87bf 21411 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21213->21411 21215 7ff6b29b87cb 21215->21113 21216->21215 21412 7ff6b29b8afc 11 API calls _get_daylight 21216->21412 21219 7ff6b299631d std::_Locinfo::_Locinfo_ctor 21218->21219 21220 7ff6b29ade98 std::_Facet_Register 49 API calls 21219->21220 21222 7ff6b299632a memcpy_s 21220->21222 21221 7ff6b299635e memcpy_s 21224 7ff6b2996376 gethostname gethostbyname 21221->21224 21222->21221 21223 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21222->21223 21223->21221 21225 7ff6b299644f 8 API calls 21224->21225 21226 7ff6b29963b2 inet_ntoa 21224->21226 21228 7ff6b299653e GetProcAddress 21225->21228 21229 7ff6b299665c GetSystemInfo wsprintfW 21225->21229 21552 7ff6b29b8f58 47 API calls 2 library calls 21226->21552 21230 7ff6b2996653 FreeLibrary 21228->21230 21231 7ff6b2996557 21228->21231 21232 7ff6b29966a0 GetDriveTypeW 21229->21232 21230->21229 21413 7ff6b2993670 21231->21413 21234 7ff6b29966c1 GetDiskFreeSpaceExW 21232->21234 21235 7ff6b29966f8 21232->21235 21233 7ff6b29963d5 21553 7ff6b29b8f58 47 API calls 2 library calls 21233->21553 21234->21235 21235->21232 21237 7ff6b29966ff GlobalMemoryStatusEx 21235->21237 21239 7ff6b2993670 50 API calls 21237->21239 21241 7ff6b2996762 21239->21241 21240 7ff6b29965a0 21417 7ff6b29991a0 GetModuleHandleW GetProcAddress 21240->21417 21243 7ff6b2993670 50 API calls 21241->21243 21242 7ff6b2996400 inet_ntoa 21554 7ff6b29b8f58 47 API calls 2 library calls 21242->21554 21245 7ff6b2996786 21243->21245 21421 7ff6b2998e00 CreateDXGIFactory 21245->21421 21246 7ff6b29963ed 21246->21225 21246->21242 21555 7ff6b29b8f58 47 API calls 2 library calls 21246->21555 21251 7ff6b2996799 GetForegroundWindow 21253 7ff6b29967a4 GetWindowTextW 21251->21253 21254 7ff6b29967ba lstrlenW 21251->21254 21253->21254 21433 7ff6b2998cd0 21254->21433 21255 7ff6b2996640 RegCloseKey 21258 7ff6b29ade64 21255->21258 21256 7ff6b2996622 21256->21255 21262 7ff6b29b9248 std::_Locinfo::_Locinfo_ctor 47 API calls 21256->21262 21258->21230 21259 7ff6b29967fa 21260 7ff6b29967ff GetLocalTime wsprintfW 21259->21260 21261 7ff6b2996823 21259->21261 21260->21261 21263 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21261->21263 21262->21255 21264 7ff6b299683b lstrlenW 21263->21264 21265 7ff6b2998cd0 6 API calls 21264->21265 21266 7ff6b299685f 21265->21266 21267 7ff6b2996878 GetModuleHandleW GetProcAddress 21266->21267 21268 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21266->21268 21269 7ff6b29968b1 GetSystemInfo 21267->21269 21270 7ff6b29968ad GetNativeSystemInfo 21267->21270 21268->21267 21271 7ff6b29968b7 wsprintfW 21269->21271 21270->21271 21442 7ff6b2998ad0 21271->21442 21274 7ff6b2996906 GetCurrentProcessId 21275 7ff6b2996a5e CoInitializeEx CoCreateInstance 21274->21275 21276 7ff6b299691c OpenProcess 21274->21276 21277 7ff6b2996b8f 21275->21277 21307 7ff6b2996a95 21275->21307 21278 7ff6b2996a57 21276->21278 21279 7ff6b299693d K32GetProcessImageFileNameW 21276->21279 21283 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21277->21283 21278->21275 21280 7ff6b2996a4e CloseHandle 21279->21280 21281 7ff6b299695b GetLogicalDriveStringsW 21279->21281 21280->21278 21282 7ff6b2996a3e lstrcpyW 21281->21282 21299 7ff6b2996975 21281->21299 21282->21280 21284 7ff6b2996bab memcpy_s 21283->21284 21287 7ff6b2996bc6 RegOpenKeyExW 21284->21287 21285 7ff6b2996990 lstrcmpiW 21286 7ff6b29969b2 lstrcmpiW 21285->21286 21285->21299 21288 7ff6b29969c6 QueryDosDeviceW 21286->21288 21286->21299 21289 7ff6b2996d52 lstrlenW 21287->21289 21290 7ff6b2996bf5 RegQueryInfoKeyW 21287->21290 21288->21280 21293 7ff6b2996a00 lstrlenW 21288->21293 21291 7ff6b2996d82 21289->21291 21292 7ff6b2996d64 21289->21292 21290->21291 21313 7ff6b2996c55 memcpy_s 21290->21313 21471 7ff6b29979e0 21291->21471 21462 7ff6b29b9248 21292->21462 21556 7ff6b29b90ac 53 API calls 3 library calls 21293->21556 21296 7ff6b2996b7e CoUninitialize 21296->21277 21299->21282 21299->21285 21301 7ff6b2996e8d lstrcpyW lstrcatW 21299->21301 21300 7ff6b29b9248 std::_Locinfo::_Locinfo_ctor 47 API calls 21302 7ff6b2996da1 GetTickCount 21300->21302 21301->21280 21489 7ff6b29b8b9c GetSystemTimeAsFileTime 21302->21489 21303 7ff6b2996d47 RegCloseKey 21303->21289 21307->21277 21307->21296 21308 7ff6b2996b36 SysFreeString 21307->21308 21308->21307 21309 7ff6b2996cb4 RegEnumKeyExW lstrlenW 21311 7ff6b2996cf7 lstrlenW 21309->21311 21309->21313 21311->21313 21312 7ff6b2996e7f 21496 7ff6b2997250 21312->21496 21313->21289 21313->21303 21313->21309 21315 7ff6b29b8b24 47 API calls std::_Locinfo::_Locinfo_ctor 21313->21315 21315->21313 21316 7ff6b2996ed1 lstrlenW 21317 7ff6b2998cd0 6 API calls 21316->21317 21318 7ff6b2996f0a 21317->21318 21319 7ff6b2996f13 6 API calls 21318->21319 21320 7ff6b2996fe7 CreateToolhelp32Snapshot 21318->21320 21321 7ff6b2996f98 lstrlenW RegSetValueExW 21319->21321 21322 7ff6b2996fda RegCloseKey 21319->21322 21323 7ff6b2997001 memcpy_s 21320->21323 21324 7ff6b2997088 CreateToolhelp32Snapshot 21320->21324 21321->21322 21326 7ff6b2996fcd RegCloseKey 21321->21326 21322->21320 21328 7ff6b2997015 Process32FirstW 21323->21328 21327 7ff6b29970ab memcpy_s 21324->21327 21339 7ff6b2997138 CreateToolhelp32Snapshot 21324->21339 21326->21322 21330 7ff6b29970bf Process32FirstW 21327->21330 21328->21324 21336 7ff6b2997033 21328->21336 21332 7ff6b29970dd 21330->21332 21330->21339 21331 7ff6b299715b memcpy_s 21333 7ff6b299716f Process32FirstW 21331->21333 21337 7ff6b2997124 Process32NextW 21332->21337 21332->21339 21338 7ff6b299718d 21333->21338 21341 7ff6b29971e4 21333->21341 21334 7ff6b299721c 21334->21113 21335 7ff6b2997074 Process32NextW 21335->21324 21335->21336 21336->21324 21336->21335 21337->21332 21337->21339 21340 7ff6b29971d0 Process32NextW 21338->21340 21338->21341 21339->21331 21339->21341 21340->21338 21340->21341 21536 7ff6b2993e30 GetCurrentThreadId 21341->21536 21784 7ff6b29b3bd0 47 API calls 2 library calls 21343->21784 21345 7ff6b29b3d71 21346 7ff6b29b3d88 _invalid_parameter_noinfo_noreturn 17 API calls 21345->21346 21347 7ff6b29b3d86 21346->21347 21349 7ff6b29b94b8 21348->21349 21350 7ff6b29b94ca 21348->21350 21369 7ff6b29b8afc 11 API calls _get_daylight 21349->21369 21352 7ff6b29b9514 21350->21352 21354 7ff6b29b94d8 21350->21354 21359 7ff6b29b952f ProcessCodePage 21352->21359 21372 7ff6b29b8160 47 API calls ProcessCodePage 21352->21372 21353 7ff6b29b94bd 21370 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21353->21370 21371 7ff6b29b3c6c 47 API calls 2 library calls 21354->21371 21358 7ff6b29b98b5 21364 7ff6b29b94c8 21358->21364 21375 7ff6b29b8afc 11 API calls _get_daylight 21358->21375 21359->21358 21373 7ff6b29b8afc 11 API calls _get_daylight 21359->21373 21362 7ff6b29b98aa 21374 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21362->21374 21364->21134 21367 7ff6b29b394c 47 API calls 2 library calls 21364->21367 21365 7ff6b29b9b46 21376 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21365->21376 21367->21134 21368->21136 21369->21353 21370->21364 21371->21364 21372->21359 21373->21362 21374->21358 21375->21365 21376->21364 21393 7ff6b29c0788 21377->21393 21380 7ff6b29be6bc __free_lconv_num 11 API calls 21381 7ff6b29b8908 21380->21381 21382 7ff6b29b8911 GetModuleHandleExW 21381->21382 21383 7ff6b29b890d 21381->21383 21382->21383 21383->21145 21383->21146 21384->21144 21385->21145 21386->21150 21388 7ff6b29be6c1 RtlFreeHeap 21387->21388 21389 7ff6b29be6f0 21387->21389 21388->21389 21390 7ff6b29be6dc GetLastError 21388->21390 21389->21145 21391 7ff6b29be6e9 __free_lconv_num 21390->21391 21404 7ff6b29b8afc 11 API calls _get_daylight 21391->21404 21394 7ff6b29c0799 21393->21394 21400 7ff6b29c07a7 _get_daylight 21393->21400 21395 7ff6b29c07ea 21394->21395 21394->21400 21403 7ff6b29b8afc 11 API calls _get_daylight 21395->21403 21396 7ff6b29c07ce HeapAlloc 21397 7ff6b29c07e8 21396->21397 21396->21400 21399 7ff6b29b88fe 21397->21399 21399->21380 21400->21395 21400->21396 21402 7ff6b29bca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21400->21402 21402->21400 21403->21399 21404->21389 21405->21159 21407->21159 21409 7ff6b29aae70 lstrlenW lstrlenW 21408->21409 21409->21169 21409->21176 21410->21213 21411->21215 21412->21213 21414 7ff6b2993695 21413->21414 21557 7ff6b29b868c 21414->21557 21418 7ff6b29991e1 GetSystemInfo 21417->21418 21419 7ff6b29991dd GetNativeSystemInfo 21417->21419 21420 7ff6b29965c2 RegOpenKeyExW RegQueryValueExW 21418->21420 21419->21420 21420->21255 21420->21256 21423 7ff6b2999143 21421->21423 21427 7ff6b2998e5a 21421->21427 21422 7ff6b2999175 21422->21251 21423->21422 21424 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21423->21424 21425 7ff6b2999196 21424->21425 21428 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21425->21428 21429 7ff6b2998ed5 21427->21429 21571 7ff6b299a4c0 49 API calls BuildCatchObjectHelperInternal 21427->21571 21430 7ff6b299919c 21428->21430 21429->21423 21429->21425 21431 7ff6b2993670 50 API calls 21429->21431 21572 7ff6b299a4c0 49 API calls BuildCatchObjectHelperInternal 21429->21572 21431->21429 21434 7ff6b29cd7b0 memcpy_s 21433->21434 21435 7ff6b2998d11 RegOpenKeyExW 21434->21435 21436 7ff6b2998d46 21435->21436 21437 7ff6b2998d3c 21435->21437 21438 7ff6b2998dc8 RegCloseKey RegCloseKey 21436->21438 21439 7ff6b2998d54 RegQueryValueExW 21436->21439 21437->21438 21438->21259 21439->21438 21440 7ff6b2998d93 lstrcmpW 21439->21440 21440->21437 21441 7ff6b2998db0 lstrcpyW 21440->21441 21441->21438 21443 7ff6b29aded4 21442->21443 21444 7ff6b2998ae8 GetCurrentProcessId wsprintfW 21443->21444 21573 7ff6b2998900 GetCurrentProcessId OpenProcess 21444->21573 21446 7ff6b2998b10 memcpy_s 21447 7ff6b2998b24 GetVersionExW 21446->21447 21448 7ff6b2998b3f 21447->21448 21449 7ff6b2998c92 21447->21449 21448->21449 21452 7ff6b2998b55 GetCurrentProcess OpenProcessToken 21448->21452 21450 7ff6b2998c99 wsprintfW 21449->21450 21451 7ff6b2998ca9 21450->21451 21451->21274 21452->21449 21453 7ff6b2998b81 GetTokenInformation 21452->21453 21454 7ff6b2998bb6 GetLastError 21453->21454 21455 7ff6b2998c3c CloseHandle 21453->21455 21454->21455 21456 7ff6b2998bc1 LocalAlloc 21454->21456 21455->21449 21461 7ff6b2998c4e 21455->21461 21457 7ff6b2998be3 GetTokenInformation 21456->21457 21458 7ff6b2998c34 21456->21458 21459 7ff6b2998c12 GetSidSubAuthorityCount GetSidSubAuthority 21457->21459 21460 7ff6b2998c2b LocalFree 21457->21460 21458->21455 21459->21460 21460->21458 21461->21450 21461->21451 21463 7ff6b29b9265 21462->21463 21466 7ff6b29b926a 21463->21466 21468 7ff6b29b9280 21463->21468 21469 7ff6b29b92b6 21463->21469 21465 7ff6b29b9274 21624 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21465->21624 21466->21468 21623 7ff6b29b8afc 11 API calls _get_daylight 21466->21623 21468->21291 21469->21468 21625 7ff6b29b8afc 11 API calls _get_daylight 21469->21625 21472 7ff6b2997a13 memcpy_s 21471->21472 21473 7ff6b2997afc CoCreateInstance 21472->21473 21477 7ff6b2997a64 CreateToolhelp32Snapshot 21472->21477 21481 7ff6b2997abf Process32NextW 21472->21481 21482 7ff6b2997d65 CloseHandle 21472->21482 21474 7ff6b2997d21 lstrlenW 21473->21474 21485 7ff6b2997b2d memcpy_s 21473->21485 21475 7ff6b2997d2e lstrcatW 21474->21475 21476 7ff6b2996d87 21474->21476 21475->21476 21476->21300 21477->21472 21479 7ff6b2997a7a Process32FirstW 21477->21479 21478 7ff6b2997d0f 21478->21474 21479->21472 21480 7ff6b2997acd CloseHandle 21479->21480 21480->21472 21481->21472 21481->21480 21482->21472 21484 7ff6b2997d75 lstrcatW lstrcatW 21482->21484 21483 7ff6b2997bb5 wsprintfW RegOpenKeyExW 21483->21485 21484->21472 21485->21478 21485->21483 21486 7ff6b2997c77 RegQueryValueExW 21485->21486 21487 7ff6b2997ce0 RegCloseKey 21486->21487 21488 7ff6b2997cc0 lstrcatW lstrcatW 21486->21488 21487->21485 21488->21487 21490 7ff6b2996db2 21489->21490 21491 7ff6b29b8f10 21490->21491 21626 7ff6b29c177c 21491->21626 21495 7ff6b2996dd2 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 21495->21312 21497 7ff6b29972b0 21496->21497 21497->21497 21499 7ff6b29972c6 BuildCatchObjectHelperInternal 21497->21499 21741 7ff6b299a300 49 API calls 4 library calls 21497->21741 21501 7ff6b2997312 BuildCatchObjectHelperInternal 21499->21501 21742 7ff6b299a300 49 API calls 4 library calls 21499->21742 21503 7ff6b2997381 BuildCatchObjectHelperInternal 21501->21503 21743 7ff6b299a300 49 API calls 4 library calls 21501->21743 21505 7ff6b29973f4 BuildCatchObjectHelperInternal 21503->21505 21744 7ff6b299a300 49 API calls 4 library calls 21503->21744 21507 7ff6b299744f BuildCatchObjectHelperInternal 21505->21507 21745 7ff6b299a300 49 API calls 4 library calls 21505->21745 21509 7ff6b29974d0 BuildCatchObjectHelperInternal 21507->21509 21746 7ff6b299a300 49 API calls 4 library calls 21507->21746 21511 7ff6b2997540 BuildCatchObjectHelperInternal 21509->21511 21747 7ff6b299a300 49 API calls 4 library calls 21509->21747 21735 7ff6b29a9b00 21511->21735 21514 7ff6b2997636 21515 7ff6b29976ad 21514->21515 21516 7ff6b29976d8 21514->21516 21518 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21514->21518 21515->21316 21517 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21516->21517 21519 7ff6b29976de CreateMutexExW GetLastError 21517->21519 21518->21516 21520 7ff6b2997749 21519->21520 21521 7ff6b2997719 21519->21521 21523 7ff6b29977f0 9 API calls 21520->21523 21526 7ff6b2997760 lstrlenW 21520->21526 21522 7ff6b2997720 Sleep CreateMutexW GetLastError 21521->21522 21522->21520 21522->21522 21524 7ff6b29978a4 DeleteFileW 21523->21524 21525 7ff6b29978ad ReleaseMutex DirectInput8Create 21523->21525 21524->21525 21527 7ff6b2997980 21525->21527 21532 7ff6b29978e3 21525->21532 21528 7ff6b2998cd0 6 API calls 21526->21528 21527->21316 21529 7ff6b29977be 21528->21529 21530 7ff6b29977c2 lstrcmpW 21529->21530 21531 7ff6b29977d8 SleepEx 21529->21531 21530->21523 21530->21531 21531->21523 21531->21526 21532->21527 21533 7ff6b299799f GetTickCount GetKeyState 21532->21533 21748 7ff6b299adb0 37 API calls 3 library calls 21533->21748 21537 7ff6b2993e5c 21536->21537 21537->21537 21765 7ff6b2991670 21537->21765 21539 7ff6b2993e9b 21540 7ff6b2991670 2 API calls 21539->21540 21541 7ff6b2993ec4 21540->21541 21772 7ff6b2991500 21541->21772 21543 7ff6b2993efa 21548 7ff6b2993f06 21543->21548 21550 7ff6b2993f1a 21543->21550 21544 7ff6b2993fa1 21778 7ff6b2991730 21544->21778 21545 7ff6b2993f80 send 21545->21544 21545->21548 21547 7ff6b2993f30 send 21547->21550 21548->21544 21548->21545 21549 7ff6b2993fba GetCurrentThreadId 21551 7ff6b2993fca 21549->21551 21550->21544 21550->21547 21550->21548 21551->21334 21552->21233 21553->21246 21554->21246 21555->21246 21556->21299 21559 7ff6b29b86c5 21557->21559 21558 7ff6b29b8708 21562 7ff6b29b8747 21558->21562 21568 7ff6b29b3c6c 47 API calls 2 library calls 21558->21568 21559->21558 21567 7ff6b29b3fe0 50 API calls 3 library calls 21559->21567 21563 7ff6b29b876d 21562->21563 21569 7ff6b29b394c 47 API calls 2 library calls 21562->21569 21564 7ff6b29936b4 21563->21564 21570 7ff6b29b394c 47 API calls 2 library calls 21563->21570 21564->21240 21567->21558 21568->21562 21569->21563 21570->21564 21571->21427 21572->21429 21574 7ff6b299893a OpenProcessToken 21573->21574 21582 7ff6b2998967 21573->21582 21575 7ff6b299895e CloseHandle 21574->21575 21576 7ff6b2998971 21574->21576 21575->21582 21604 7ff6b2998690 21576->21604 21578 7ff6b29989bb BuildCatchObjectHelperInternal 21579 7ff6b29989e8 CloseHandle CloseHandle 21578->21579 21580 7ff6b2998a14 21579->21580 21581 7ff6b2998aba 21580->21581 21580->21582 21584 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21580->21584 21583 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21581->21583 21582->21446 21585 7ff6b2998ac0 21583->21585 21584->21581 21586 7ff6b2998ae8 GetCurrentProcessId wsprintfW 21585->21586 21587 7ff6b2998900 58 API calls 21586->21587 21588 7ff6b2998b10 memcpy_s 21587->21588 21589 7ff6b2998b24 GetVersionExW 21588->21589 21590 7ff6b2998b3f 21589->21590 21591 7ff6b2998c92 21589->21591 21590->21591 21594 7ff6b2998b55 GetCurrentProcess OpenProcessToken 21590->21594 21592 7ff6b2998c99 wsprintfW 21591->21592 21593 7ff6b2998ca9 21592->21593 21593->21446 21594->21591 21595 7ff6b2998b81 GetTokenInformation 21594->21595 21596 7ff6b2998bb6 GetLastError 21595->21596 21597 7ff6b2998c3c CloseHandle 21595->21597 21596->21597 21598 7ff6b2998bc1 LocalAlloc 21596->21598 21597->21591 21603 7ff6b2998c4e 21597->21603 21599 7ff6b2998be3 GetTokenInformation 21598->21599 21600 7ff6b2998c34 21598->21600 21601 7ff6b2998c12 GetSidSubAuthorityCount GetSidSubAuthority 21599->21601 21602 7ff6b2998c2b LocalFree 21599->21602 21600->21597 21601->21602 21602->21600 21603->21592 21603->21593 21605 7ff6b29986c1 21604->21605 21606 7ff6b29986f3 GetTokenInformation 21605->21606 21607 7ff6b29987e8 21605->21607 21608 7ff6b299874e GetTokenInformation 21606->21608 21609 7ff6b2998715 GetLastError 21606->21609 21607->21578 21611 7ff6b299877c LookupAccountSidW 21608->21611 21620 7ff6b29987e3 BuildCatchObjectHelperInternal 21608->21620 21609->21607 21610 7ff6b2998724 GetProcessHeap HeapAlloc 21609->21610 21610->21607 21610->21608 21613 7ff6b29987c0 GetLastError 21611->21613 21616 7ff6b29987ef 21611->21616 21612 7ff6b29988c4 GetProcessHeap HeapFree 21612->21607 21613->21607 21614 7ff6b29987cd 21613->21614 21615 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21614->21615 21615->21620 21618 7ff6b299881a BuildCatchObjectHelperInternal 21616->21618 21621 7ff6b299a1a0 49 API calls 4 library calls 21616->21621 21618->21620 21622 7ff6b299a1a0 49 API calls 4 library calls 21618->21622 21620->21607 21620->21612 21621->21618 21622->21620 21623->21465 21624->21468 21625->21465 21666 7ff6b29bebe8 GetLastError 21626->21666 21628 7ff6b29c1787 21629 7ff6b29c17ab 21628->21629 21630 7ff6b29b8f27 21628->21630 21683 7ff6b29bedd0 21628->21683 21629->21630 21690 7ff6b29b8afc 11 API calls _get_daylight 21629->21690 21630->21495 21635 7ff6b29b8c10 21630->21635 21634 7ff6b29be6bc __free_lconv_num 11 API calls 21634->21629 21636 7ff6b29b8c41 21635->21636 21637 7ff6b29b8c26 21635->21637 21636->21637 21639 7ff6b29b8c5a 21636->21639 21710 7ff6b29b8afc 11 API calls _get_daylight 21637->21710 21641 7ff6b29b8c60 21639->21641 21642 7ff6b29b8c7d 21639->21642 21640 7ff6b29b8c2b 21711 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21640->21711 21712 7ff6b29b8afc 11 API calls _get_daylight 21641->21712 21694 7ff6b29c233c 21642->21694 21649 7ff6b29b8ef7 21706 7ff6b29b3d88 IsProcessorFeaturePresent 21649->21706 21652 7ff6b29b8f0c 21654 7ff6b29c177c 12 API calls 21652->21654 21656 7ff6b29b8f27 21654->21656 21658 7ff6b29b8f3c 21656->21658 21660 7ff6b29b8c10 61 API calls 21656->21660 21658->21495 21659 7ff6b29b8cc1 21661 7ff6b29b8cda 21659->21661 21662 7ff6b29b8d3a 21659->21662 21660->21658 21665 7ff6b29b8c37 21661->21665 21725 7ff6b29c2380 47 API calls _isindst 21661->21725 21662->21665 21726 7ff6b29c2380 47 API calls _isindst 21662->21726 21665->21495 21667 7ff6b29bec29 FlsSetValue 21666->21667 21671 7ff6b29bec0c 21666->21671 21668 7ff6b29bec3b 21667->21668 21680 7ff6b29bec19 21667->21680 21670 7ff6b29c0788 _get_daylight 5 API calls 21668->21670 21669 7ff6b29bec95 SetLastError 21669->21628 21672 7ff6b29bec4a 21670->21672 21671->21667 21671->21680 21673 7ff6b29bec68 FlsSetValue 21672->21673 21674 7ff6b29bec58 FlsSetValue 21672->21674 21676 7ff6b29bec74 FlsSetValue 21673->21676 21677 7ff6b29bec86 21673->21677 21675 7ff6b29bec61 21674->21675 21678 7ff6b29be6bc __free_lconv_num 5 API calls 21675->21678 21676->21675 21691 7ff6b29be820 11 API calls _get_daylight 21677->21691 21678->21680 21680->21669 21681 7ff6b29bec8e 21682 7ff6b29be6bc __free_lconv_num 5 API calls 21681->21682 21682->21669 21684 7ff6b29bee1b 21683->21684 21688 7ff6b29beddf _get_daylight 21683->21688 21693 7ff6b29b8afc 11 API calls _get_daylight 21684->21693 21685 7ff6b29bee02 HeapAlloc 21687 7ff6b29bee19 21685->21687 21685->21688 21687->21634 21688->21684 21688->21685 21692 7ff6b29bca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21688->21692 21690->21630 21691->21681 21692->21688 21693->21687 21695 7ff6b29c234b 21694->21695 21698 7ff6b29b8c82 21694->21698 21727 7ff6b29baba4 EnterCriticalSection 21695->21727 21697 7ff6b29c2353 21697->21698 21699 7ff6b29c21ac 61 API calls 21697->21699 21700 7ff6b29c1464 21698->21700 21699->21698 21701 7ff6b29b8c97 21700->21701 21702 7ff6b29c146d 21700->21702 21701->21649 21713 7ff6b29c1494 21701->21713 21728 7ff6b29b8afc 11 API calls _get_daylight 21702->21728 21704 7ff6b29c1472 21729 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21704->21729 21707 7ff6b29b3d9b 21706->21707 21730 7ff6b29b3a6c 14 API calls 2 library calls 21707->21730 21709 7ff6b29b3db6 GetCurrentProcess TerminateProcess 21710->21640 21711->21665 21712->21665 21714 7ff6b29b8ca8 21713->21714 21715 7ff6b29c149d 21713->21715 21714->21649 21719 7ff6b29c14c4 21714->21719 21731 7ff6b29b8afc 11 API calls _get_daylight 21715->21731 21717 7ff6b29c14a2 21732 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21717->21732 21720 7ff6b29c14cd 21719->21720 21722 7ff6b29b8cb9 21719->21722 21733 7ff6b29b8afc 11 API calls _get_daylight 21720->21733 21722->21649 21722->21659 21723 7ff6b29c14d2 21734 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 21723->21734 21725->21665 21726->21665 21728->21704 21729->21701 21730->21709 21731->21717 21732->21714 21733->21723 21734->21722 21736 7ff6b29a9b2d 21735->21736 21736->21736 21749 7ff6b29a9d20 21736->21749 21738 7ff6b29a9e70 49 API calls 21739 7ff6b29a9c2f 21738->21739 21739->21738 21740 7ff6b29975dd MultiByteToWideChar MultiByteToWideChar 21739->21740 21740->21514 21741->21499 21742->21501 21743->21503 21744->21505 21745->21507 21746->21509 21747->21511 21753 7ff6b29a9d49 21749->21753 21760 7ff6b29a9e65 21749->21760 21752 7ff6b29ade98 std::_Facet_Register 49 API calls 21761 7ff6b29a9d94 BuildCatchObjectHelperInternal 21752->21761 21754 7ff6b29a9da1 21753->21754 21755 7ff6b29a9ddd 21753->21755 21753->21761 21754->21752 21759 7ff6b29a9e5f 21754->21759 21756 7ff6b29ade98 std::_Facet_Register 49 API calls 21755->21756 21756->21761 21757 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21757->21759 21763 7ff6b29919d0 49 API calls Concurrency::cancel_current_task 21759->21763 21764 7ff6b29961c0 49 API calls 21760->21764 21761->21757 21762 7ff6b29a9e27 BuildCatchObjectHelperInternal 21761->21762 21762->21739 21763->21760 21766 7ff6b299167e 21765->21766 21767 7ff6b2991686 21765->21767 21766->21539 21768 7ff6b29916ac VirtualAlloc 21767->21768 21769 7ff6b29916d6 BuildCatchObjectHelperInternal 21768->21769 21770 7ff6b2991704 21769->21770 21771 7ff6b29916f6 VirtualFree 21769->21771 21770->21539 21771->21770 21773 7ff6b299152a 21772->21773 21774 7ff6b299155b VirtualAlloc 21773->21774 21775 7ff6b29915b5 BuildCatchObjectHelperInternal 21773->21775 21776 7ff6b2991587 BuildCatchObjectHelperInternal 21774->21776 21775->21543 21776->21775 21777 7ff6b29915a7 VirtualFree 21776->21777 21777->21775 21780 7ff6b299174b 21778->21780 21779 7ff6b29917fb 21779->21549 21780->21779 21781 7ff6b299177c VirtualAlloc 21780->21781 21782 7ff6b29917a8 BuildCatchObjectHelperInternal 21781->21782 21783 7ff6b29917be VirtualFree 21782->21783 21783->21549 21784->21345 22318 7ff6b29b0100 10 API calls 2 library calls 22234 7ff6b2995200 8 API calls BuildCatchObjectHelperInternal 22319 7ff6b2995300 115 API calls 22320 7ff6b29a1300 8 API calls 22321 7ff6b29ae704 56 API calls 22322 7ff6b29ba4f8 60 API calls 5 library calls 22237 7ff6b29bcc10 GetCommandLineA GetCommandLineW 22238 7ff6b2995410 36 API calls 22323 7ff6b29ccf14 57 API calls 2 library calls 22239 7ff6b299d410 360 API calls 6 library calls 21785 7ff6b29b8808 21786 7ff6b29b8825 21785->21786 21787 7ff6b29b8816 GetLastError ExitThread 21785->21787 21800 7ff6b29bea70 GetLastError 21786->21800 21792 7ff6b29b8843 21797 7ff6b2997250 116 API calls 21792->21797 21826 7ff6b2993b00 21792->21826 21840 7ff6b2993da0 21792->21840 21794 7ff6b29b8862 21848 7ff6b29b8a1c 21794->21848 21797->21794 21801 7ff6b29beab1 FlsSetValue 21800->21801 21802 7ff6b29bea94 FlsGetValue 21800->21802 21803 7ff6b29beaa1 21801->21803 21804 7ff6b29beac3 21801->21804 21802->21803 21805 7ff6b29beaab 21802->21805 21806 7ff6b29beb1d SetLastError 21803->21806 21807 7ff6b29c0788 _get_daylight 11 API calls 21804->21807 21805->21801 21808 7ff6b29beb3d 21806->21808 21809 7ff6b29b882a 21806->21809 21810 7ff6b29bead2 21807->21810 21853 7ff6b29b3dd8 47 API calls 2 library calls 21808->21853 21822 7ff6b29c137c 21809->21822 21812 7ff6b29beaf0 FlsSetValue 21810->21812 21813 7ff6b29beae0 FlsSetValue 21810->21813 21816 7ff6b29beb0e 21812->21816 21817 7ff6b29beafc FlsSetValue 21812->21817 21815 7ff6b29beae9 21813->21815 21818 7ff6b29be6bc __free_lconv_num 11 API calls 21815->21818 21852 7ff6b29be820 11 API calls _get_daylight 21816->21852 21817->21815 21818->21803 21820 7ff6b29beb16 21821 7ff6b29be6bc __free_lconv_num 11 API calls 21820->21821 21821->21806 21823 7ff6b29b8836 21822->21823 21824 7ff6b29c138b 21822->21824 21823->21792 21851 7ff6b29c10b0 5 API calls std::_Lockit::_Lockit 21823->21851 21824->21823 21854 7ff6b29c0ac8 5 API calls std::_Lockit::_Lockit 21824->21854 21827 7ff6b2993b18 21826->21827 21828 7ff6b2993c54 21827->21828 21829 7ff6b2993be0 select 21827->21829 21830 7ff6b2993c08 recv 21827->21830 21831 7ff6b2991500 VirtualAlloc VirtualFree 21827->21831 21832 7ff6b2991730 2 API calls 21827->21832 21833 7ff6b29b8afc 11 API calls _get_daylight 21827->21833 21834 7ff6b2993d04 timeGetTime 21827->21834 21855 7ff6b299dbef 21827->21855 21863 7ff6b299d9c0 21827->21863 21878 7ff6b299e29b 21827->21878 21882 7ff6b2991810 VirtualAlloc VirtualFree BuildCatchObjectHelperInternal 21827->21882 21828->21794 21829->21827 21829->21828 21830->21827 21831->21827 21832->21827 21833->21827 21835 7ff6b2991730 2 API calls 21834->21835 21835->21827 21841 7ff6b2993e22 21840->21841 21845 7ff6b2993db4 21840->21845 21841->21794 21842 7ff6b2993e15 21842->21794 21843 7ff6b2993dc8 SleepEx 21843->21845 21844 7ff6b2993df1 timeGetTime 21844->21845 21845->21842 21845->21843 21846 7ff6b2993e30 10 API calls 21845->21846 22194 7ff6b29937a0 21845->22194 21846->21844 22197 7ff6b29b8878 21848->22197 21851->21792 21852->21820 21854->21823 21856 7ff6b299dbfb 21855->21856 21857 7ff6b299e2c3 21855->21857 21858 7ff6b299dc19 21856->21858 21859 7ff6b29b87a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21856->21859 21857->21827 21858->21857 21883 7ff6b299f410 21858->21883 21859->21858 21861 7ff6b299dc41 21861->21857 21862 7ff6b2993e30 10 API calls 21861->21862 21862->21857 21864 7ff6b299d9df 21863->21864 21865 7ff6b299da2a CloseHandle 21863->21865 21866 7ff6b299da0b 21864->21866 21867 7ff6b299da44 21864->21867 21865->21867 21866->21865 21868 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21867->21868 21869 7ff6b299da49 21868->21869 21870 7ff6b299daf7 21869->21870 21871 7ff6b29ade98 std::_Facet_Register 49 API calls 21869->21871 21872 7ff6b299db41 RegOpenKeyExW 21870->21872 21873 7ff6b299dbb0 21870->21873 21874 7ff6b299da83 memcpy_s 21871->21874 21872->21873 21875 7ff6b299db7c RegQueryValueExW 21872->21875 21873->21827 21876 7ff6b299da97 GetLastInputInfo GetTickCount wsprintfW 21874->21876 21875->21873 22103 7ff6b2998040 21876->22103 21879 7ff6b299e2a2 21878->21879 21880 7ff6b299e2c3 21879->21880 21881 7ff6b2993e30 10 API calls 21879->21881 21880->21827 21881->21880 21882->21827 21884 7ff6b29ade98 std::_Facet_Register 49 API calls 21883->21884 21885 7ff6b299f437 memcpy_s 21884->21885 21886 7ff6b299f44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 21885->21886 21887 7ff6b299f4a1 GetWindowTextW 21886->21887 21888 7ff6b299f4b4 CreateToolhelp32Snapshot 21886->21888 21887->21888 21889 7ff6b299f4d8 memcpy_s 21888->21889 21906 7ff6b299f555 CreateToolhelp32Snapshot 21888->21906 21891 7ff6b299f4e9 Process32FirstW 21889->21891 21901 7ff6b299f501 21891->21901 21891->21906 21892 7ff6b299f577 memcpy_s 21894 7ff6b299f58b Process32FirstW 21892->21894 21909 7ff6b299f5a9 21894->21909 21914 7ff6b299f5f8 CreateToolhelp32Snapshot 21894->21914 21895 7ff6b299f6a8 RegOpenKeyExW 21898 7ff6b299f913 RegOpenKeyExW 21895->21898 21899 7ff6b299f6fa RegQueryValueExW 21895->21899 21896 7ff6b299f61a memcpy_s 21902 7ff6b299f62e Process32FirstW 21896->21902 21903 7ff6b299f951 RegQueryValueExW 21898->21903 21904 7ff6b299f9f2 RegOpenKeyExW 21898->21904 21905 7ff6b299f908 RegCloseKey 21899->21905 21919 7ff6b299f734 memcpy_s 21899->21919 21900 7ff6b299f544 Process32NextW 21900->21901 21900->21906 21901->21900 21901->21906 21902->21895 21917 7ff6b299f64c 21902->21917 21907 7ff6b299f9e7 RegCloseKey 21903->21907 21920 7ff6b299f986 memcpy_s 21903->21920 21910 7ff6b299fad1 7 API calls 21904->21910 21911 7ff6b299fa30 RegQueryValueExW 21904->21911 21905->21898 21906->21892 21906->21914 21907->21904 21908 7ff6b299f5e4 Process32NextW 21908->21909 21908->21914 21909->21908 21909->21914 21912 7ff6b299fb91 FindClose 21910->21912 21913 7ff6b299fb89 21910->21913 21915 7ff6b299fac6 RegCloseKey 21911->21915 21922 7ff6b299fa65 memcpy_s 21911->21922 21937 7ff6b299fd10 GetVersion 21912->21937 21913->21912 21914->21895 21914->21896 21915->21910 21916 7ff6b299f694 Process32NextW 21916->21895 21916->21917 21917->21895 21917->21916 21921 7ff6b299f75e RegQueryValueExW 21919->21921 21923 7ff6b299f9b0 RegQueryValueExW 21920->21923 21921->21905 21924 7ff6b299f791 21921->21924 21925 7ff6b299fa8f RegQueryValueExW 21922->21925 21923->21907 21926 7ff6b299f9df 21923->21926 21959 7ff6b29a1390 49 API calls 4 library calls 21924->21959 21925->21915 21928 7ff6b299fabe 21925->21928 21926->21907 21928->21915 21929 7ff6b299fbd1 BuildCatchObjectHelperInternal 21935 7ff6b299fcbe 21929->21935 21936 7ff6b2993e30 10 API calls 21929->21936 21930 7ff6b299f900 21930->21905 21931 7ff6b299f79d 21931->21905 21931->21930 21932 7ff6b299fcfe 21931->21932 21933 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21932->21933 21934 7ff6b299fd03 21933->21934 21935->21861 21936->21935 21938 7ff6b299fd40 21937->21938 21956 7ff6b29a0145 21937->21956 21939 7ff6b299fd4c 7 API calls 21938->21939 21938->21956 21940 7ff6b299fe0e GetSystemMetrics 21939->21940 21941 7ff6b299fdfa 21939->21941 21943 7ff6b299fe2e GetSystemMetrics 21940->21943 21944 7ff6b299fe78 GetSystemMetrics 21940->21944 21942 7ff6b299fe97 8 API calls 21941->21942 21945 7ff6b299ffe2 memcpy_s 21942->21945 21943->21942 21944->21942 21946 7ff6b299fff7 GetDIBits 21945->21946 21947 7ff6b29a002f memcpy_s BuildCatchObjectHelperInternal 21946->21947 21948 7ff6b29ade98 std::_Facet_Register 49 API calls 21947->21948 21949 7ff6b29a00a2 21948->21949 21960 7ff6b29a02a0 GlobalAlloc GlobalLock 21949->21960 21952 7ff6b29a00e1 DeleteObject DeleteObject ReleaseDC 21954 7ff6b29a010b 21952->21954 21953 7ff6b29a01b1 BuildCatchObjectHelperInternal 21955 7ff6b29a01f2 DeleteObject DeleteObject ReleaseDC 21953->21955 21954->21956 21957 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 21954->21957 21955->21954 21956->21929 21958 7ff6b29a0295 21957->21958 21959->21931 22008 7ff6b29cd110 21960->22008 21963 7ff6b29a031f 22010 7ff6b29961e0 21963->22010 21964 7ff6b29a0671 GlobalFree 21965 7ff6b29a00d1 21964->21965 21965->21952 21965->21953 21969 7ff6b29a037c 21970 7ff6b29a0384 GdipCreateBitmapFromStream 21969->21970 21973 7ff6b29a05e7 21969->21973 21971 7ff6b29a03b0 GdipDisposeImage 21970->21971 21972 7ff6b29a03bb 21970->21972 21971->21973 22028 7ff6b299c340 GdipGetImagePixelFormat 21972->22028 21975 7ff6b29a0606 DeleteObject 21973->21975 21976 7ff6b29a062a 21973->21976 21975->21976 21979 7ff6b29961e0 58 API calls 21976->21979 21977 7ff6b29a03c8 GdipDisposeImage 21977->21973 21978 7ff6b29a03dc CreateStreamOnHGlobal 21977->21978 21978->21973 21981 7ff6b29a03f9 21978->21981 21980 7ff6b29a062f EnterCriticalSection 21979->21980 21982 7ff6b29a0642 EnterCriticalSection 21980->21982 21983 7ff6b29a0667 LeaveCriticalSection 21980->21983 22062 7ff6b299c7b0 21981->22062 21985 7ff6b29a0654 GdiplusShutdown 21982->21985 21986 7ff6b29a065a LeaveCriticalSection 21982->21986 21983->21964 21985->21986 21986->21983 21987 7ff6b29a0406 GetHGlobalFromStream GlobalLock 21988 7ff6b29a04bf GlobalSize 21987->21988 21989 7ff6b29a042e GlobalFree 21987->21989 21993 7ff6b29a04d2 BuildCatchObjectHelperInternal 21988->21993 21991 7ff6b29a044f DeleteObject 21989->21991 21992 7ff6b29a0471 21989->21992 21991->21992 21994 7ff6b29961e0 58 API calls 21992->21994 22076 7ff6b2999e70 21993->22076 21996 7ff6b29a0476 EnterCriticalSection 21994->21996 21997 7ff6b29a04ae LeaveCriticalSection 21996->21997 21998 7ff6b29a0489 EnterCriticalSection 21996->21998 21997->21965 21999 7ff6b29a04a1 LeaveCriticalSection 21998->21999 22000 7ff6b29a049b GdiplusShutdown 21998->22000 21999->21997 22000->21999 22001 7ff6b29a0594 22005 7ff6b29a05af DeleteObject 22001->22005 22006 7ff6b29a05d3 GlobalUnlock 22001->22006 22002 7ff6b29a0501 22002->22001 22003 7ff6b29a0698 22002->22003 22004 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22003->22004 22007 7ff6b29a069d 22004->22007 22005->22006 22006->21973 22009 7ff6b29a02f8 GlobalUnlock CreateStreamOnHGlobal 22008->22009 22009->21963 22009->21964 22011 7ff6b2996200 22010->22011 22012 7ff6b299626b EnterCriticalSection LeaveCriticalSection 22010->22012 22090 7ff6b29adbac AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 22011->22090 22021 7ff6b299c9b0 22012->22021 22022 7ff6b29961e0 58 API calls 22021->22022 22023 7ff6b299c9bb 22022->22023 22024 7ff6b299c9c4 22023->22024 22025 7ff6b299c9cc EnterCriticalSection 22023->22025 22024->21969 22026 7ff6b299ca23 LeaveCriticalSection 22025->22026 22027 7ff6b299c9e9 GdiplusStartup 22025->22027 22026->21969 22027->22026 22029 7ff6b299c385 GdipGetImageHeight 22028->22029 22031 7ff6b299c40f GdipGetImageWidth 22029->22031 22032 7ff6b299c402 22029->22032 22033 7ff6b299c424 22031->22033 22032->22031 22091 7ff6b299c160 22033->22091 22035 7ff6b299c445 22036 7ff6b299c461 GdipGetImagePaletteSize 22035->22036 22037 7ff6b299c5fc 22035->22037 22043 7ff6b299c449 _Yarn 22035->22043 22047 7ff6b299c47a std::_Locinfo::_Locinfo_ctor 22036->22047 22038 7ff6b299c6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 22037->22038 22039 7ff6b299c622 GdipBitmapLockBits 22037->22039 22038->22043 22042 7ff6b299c66a BuildCatchObjectHelperInternal 22039->22042 22039->22043 22040 7ff6b299c6c4 GdipBitmapUnlockBits 22040->22043 22041 7ff6b299c78d memcpy_s 22098 7ff6b29b8afc 11 API calls _get_daylight 22041->22098 22042->22040 22042->22041 22043->21977 22045 7ff6b299c4e7 GdipGetImagePalette 22052 7ff6b299c4fb 22045->22052 22046 7ff6b299c799 22099 7ff6b29b3d38 47 API calls _invalid_parameter_noinfo 22046->22099 22047->22043 22047->22045 22049 7ff6b299c7a4 22100 7ff6b29910f0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 22049->22100 22052->22043 22052->22052 22053 7ff6b299c5aa SetDIBColorTable 22052->22053 22096 7ff6b2996280 56 API calls 22052->22096 22053->22037 22054 7ff6b299c5c4 SelectObject 22053->22054 22097 7ff6b2996280 56 API calls 22054->22097 22057 7ff6b299c564 22059 7ff6b299c58e SelectObject 22057->22059 22060 7ff6b299c586 CreateCompatibleDC 22057->22060 22058 7ff6b299c5db 22058->22037 22061 7ff6b299c5f3 DeleteDC 22058->22061 22059->22053 22060->22059 22061->22037 22063 7ff6b299c9b0 61 API calls 22062->22063 22064 7ff6b299c7d4 22063->22064 22065 7ff6b299c992 22064->22065 22066 7ff6b299c7dc GdipGetImageEncodersSize 22064->22066 22065->21987 22066->22065 22067 7ff6b299c7f2 std::_Locinfo::_Locinfo_ctor 22066->22067 22068 7ff6b299c861 _Yarn 22067->22068 22069 7ff6b299c86b GdipGetImageEncoders 22067->22069 22068->21987 22069->22068 22070 7ff6b299c87f 22069->22070 22070->22068 22071 7ff6b299c8f1 GdipCreateBitmapFromScan0 22070->22071 22072 7ff6b299c923 GdipCreateBitmapFromHBITMAP 22070->22072 22073 7ff6b299c933 GdipSaveImageToStream 22071->22073 22072->22073 22074 7ff6b299c95e GdipDisposeImage 22073->22074 22075 7ff6b299c951 GdipDisposeImage 22073->22075 22074->22068 22075->22068 22079 7ff6b2999ea1 22076->22079 22087 7ff6b2999f77 22076->22087 22080 7ff6b2999ea7 BuildCatchObjectHelperInternal 22079->22080 22081 7ff6b2999ed3 22079->22081 22082 7ff6b2999f2c 22079->22082 22080->22002 22083 7ff6b29ade98 std::_Facet_Register 49 API calls 22081->22083 22089 7ff6b2999f71 22081->22089 22084 7ff6b29ade98 std::_Facet_Register 49 API calls 22082->22084 22085 7ff6b2999ee9 22083->22085 22084->22080 22085->22080 22088 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22085->22088 22102 7ff6b29961c0 49 API calls 22087->22102 22088->22089 22101 7ff6b29919d0 49 API calls Concurrency::cancel_current_task 22089->22101 22092 7ff6b299c19b memcpy_s 22091->22092 22093 7ff6b299c202 CreateDIBSection 22092->22093 22095 7ff6b299c249 _Yarn 22092->22095 22094 7ff6b299c227 GetObjectW 22093->22094 22093->22095 22094->22095 22095->22035 22096->22057 22097->22058 22098->22046 22099->22049 22101->22087 22104 7ff6b29980e4 memcpy_s 22103->22104 22106 7ff6b2998076 memcpy_s 22103->22106 22105 7ff6b29ac2e0 77 API calls 22104->22105 22108 7ff6b2998105 22105->22108 22140 7ff6b29ac2e0 22106->22140 22108->22108 22109 7ff6b29980b8 BuildCatchObjectHelperInternal 22108->22109 22110 7ff6b29981bb 22108->22110 22111 7ff6b29982b7 22108->22111 22139 7ff6b299818f 22108->22139 22109->21870 22154 7ff6b2999c80 49 API calls 4 library calls 22110->22154 22156 7ff6b2999c80 49 API calls 4 library calls 22111->22156 22114 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22117 7ff6b2998675 22114->22117 22115 7ff6b29981d6 22119 7ff6b2999e70 49 API calls 22115->22119 22116 7ff6b29982d6 22120 7ff6b2999e70 49 API calls 22116->22120 22118 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22117->22118 22121 7ff6b299867b 22118->22121 22123 7ff6b2998206 22119->22123 22124 7ff6b2998303 22120->22124 22122 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22121->22122 22125 7ff6b2998681 22122->22125 22155 7ff6b2999bc0 47 API calls _invalid_parameter_noinfo_noreturn 22123->22155 22157 7ff6b2999bc0 47 API calls _invalid_parameter_noinfo_noreturn 22124->22157 22128 7ff6b29b3d58 _invalid_parameter_noinfo_noreturn 47 API calls 22125->22128 22129 7ff6b2998687 22128->22129 22130 7ff6b29984f4 OutputDebugStringA 22131 7ff6b2998518 MultiByteToWideChar 22130->22131 22137 7ff6b2998591 memcpy_s BuildCatchObjectHelperInternal 22130->22137 22132 7ff6b29aded4 22131->22132 22133 7ff6b299855f MultiByteToWideChar 22132->22133 22133->22137 22134 7ff6b29984dc 22134->22130 22135 7ff6b2998273 std::_Locinfo::_Locinfo_ctor BuildCatchObjectHelperInternal 22135->22117 22135->22121 22135->22130 22135->22134 22158 7ff6b299a010 49 API calls 4 library calls 22135->22158 22159 7ff6b2999bc0 47 API calls _invalid_parameter_noinfo_noreturn 22137->22159 22139->22109 22139->22114 22139->22125 22141 7ff6b29ac300 wsprintfW CreateFileW 22140->22141 22142 7ff6b29ac509 22141->22142 22143 7ff6b29ac34d DeviceIoControl 22141->22143 22142->22109 22144 7ff6b29ac500 CloseHandle 22143->22144 22149 7ff6b29ac398 _Yarn 22143->22149 22144->22142 22145 7ff6b29ac3c2 DeviceIoControl 22146 7ff6b29ac4f3 _Yarn 22145->22146 22145->22149 22146->22144 22147 7ff6b29ac41c DeviceIoControl 22147->22144 22147->22149 22148 7ff6b29ac480 DeviceIoControl 22148->22146 22148->22149 22149->22144 22149->22145 22149->22147 22149->22148 22150 7ff6b29ac520 WideCharToMultiByte WideCharToMultiByte 22149->22150 22160 7ff6b29ac1b0 22149->22160 22150->22149 22153 7ff6b29ac4ef 22153->22142 22154->22115 22155->22135 22156->22116 22157->22135 22158->22135 22159->22139 22161 7ff6b29ac1d1 22160->22161 22162 7ff6b29ac2c9 CloseHandle 22161->22162 22163 7ff6b29ac22f CreateFileA 22161->22163 22162->22141 22162->22153 22163->22162 22164 7ff6b29ac268 _Yarn 22163->22164 22165 7ff6b29ac270 DeviceIoControl 22164->22165 22165->22162 22166 7ff6b29ac2ab 22165->22166 22169 7ff6b29abdd0 22166->22169 22170 7ff6b29ac190 CloseHandle 22169->22170 22173 7ff6b29abdfd memcpy_s 22169->22173 22171 7ff6b29ac166 _Yarn 22171->22170 22172 7ff6b29abe40 DeviceIoControl 22172->22171 22172->22173 22173->22171 22173->22172 22174 7ff6b29abe8c DeviceIoControl 22173->22174 22175 7ff6b29abf8e DeviceIoControl 22173->22175 22176 7ff6b29abf08 GlobalAlloc 22173->22176 22177 7ff6b29abfee GlobalAlloc 22173->22177 22180 7ff6b29abf7b GlobalFree 22173->22180 22181 7ff6b29ac5c0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 22173->22181 22193 7ff6b29abd70 51 API calls 22173->22193 22174->22173 22175->22173 22176->22173 22178 7ff6b29abf20 DeviceIoControl 22176->22178 22177->22173 22179 7ff6b29ac003 DeviceIoControl 22177->22179 22178->22173 22178->22180 22182 7ff6b29ac041 22179->22182 22183 7ff6b29ac06c GlobalFree 22179->22183 22180->22173 22181->22173 22189 7ff6b29ac520 WideCharToMultiByte 22182->22189 22183->22173 22185 7ff6b29ac04a GlobalFree 22185->22173 22187 7ff6b29ac05b 22185->22187 22187->22173 22188 7ff6b29ac1b0 58 API calls 22187->22188 22188->22187 22190 7ff6b29ac561 22189->22190 22191 7ff6b29ac59a _Yarn 22189->22191 22190->22191 22192 7ff6b29ac570 WideCharToMultiByte 22190->22192 22191->22185 22192->22191 22193->22173 22195 7ff6b29937af setsockopt CancelIo closesocket SetEvent 22194->22195 22196 7ff6b299381a 22194->22196 22195->22196 22196->21845 22198 7ff6b29bebe8 _get_daylight 11 API calls 22197->22198 22200 7ff6b29b8889 22198->22200 22199 7ff6b29b88d0 ExitThread 22200->22199 22201 7ff6b29b88a5 22200->22201 22206 7ff6b29c10fc 5 API calls std::_Lockit::_Lockit 22200->22206 22203 7ff6b29b88b3 CloseHandle 22201->22203 22204 7ff6b29b88b9 22201->22204 22203->22204 22204->22199 22205 7ff6b29b88c7 FreeLibraryAndExitThread 22204->22205 22205->22199 22206->22201 22241 7ff6b29cce0c RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 22325 7ff6b29c070c 57 API calls _isindst 22242 7ff6b2991160 HeapReAlloc 22326 7ff6b29ccc64 CloseHandle 22243 7ff6b299f160 52 API calls 5 library calls 22329 7ff6b2991058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22245 7ff6b29bab5c 7 API calls 22331 7ff6b2991470 VirtualFree 22332 7ff6b2994470 164 API calls std::_Locinfo::_Locinfo_ctor 22248 7ff6b29bbb69 63 API calls 22249 7ff6b29c0368 17 API calls 2 library calls 22250 7ff6b299e36a OpenEventLogW ClearEventLogW CloseEventLog 22336 7ff6b299de3f 55 API calls 4 library calls 22337 7ff6b29c5040 60 API calls 4 library calls 22253 7ff6b2991140 HeapFree 22254 7ff6b29ca544 67 API calls 22339 7ff6b2991040 GetTickCount 22340 7ff6b2995640 40 API calls 22255 7ff6b29a1340 HeapFree HeapDestroy HeapCreate HeapDestroy _Yarn 22256 7ff6b2999740 83 API calls 22258 7ff6b299cd40 88 API calls 3 library calls 22261 7ff6b29c1338 FreeLibrary 22262 7ff6b29ae13c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22343 7ff6b29cea50 DeleteDC DeleteDC DeleteDC DeleteDC 22266 7ff6b29c0748 12 API calls 22344 7ff6b299e248 7 API calls 22268 7ff6b29c714c 54 API calls 4 library calls 22345 7ff6b299dc4d 56 API calls 4 library calls 22269 7ff6b29c7ba0 57 API calls 4 library calls 22270 7ff6b29ceba4 DecodePointer 22271 7ff6b29911a0 HeapSize 22346 7ff6b29954a0 70 API calls 22347 7ff6b29a0ca0 15 API calls BuildCatchObjectHelperInternal 22272 7ff6b299efa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22273 7ff6b29adfa4 48 API calls 2 library calls 22348 7ff6b299e697 79 API calls 4 library calls 22350 7ff6b29c549c GetProcessHeap 22352 7ff6b29ad0b0 7 API calls _Yarn 22278 7ff6b29911b0 HeapDestroy 22279 7ff6b29ac7b4 DeleteCriticalSection _Yarn 22355 7ff6b29ceab0 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22280 7ff6b29b25aa 57 API calls 2 library calls 22357 7ff6b2991a80 LeaveCriticalSection 22358 7ff6b299c080 64 API calls 22359 7ff6b299be80 12 API calls _Wcrtomb 22360 7ff6b2991078 InitializeCriticalSectionEx shared_ptr 22283 7ff6b29af77c 60 API calls _CallSETranslator 22285 7ff6b299bd90 13 API calls 22364 7ff6b29c0488 80 API calls __free_lconv_num

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff6b29962f0-7ff6b2996344 call 7ff6b29ae4e0 call 7ff6b29ade98 call 7ff6b29cd7b0 7 7ff6b299635e-7ff6b29963ac call 7ff6b29cd7b0 gethostname gethostbyname 0->7 8 7ff6b2996346-7ff6b2996359 call 7ff6b29b87a0 0->8 12 7ff6b299644f-7ff6b2996538 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 7->12 13 7ff6b29963b2-7ff6b29963fc inet_ntoa call 7ff6b29b8f58 * 2 7->13 8->7 15 7ff6b299653e-7ff6b2996551 GetProcAddress 12->15 16 7ff6b299665c-7ff6b2996697 GetSystemInfo wsprintfW 12->16 13->12 29 7ff6b29963fe 13->29 17 7ff6b2996653-7ff6b2996656 FreeLibrary 15->17 18 7ff6b2996557-7ff6b29965e5 call 7ff6b2993670 call 7ff6b29aded4 call 7ff6b29991a0 15->18 19 7ff6b29966a0-7ff6b29966bf GetDriveTypeW 16->19 17->16 45 7ff6b29965e7 18->45 46 7ff6b29965ed-7ff6b2996620 RegOpenKeyExW RegQueryValueExW 18->46 21 7ff6b29966c1-7ff6b29966f5 GetDiskFreeSpaceExW 19->21 22 7ff6b29966f8-7ff6b29966fd 19->22 21->22 22->19 25 7ff6b29966ff-7ff6b29967a2 GlobalMemoryStatusEx call 7ff6b2993670 * 2 call 7ff6b2998e00 GetForegroundWindow 22->25 47 7ff6b29967a4-7ff6b29967b4 GetWindowTextW 25->47 48 7ff6b29967ba-7ff6b29967fd lstrlenW call 7ff6b2998cd0 25->48 32 7ff6b2996400-7ff6b299644d inet_ntoa call 7ff6b29b8f58 * 2 29->32 32->12 45->46 49 7ff6b2996640-7ff6b299664e RegCloseKey call 7ff6b29ade64 46->49 50 7ff6b2996622-7ff6b2996624 46->50 47->48 55 7ff6b29967ff-7ff6b299681d GetLocalTime wsprintfW 48->55 56 7ff6b2996823-7ff6b2996862 call 7ff6b29b87a0 lstrlenW call 7ff6b2998cd0 48->56 49->17 50->49 52 7ff6b2996626-7ff6b299663b call 7ff6b29b9248 50->52 52->49 55->56 62 7ff6b2996864-7ff6b2996873 call 7ff6b29b87a0 56->62 63 7ff6b2996878-7ff6b29968ab GetModuleHandleW GetProcAddress 56->63 62->63 65 7ff6b29968b1 GetSystemInfo 63->65 66 7ff6b29968ad-7ff6b29968af GetNativeSystemInfo 63->66 67 7ff6b29968b7-7ff6b29968c3 65->67 66->67 68 7ff6b29968d1 67->68 69 7ff6b29968c5-7ff6b29968cf 67->69 70 7ff6b29968d6-7ff6b2996916 wsprintfW call 7ff6b2998ad0 GetCurrentProcessId 68->70 69->68 69->70 73 7ff6b2996a5e-7ff6b2996a8f CoInitializeEx CoCreateInstance 70->73 74 7ff6b299691c-7ff6b2996937 OpenProcess 70->74 75 7ff6b2996b8f 73->75 76 7ff6b2996a95-7ff6b2996aaa 73->76 77 7ff6b2996a57 74->77 78 7ff6b299693d-7ff6b2996955 K32GetProcessImageFileNameW 74->78 81 7ff6b2996b96-7ff6b2996bef call 7ff6b29b87a0 call 7ff6b29cd7b0 RegOpenKeyExW 75->81 82 7ff6b2996ab0-7ff6b2996ab2 76->82 77->73 79 7ff6b2996a4e-7ff6b2996a51 CloseHandle 78->79 80 7ff6b299695b-7ff6b299696f GetLogicalDriveStringsW 78->80 79->77 83 7ff6b2996a3e-7ff6b2996a48 lstrcpyW 80->83 84 7ff6b2996975-7ff6b299697e 80->84 96 7ff6b2996d52-7ff6b2996d62 lstrlenW 81->96 97 7ff6b2996bf5-7ff6b2996c4f RegQueryInfoKeyW 81->97 82->75 86 7ff6b2996ab8-7ff6b2996ae5 82->86 83->79 84->83 87 7ff6b2996984-7ff6b299698b 84->87 106 7ff6b2996b7e-7ff6b2996b8d CoUninitialize 86->106 107 7ff6b2996aeb 86->107 89 7ff6b2996990-7ff6b29969b0 lstrcmpiW 87->89 92 7ff6b2996a2e-7ff6b2996a38 89->92 93 7ff6b29969b2-7ff6b29969c4 lstrcmpiW 89->93 92->83 92->89 93->92 95 7ff6b29969c6-7ff6b29969fe QueryDosDeviceW 93->95 95->79 102 7ff6b2996a00-7ff6b2996a28 lstrlenW call 7ff6b29b90ac 95->102 98 7ff6b2996d82-7ff6b2996e7d call 7ff6b29979e0 call 7ff6b29b9248 GetTickCount call 7ff6b29b8b9c call 7ff6b29b8f10 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 96->98 100 7ff6b2996d64-7ff6b2996d7d call 7ff6b29b9248 96->100 97->98 99 7ff6b2996c55-7ff6b2996c67 97->99 137 7ff6b2996e7f-7ff6b2996e8b 98->137 138 7ff6b2996eb6 98->138 99->96 103 7ff6b2996c6d-7ff6b2996c70 99->103 100->98 102->92 115 7ff6b2996e8d-7ff6b2996eb1 lstrcpyW lstrcatW 102->115 103->96 109 7ff6b2996c76-7ff6b2996c8f call 7ff6b29cd7b0 103->109 106->75 106->81 111 7ff6b2996af0-7ff6b2996b13 107->111 119 7ff6b2996c95 109->119 120 7ff6b2996d47-7ff6b2996d4c RegCloseKey 109->120 122 7ff6b2996b15-7ff6b2996b34 111->122 123 7ff6b2996b4d-7ff6b2996b78 111->123 115->79 124 7ff6b2996ca0-7ff6b2996cf5 call 7ff6b29cd7b0 RegEnumKeyExW lstrlenW 119->124 120->96 130 7ff6b2996b42-7ff6b2996b47 122->130 131 7ff6b2996b36-7ff6b2996b3c SysFreeString 122->131 123->106 123->111 135 7ff6b2996cf7-7ff6b2996d07 lstrlenW 124->135 136 7ff6b2996d39-7ff6b2996d41 124->136 130->123 131->130 135->136 139 7ff6b2996d09-7ff6b2996d34 call 7ff6b29b8b24 * 2 135->139 136->120 136->124 140 7ff6b2996ebb-7ff6b2996f0d call 7ff6b2997250 lstrlenW call 7ff6b2998cd0 137->140 138->140 139->136 148 7ff6b2996f13-7ff6b2996f96 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 140->148 149 7ff6b2996fe7-7ff6b2996ffb CreateToolhelp32Snapshot 140->149 150 7ff6b2996f98-7ff6b2996fcb lstrlenW RegSetValueExW 148->150 151 7ff6b2996fda-7ff6b2996fe1 RegCloseKey 148->151 152 7ff6b2997001-7ff6b2997031 call 7ff6b29cd7b0 Process32FirstW 149->152 153 7ff6b2997088 149->153 150->151 155 7ff6b2996fcd-7ff6b2996fd4 RegCloseKey 150->155 151->149 152->153 161 7ff6b2997033-7ff6b299703a 152->161 154 7ff6b299708a-7ff6b29970a5 CreateToolhelp32Snapshot 153->154 157 7ff6b2997138 154->157 158 7ff6b29970ab-7ff6b29970db call 7ff6b29cd7b0 Process32FirstW 154->158 155->151 162 7ff6b299713a-7ff6b2997155 CreateToolhelp32Snapshot 157->162 158->157 168 7ff6b29970dd-7ff6b29970e8 158->168 164 7ff6b2997040-7ff6b299704f 161->164 165 7ff6b29971ff-7ff6b2997219 call 7ff6b2993e30 162->165 166 7ff6b299715b-7ff6b299718b call 7ff6b29cd7b0 Process32FirstW 162->166 169 7ff6b2997050-7ff6b299705a 164->169 172 7ff6b299721c-7ff6b2997240 call 7ff6b29ade64 165->172 166->165 177 7ff6b299718d-7ff6b2997198 166->177 171 7ff6b29970f0-7ff6b29970fe 168->171 173 7ff6b2997074-7ff6b2997086 Process32NextW 169->173 174 7ff6b299705c-7ff6b2997064 169->174 178 7ff6b2997100-7ff6b299710a 171->178 173->153 173->164 175 7ff6b29971e6-7ff6b29971eb 174->175 176 7ff6b299706a-7ff6b2997072 174->176 175->154 176->169 176->173 181 7ff6b29971a0-7ff6b29971ae 177->181 182 7ff6b2997124-7ff6b2997136 Process32NextW 178->182 183 7ff6b299710c-7ff6b2997114 178->183 184 7ff6b29971b0-7ff6b29971ba 181->184 182->157 182->171 185 7ff6b29971f0-7ff6b29971f5 183->185 186 7ff6b299711a-7ff6b2997122 183->186 187 7ff6b29971d0-7ff6b29971e2 Process32NextW 184->187 188 7ff6b29971bc-7ff6b29971c4 184->188 185->162 186->178 186->182 187->181 191 7ff6b29971e4 187->191 189 7ff6b29971c6-7ff6b29971ce 188->189 190 7ff6b29971fa 188->190 189->184 189->187 190->165 191->165
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
            • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $994fb371-6ab9-47a0-b675-d4b4b918e869$A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$kernel32.dll$ntdll.dll$x64$x86
            • API String ID: 4136965836-2306317373
            • Opcode ID: eb17342b3a26759b7952b70cf8a243a6c9ae32ccd61cc7147b7bad50c9a7a965
            • Instruction ID: 25117bd899134f8e2380687bb850796c51e8052958faf7008e1d5e4246d7f8f1
            • Opcode Fuzzy Hash: eb17342b3a26759b7952b70cf8a243a6c9ae32ccd61cc7147b7bad50c9a7a965
            • Instruction Fuzzy Hash: B0924432A04A8386EB25EF2AD8446E933A0FB48B5CF844136DB4D877AADF7CD555C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 193 7ff6b29ab500-7ff6b29ab541 call 7ff6b29b9c1c SleepEx 196 7ff6b29ab573-7ff6b29ab57a 193->196 197 7ff6b29ab543-7ff6b29ab56d call 7ff6b29ade98 call 7ff6b29b8940 CloseHandle 193->197 198 7ff6b29ab580-7ff6b29ab59d GetCurrentProcess OpenProcessToken 196->198 199 7ff6b29ab64f-7ff6b29ab759 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff6b29b8940 CloseHandle call 7ff6b29ade98 call 7ff6b29936e0 call 7ff6b29aad80 AllocateAndInitializeSid 196->199 197->196 202 7ff6b29ab59f-7ff6b29ab5ee LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 198->202 203 7ff6b29ab5f4-7ff6b29ab617 GetModuleHandleA GetProcAddress 198->203 215 7ff6b29ab789-7ff6b29ab790 199->215 216 7ff6b29ab75b-7ff6b29ab773 CheckTokenMembership 199->216 202->203 203->199 206 7ff6b29ab619-7ff6b29ab64a GetCurrentProcessId OpenProcess 203->206 206->199 219 7ff6b29ab792-7ff6b29ab807 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 215->219 220 7ff6b29ab80d-7ff6b29ab81b 215->220 217 7ff6b29ab775 216->217 218 7ff6b29ab77c-7ff6b29ab783 FreeSid 216->218 217->218 218->215 219->220 221 7ff6b29ab820-7ff6b29ab833 220->221 222 7ff6b29ab861-7ff6b29ab885 call 7ff6b29b87a0 * 2 221->222 223 7ff6b29ab835-7ff6b29ab85f call 7ff6b29b87a0 * 2 221->223 232 7ff6b29ab88b-7ff6b29ab8b4 222->232 223->232 233 7ff6b29ab8f9-7ff6b29ab903 232->233 234 7ff6b29ab8b6-7ff6b29ab8f2 call 7ff6b29b87a0 * 2 232->234 236 7ff6b29ab905 233->236 237 7ff6b29ab90a-7ff6b29ab955 call 7ff6b29b9c1c SleepEx call 7ff6b29b9c1c call 7ff6b2993820 233->237 234->233 236->237 237->221 246 7ff6b29ab95b-7ff6b29aba18 call 7ff6b29b9c1c CreateEventA call 7ff6b29b87a0 call 7ff6b29962f0 237->246 253 7ff6b29aba1d-7ff6b29aba20 246->253 254 7ff6b29aba30 253->254 255 7ff6b29aba22-7ff6b29aba2e 253->255 256 7ff6b29aba33-7ff6b29aba3a 254->256 261 7ff6b29aba7e-7ff6b29aba8d 255->261 257 7ff6b29aba65-7ff6b29aba6c 256->257 258 7ff6b29aba3c-7ff6b29aba4c Sleep 256->258 263 7ff6b29aba72-7ff6b29aba7d Sleep 257->263 258->256 260 7ff6b29aba4e-7ff6b29aba55 258->260 260->257 262 7ff6b29aba57-7ff6b29aba63 260->262 264 7ff6b29aba8f-7ff6b29abaa7 261->264 265 7ff6b29abad5-7ff6b29abae4 CloseHandle 261->265 262->263 263->261 266 7ff6b29ababe-7ff6b29abace call 7ff6b29ade64 264->266 267 7ff6b29abaa9-7ff6b29ababc 264->267 265->221 266->265 267->266 269 7ff6b29abae9-7ff6b29abb04 call 7ff6b29b3d58 IsDebuggerPresent 267->269 274 7ff6b29abb11-7ff6b29abb34 LoadLibraryW 269->274 275 7ff6b29abb06-7ff6b29abb10 269->275 276 7ff6b29abb40-7ff6b29abb5e GetProcAddress 274->276 277 7ff6b29abb36-7ff6b29abb3b 274->277 279 7ff6b29abb60-7ff6b29abb6e FreeLibrary 276->279 280 7ff6b29abb73-7ff6b29abc25 call 7ff6b29cd7b0 GetLocalTime wsprintfW CreateFileW 276->280 278 7ff6b29abcae-7ff6b29abcc8 277->278 281 7ff6b29abca6 279->281 284 7ff6b29abc35-7ff6b29abc90 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 280->284 285 7ff6b29abc27-7ff6b29abc33 FreeLibrary 280->285 281->278 286 7ff6b29abc96-7ff6b29abc9e 284->286 285->286 286->281
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressByteCharCurrentFreeLibraryMultiProcWide_invalid_parameter_noinfoinet_ntoa$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_noreturngethostbynamegethostnamewsprintf
            • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$10443$27.124.4.60$27.124.4.60$27.124.4.60$27.124.4.60$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
            • API String ID: 905065789-1622102136
            • Opcode ID: af5b0ca8d781796932839bb88e6d9c06d7e346fee9f2ebf3790dbac2dd1ba735
            • Instruction ID: 08a666b847607170b47f987bdc11332308cb38e12070f931f9ae05a010ab8395
            • Opcode Fuzzy Hash: af5b0ca8d781796932839bb88e6d9c06d7e346fee9f2ebf3790dbac2dd1ba735
            • Instruction Fuzzy Hash: 69223671A18B83C6E721EF2AE8542A973E5FB89B58F400136DB4D876A6DFBCD145C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 289 7ff6b299f410-7ff6b299f49f call 7ff6b29ade98 call 7ff6b29cd7b0 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 294 7ff6b299f4a1-7ff6b299f4ae GetWindowTextW 289->294 295 7ff6b299f4b4-7ff6b299f4d6 CreateToolhelp32Snapshot 289->295 294->295 296 7ff6b299f555 295->296 297 7ff6b299f4d8-7ff6b299f4ff call 7ff6b29cd7b0 Process32FirstW 295->297 298 7ff6b299f557-7ff6b299f571 CreateToolhelp32Snapshot 296->298 297->296 304 7ff6b299f501-7ff6b299f508 297->304 300 7ff6b299f577-7ff6b299f5a7 call 7ff6b29cd7b0 Process32FirstW 298->300 301 7ff6b299f5f8 298->301 300->301 310 7ff6b299f5a9 300->310 305 7ff6b299f5fa-7ff6b299f614 CreateToolhelp32Snapshot 301->305 307 7ff6b299f510-7ff6b299f517 304->307 308 7ff6b299f6a8 305->308 309 7ff6b299f61a-7ff6b299f64a call 7ff6b29cd7b0 Process32FirstW 305->309 312 7ff6b299f520-7ff6b299f52a 307->312 311 7ff6b299f6aa-7ff6b299f6f4 RegOpenKeyExW 308->311 309->308 327 7ff6b299f64c-7ff6b299f657 309->327 314 7ff6b299f5b0-7ff6b299f5ba 310->314 315 7ff6b299f913-7ff6b299f94b RegOpenKeyExW 311->315 316 7ff6b299f6fa-7ff6b299f72e RegQueryValueExW 311->316 317 7ff6b299f544-7ff6b299f553 Process32NextW 312->317 318 7ff6b299f52c-7ff6b299f534 312->318 322 7ff6b299f5c0-7ff6b299f5ca 314->322 320 7ff6b299f951-7ff6b299f984 RegQueryValueExW 315->320 321 7ff6b299f9f2-7ff6b299fa2a RegOpenKeyExW 315->321 323 7ff6b299f734-7ff6b299f78b call 7ff6b29aded4 call 7ff6b29cd7b0 RegQueryValueExW 316->323 324 7ff6b299f908-7ff6b299f90d RegCloseKey 316->324 317->296 317->307 325 7ff6b299f7f2-7ff6b299f7f4 318->325 326 7ff6b299f53a-7ff6b299f542 318->326 329 7ff6b299f9e7-7ff6b299f9ec RegCloseKey 320->329 330 7ff6b299f986-7ff6b299f9dd call 7ff6b29aded4 call 7ff6b29cd7b0 RegQueryValueExW 320->330 334 7ff6b299fad1-7ff6b299fb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 321->334 335 7ff6b299fa30-7ff6b299fa63 RegQueryValueExW 321->335 331 7ff6b299f5e4-7ff6b299f5f6 Process32NextW 322->331 332 7ff6b299f5cc-7ff6b299f5d4 322->332 323->324 361 7ff6b299f791-7ff6b299f7b9 call 7ff6b29a1390 323->361 324->315 325->298 326->312 326->317 328 7ff6b299f660-7ff6b299f66a 327->328 336 7ff6b299f670-7ff6b299f67a 328->336 329->321 330->329 363 7ff6b299f9df 330->363 331->301 331->314 340 7ff6b299f7f9-7ff6b299f7fb 332->340 341 7ff6b299f5da-7ff6b299f5e2 332->341 338 7ff6b299fb91-7ff6b299fbdc FindClose call 7ff6b299fd10 334->338 339 7ff6b299fb89 334->339 343 7ff6b299fa65-7ff6b299fabc call 7ff6b29aded4 call 7ff6b29cd7b0 RegQueryValueExW 335->343 344 7ff6b299fac6-7ff6b299facb RegCloseKey 335->344 345 7ff6b299f694-7ff6b299f6a6 Process32NextW 336->345 346 7ff6b299f67c-7ff6b299f684 336->346 359 7ff6b299fbde-7ff6b299fbe2 338->359 360 7ff6b299fbf8-7ff6b299fc20 call 7ff6b29aded4 338->360 339->338 340->305 341->322 341->331 343->344 367 7ff6b299fabe 343->367 344->334 345->308 345->328 351 7ff6b299f800-7ff6b299f802 346->351 352 7ff6b299f68a-7ff6b299f692 346->352 351->311 352->336 352->345 359->360 364 7ff6b299fbe4-7ff6b299fbf1 359->364 372 7ff6b299fc23-7ff6b299fc7c 360->372 370 7ff6b299f7bf-7ff6b299f7ca 361->370 371 7ff6b299f845-7ff6b299f855 361->371 363->329 364->360 367->344 374 7ff6b299f7d0-7ff6b299f7d9 370->374 375 7ff6b299f857-7ff6b299f85e 371->375 376 7ff6b299f8cd-7ff6b299f8d1 371->376 372->372 373 7ff6b299fc7e-7ff6b299fcac call 7ff6b29cd110 372->373 388 7ff6b299fcbe-7ff6b299fcc1 373->388 389 7ff6b299fcae-7ff6b299fcbb call 7ff6b2993e30 373->389 374->371 379 7ff6b299f7db 374->379 377 7ff6b299f862-7ff6b299f86b 375->377 376->324 380 7ff6b299f8d3-7ff6b299f8e5 376->380 377->376 381 7ff6b299f86d 377->381 383 7ff6b299f7e0-7ff6b299f7e4 379->383 384 7ff6b299f900-7ff6b299f903 call 7ff6b29ade64 380->384 385 7ff6b299f8e7-7ff6b299f8fa 380->385 387 7ff6b299f870-7ff6b299f874 381->387 390 7ff6b299f807-7ff6b299f80a 383->390 391 7ff6b299f7e6-7ff6b299f7ee 383->391 384->324 385->384 392 7ff6b299fcfe-7ff6b299fd03 call 7ff6b29b3d58 385->392 393 7ff6b299f876-7ff6b299f87e 387->393 394 7ff6b299f88b-7ff6b299f88e 387->394 396 7ff6b299fcc3-7ff6b299fcc6 call 7ff6b29ade64 388->396 397 7ff6b299fccb-7ff6b299fcf4 call 7ff6b29ade64 388->397 389->388 390->371 398 7ff6b299f80c-7ff6b299f81c 390->398 391->383 395 7ff6b299f7f0 391->395 393->387 400 7ff6b299f880 393->400 394->376 401 7ff6b299f890-7ff6b299f89d 394->401 395->371 396->397 404 7ff6b299f820-7ff6b299f826 398->404 400->376 406 7ff6b299f8a0-7ff6b299f8a6 401->406 408 7ff6b299f882-7ff6b299f886 404->408 409 7ff6b299f828-7ff6b299f834 404->409 410 7ff6b299fcf5-7ff6b299fcf9 406->410 411 7ff6b299f8ac-7ff6b299f8b8 406->411 408->374 409->404 412 7ff6b299f836-7ff6b299f83f 409->412 410->377 411->406 413 7ff6b299f8ba-7ff6b299f8c3 411->413 412->371 414 7ff6b299f8c5 412->414 413->376 413->414 414->376
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
            • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
            • API String ID: 3029130142-1423135667
            • Opcode ID: 8912b3bcebc9d13c5a361c5252454f55fd1a4697a3ef6ccaad31400a9f1ab4cf
            • Instruction ID: 36b9f6ac71cb98b4e38f7aff7d771ed1439a3212ff6be6218290638b303a0605
            • Opcode Fuzzy Hash: 8912b3bcebc9d13c5a361c5252454f55fd1a4697a3ef6ccaad31400a9f1ab4cf
            • Instruction Fuzzy Hash: D432C322A0868385EB61EF6AD4046BD73E0FB55B98F404136DB4D8779ADFBCE554C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: lstrlen$QueryValue$Open
            • String ID: 10443$27.124.4.60$27.124.4.60$27.124.4.60$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
            • API String ID: 1772312705-3266678876
            • Opcode ID: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
            • Instruction ID: 94dd86164394266501af7c0dcbf3b699a3e8d94bae0b2c689431a4084d3884e2
            • Opcode Fuzzy Hash: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
            • Instruction Fuzzy Hash: 2F22B761E19667C1EB26BB1EE4646B963E1FFA5B4CF804035C74EC2997EFBCA1458300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 567 7ff6b299fd10-7ff6b299fd3a GetVersion 568 7ff6b299fd40 567->568 569 7ff6b29a0284-7ff6b29a028f 567->569 570 7ff6b299fd42-7ff6b299fd46 568->570 571 7ff6b299fd4c-7ff6b299fdf8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 568->571 570->569 570->571 572 7ff6b299fe0e-7ff6b299fe2c GetSystemMetrics 571->572 573 7ff6b299fdfa-7ff6b299fe09 571->573 575 7ff6b299fe2e-7ff6b299fe76 GetSystemMetrics 572->575 576 7ff6b299fe78-7ff6b299fe93 GetSystemMetrics 572->576 574 7ff6b299fe97-7ff6b29a00db GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff6b29aded4 call 7ff6b29cd7b0 GetDIBits call 7ff6b29aded4 call 7ff6b29cd7b0 call 7ff6b29cd110 call 7ff6b29ade98 call 7ff6b29a02a0 573->574 591 7ff6b29a01b1-7ff6b29a01e1 call 7ff6b29aded4 574->591 592 7ff6b29a00e1-7ff6b29a011b DeleteObject * 2 ReleaseDC call 7ff6b29ade64 * 2 574->592 575->574 576->574 597 7ff6b29a01e3 591->597 598 7ff6b29a01e6-7ff6b29a0221 call 7ff6b29cd110 DeleteObject * 2 ReleaseDC call 7ff6b29ade64 * 2 591->598 603 7ff6b29a014d-7ff6b29a01b0 call 7ff6b29ade64 592->603 604 7ff6b29a011d-7ff6b29a012a 592->604 597->598 617 7ff6b29a0226-7ff6b29a022e 598->617 606 7ff6b29a0148 call 7ff6b29ade64 604->606 607 7ff6b29a012c-7ff6b29a013f 604->607 606->603 610 7ff6b29a0290-7ff6b29a0295 call 7ff6b29b3d58 607->610 611 7ff6b29a0145 607->611 611->606 618 7ff6b29a0230-7ff6b29a023d 617->618 619 7ff6b29a025c-7ff6b29a027c call 7ff6b29ade64 617->619 620 7ff6b29a023f-7ff6b29a0252 618->620 621 7ff6b29a0257 call 7ff6b29ade64 618->621 619->569 620->610 623 7ff6b29a0254 620->623 621->619 623->621
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: MetricsSystem$Object$CapsCompatibleCreateDeleteDeviceReleaseStretch$BitmapBitsDesktopModeSelectVersionWindow_invalid_parameter_noinfo_noreturn
            • String ID: $($6$gfff$gfff
            • API String ID: 3905184151-2922166585
            • Opcode ID: 44af3f45fffb2cfc8b3a3c13ff4cd9091bcfa2d3e8cf897ab4ce756f2f642521
            • Instruction ID: 773ddbe5870618551d85cb8fe5ed529dad8e8b1800cca552909443dadedfd6a5
            • Opcode Fuzzy Hash: 44af3f45fffb2cfc8b3a3c13ff4cd9091bcfa2d3e8cf897ab4ce756f2f642521
            • Instruction Fuzzy Hash: 67E18971A1878685E726AB2AE40437A73E1FB99F88F108236DB8D97756DF7CD4848700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 626 7ff6b2997250-7ff6b29972a6 627 7ff6b29972b0-7ff6b29972b9 626->627 627->627 628 7ff6b29972bb-7ff6b29972c4 627->628 629 7ff6b29972e2-7ff6b29972e7 call 7ff6b299a300 628->629 630 7ff6b29972c6-7ff6b29972e0 call 7ff6b29cd110 628->630 634 7ff6b29972ec 629->634 630->634 635 7ff6b29972f3-7ff6b29972fb 634->635 635->635 636 7ff6b29972fd-7ff6b2997310 635->636 637 7ff6b2997312-7ff6b2997343 call 7ff6b29cd110 636->637 638 7ff6b2997345-7ff6b2997355 call 7ff6b299a300 636->638 642 7ff6b299735a 637->642 638->642 643 7ff6b2997361-7ff6b299736a 642->643 643->643 644 7ff6b299736c-7ff6b299737f 643->644 645 7ff6b2997381-7ff6b29973b2 call 7ff6b29cd110 644->645 646 7ff6b29973b4-7ff6b29973c4 call 7ff6b299a300 644->646 650 7ff6b29973c9-7ff6b29973cd 645->650 646->650 651 7ff6b29973d4-7ff6b29973dd 650->651 651->651 652 7ff6b29973df-7ff6b29973f2 651->652 653 7ff6b29973f4-7ff6b2997425 call 7ff6b29cd110 652->653 654 7ff6b2997427-7ff6b2997434 call 7ff6b299a300 652->654 658 7ff6b2997439-7ff6b299744d 653->658 654->658 659 7ff6b299744f-7ff6b2997483 call 7ff6b29cd110 658->659 660 7ff6b2997485-7ff6b299749f call 7ff6b299a300 658->660 664 7ff6b29974a4-7ff6b29974af 659->664 660->664 665 7ff6b29974b0-7ff6b29974b9 664->665 665->665 666 7ff6b29974bb-7ff6b29974ce 665->666 667 7ff6b29974d0-7ff6b2997501 call 7ff6b29cd110 666->667 668 7ff6b2997503-7ff6b2997510 call 7ff6b299a300 666->668 672 7ff6b2997515-7ff6b2997519 667->672 668->672 673 7ff6b2997520-7ff6b2997529 672->673 673->673 674 7ff6b299752b-7ff6b299753e 673->674 675 7ff6b2997540-7ff6b2997571 call 7ff6b29cd110 674->675 676 7ff6b2997573-7ff6b2997580 call 7ff6b299a300 674->676 680 7ff6b2997585-7ff6b2997634 call 7ff6b29a9170 call 7ff6b29a9b00 MultiByteToWideChar * 2 675->680 676->680 685 7ff6b2997663-7ff6b299767d 680->685 686 7ff6b2997636-7ff6b2997647 680->686 689 7ff6b299767f-7ff6b2997696 685->689 690 7ff6b29976b2-7ff6b29976d2 685->690 687 7ff6b299765e call 7ff6b29ade64 686->687 688 7ff6b2997649-7ff6b299765c 686->688 687->685 688->687 691 7ff6b29976d9-7ff6b2997717 call 7ff6b29b3d58 CreateMutexExW GetLastError 688->691 693 7ff6b2997698-7ff6b29976ab 689->693 694 7ff6b29976ad call 7ff6b29ade64 689->694 701 7ff6b2997749-7ff6b2997750 691->701 702 7ff6b2997719 691->702 693->694 695 7ff6b29976d3-7ff6b29976d8 call 7ff6b29b3d58 693->695 694->690 695->691 704 7ff6b29977f0-7ff6b29978a2 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 701->704 705 7ff6b2997756 701->705 703 7ff6b2997720-7ff6b2997747 Sleep CreateMutexW GetLastError 702->703 703->701 703->703 706 7ff6b29978a4-7ff6b29978a7 DeleteFileW 704->706 707 7ff6b29978ad-7ff6b29978dd ReleaseMutex DirectInput8Create 704->707 708 7ff6b2997760-7ff6b29977c0 lstrlenW call 7ff6b2998cd0 705->708 706->707 709 7ff6b2997980-7ff6b299799e 707->709 710 7ff6b29978e3-7ff6b2997903 707->710 713 7ff6b29977c2-7ff6b29977d6 lstrcmpW 708->713 714 7ff6b29977d8-7ff6b29977ea SleepEx 708->714 710->709 716 7ff6b2997905-7ff6b299791b 710->716 713->704 713->714 714->704 714->708 716->709 718 7ff6b299791d-7ff6b2997935 716->718 718->709 720 7ff6b2997937-7ff6b299796d 718->720 720->709 722 7ff6b299796f-7ff6b299797e 720->722 722->709 724 7ff6b299799f-7ff6b29979d1 GetTickCount GetKeyState call 7ff6b299adb0 722->724
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID: <$X64$\DisplaySessionContainers.log$key$open
            • API String ID: 143101810-941791203
            • Opcode ID: 84872136b42da0819a194256f274013d04c1c29aff028023f1cbf7d720f00181
            • Instruction ID: f90bae2e764a6975e594d4ef6d9cdce42872ba2acf940e890aaa923ba8c1dfa3
            • Opcode Fuzzy Hash: 84872136b42da0819a194256f274013d04c1c29aff028023f1cbf7d720f00181
            • Instruction Fuzzy Hash: 9822BB72A18A8396EB11EF1AE4042AD73E1FB44BA8F504232DB5D83B9ADF7CD155C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 939 7ff6b29979e0-7ff6b2997a2c call 7ff6b29cd7b0 call 7ff6b29afc98 944 7ff6b2997a32-7ff6b2997a46 939->944 945 7ff6b2997afc-7ff6b2997b27 CoCreateInstance 939->945 948 7ff6b2997a50-7ff6b2997a78 call 7ff6b29cd7b0 CreateToolhelp32Snapshot 944->948 946 7ff6b2997d21-7ff6b2997d2c lstrlenW 945->946 947 7ff6b2997b2d-7ff6b2997b79 945->947 950 7ff6b2997d2e-7ff6b2997d3e lstrcatW 946->950 951 7ff6b2997d3f-7ff6b2997d46 946->951 956 7ff6b2997d0f-7ff6b2997d19 947->956 957 7ff6b2997b7f-7ff6b2997b9b 947->957 958 7ff6b2997ad6-7ff6b2997af6 call 7ff6b29afc98 948->958 959 7ff6b2997a7a-7ff6b2997a90 Process32FirstW 948->959 950->951 952 7ff6b2997d4e-7ff6b2997d64 951->952 953 7ff6b2997d48 951->953 953->952 956->946 961 7ff6b2997d1b 956->961 957->956 969 7ff6b2997ba1-7ff6b2997c5d call 7ff6b29cd7b0 wsprintfW RegOpenKeyExW 957->969 958->945 958->948 962 7ff6b2997a92-7ff6b2997a9c 959->962 963 7ff6b2997acd-7ff6b2997ad0 CloseHandle 959->963 961->946 964 7ff6b2997aa0-7ff6b2997aaa 962->964 963->958 967 7ff6b2997ab4-7ff6b2997ab9 964->967 968 7ff6b2997aac-7ff6b2997ab2 964->968 971 7ff6b2997abf-7ff6b2997acb Process32NextW 967->971 972 7ff6b2997d65-7ff6b2997d6f CloseHandle 967->972 968->964 968->967 975 7ff6b2997c63-7ff6b2997cbe call 7ff6b29cd7b0 RegQueryValueExW 969->975 976 7ff6b2997ced-7ff6b2997cff 969->976 971->962 971->963 972->958 974 7ff6b2997d75-7ff6b2997d93 lstrcatW * 2 972->974 974->958 980 7ff6b2997ce0-7ff6b2997ce7 RegCloseKey 975->980 981 7ff6b2997cc0-7ff6b2997cda lstrcatW * 2 975->981 979 7ff6b2997d07-7ff6b2997d09 976->979 979->956 979->969 980->976 981->980
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
            • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
            • API String ID: 582347850-1583895642
            • Opcode ID: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
            • Instruction ID: 32703b00a4ba1414658800ab3a08016b8e4cd84e32053df5b86ea049b2532acf
            • Opcode Fuzzy Hash: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
            • Instruction Fuzzy Hash: B9A18572A046838AE721DF2AE8402A977E1FB85B9CF444136DF4D87659DF7CD554C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1080 7ff6b2998690-7ff6b29986bf 1081 7ff6b29986c1 1080->1081 1082 7ff6b29986c4-7ff6b29986d3 1080->1082 1081->1082 1083 7ff6b29986d5 1082->1083 1084 7ff6b29986d8-7ff6b29986ed 1082->1084 1083->1084 1085 7ff6b29986f3-7ff6b2998713 GetTokenInformation 1084->1085 1086 7ff6b29988d8 1084->1086 1087 7ff6b299874e-7ff6b2998776 GetTokenInformation 1085->1087 1088 7ff6b2998715-7ff6b299871e GetLastError 1085->1088 1089 7ff6b29988da-7ff6b29988f1 1086->1089 1091 7ff6b29988bf-7ff6b29988c2 1087->1091 1092 7ff6b299877c-7ff6b29987be LookupAccountSidW 1087->1092 1088->1086 1090 7ff6b2998724-7ff6b2998748 GetProcessHeap HeapAlloc 1088->1090 1090->1086 1090->1087 1091->1086 1093 7ff6b29988c4-7ff6b29988d2 GetProcessHeap HeapFree 1091->1093 1094 7ff6b29987ef-7ff6b29987fe 1092->1094 1095 7ff6b29987c0-7ff6b29987cb GetLastError 1092->1095 1093->1086 1096 7ff6b2998800-7ff6b2998807 1094->1096 1097 7ff6b29987e8-7ff6b29987ea 1095->1097 1098 7ff6b29987cd-7ff6b29987e3 call 7ff6b29b87a0 1095->1098 1096->1096 1099 7ff6b2998809-7ff6b2998818 1096->1099 1097->1089 1098->1091 1102 7ff6b2998844-7ff6b299884c call 7ff6b299a1a0 1099->1102 1103 7ff6b299881a-7ff6b2998821 1099->1103 1108 7ff6b2998851-7ff6b2998859 1102->1108 1104 7ff6b2998823 1103->1104 1105 7ff6b2998826-7ff6b2998842 call 7ff6b29cd110 1103->1105 1104->1105 1105->1108 1110 7ff6b2998860-7ff6b2998867 1108->1110 1110->1110 1111 7ff6b2998869-7ff6b2998870 1110->1111 1112 7ff6b299889f-7ff6b29988ad call 7ff6b299a1a0 1111->1112 1113 7ff6b2998872-7ff6b2998879 1111->1113 1118 7ff6b29988b2-7ff6b29988ba 1112->1118 1114 7ff6b299887e-7ff6b299889d call 7ff6b29cd110 1113->1114 1115 7ff6b299887b 1113->1115 1114->1118 1115->1114 1118->1091
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Heap$ErrorInformationLastProcessToken$AccountAllocFreeLookup
            • String ID: NONE_MAPPED
            • API String ID: 162735656-2950899194
            • Opcode ID: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
            • Instruction ID: a846a9981528f59eda7317acb4ef4ae086b75073589fe0dca8915d004ca92280
            • Opcode Fuzzy Hash: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
            • Instruction Fuzzy Hash: A751B662A08B8386E621AF0BE4442AE63E4FB45FD8F444836CB5D83796DF7CD555C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
            • String ID:
            • API String ID: 2277684705-0
            • Opcode ID: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
            • Instruction ID: 0de4753014482f1ca0d704f27e70347950cc406dbfa5eb23024b168e2e2341c1
            • Opcode Fuzzy Hash: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
            • Instruction Fuzzy Hash: A1012835E18A4382E716BF3AFC5817933E1FF88B59B404136C60EC2676DEBCA5498200
            APIs
            • _get_daylight.LIBCMT ref: 00007FF6B29C1DED
              • Part of subcall function 00007FF6B29C1464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C1478
              • Part of subcall function 00007FF6B29BE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6D2
              • Part of subcall function 00007FF6B29BE6BC: GetLastError.KERNEL32(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6DC
              • Part of subcall function 00007FF6B29B3D88: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6B29B3D37,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29B3D91
              • Part of subcall function 00007FF6B29B3D88: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6B29B3D37,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29B3DB6
              • Part of subcall function 00007FF6B29C9F14: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C9E5F
            • _get_daylight.LIBCMT ref: 00007FF6B29C1DDC
              • Part of subcall function 00007FF6B29C14C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C14D8
            • _get_daylight.LIBCMT ref: 00007FF6B29C2052
            • _get_daylight.LIBCMT ref: 00007FF6B29C2063
            • _get_daylight.LIBCMT ref: 00007FF6B29C2074
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6B29C22B4), ref: 00007FF6B29C209B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 4070488512-239921721
            • Opcode ID: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
            • Instruction ID: 8d0f87e9f268023c7be5836d6e44ad24506170c108a19d53f4d335058cb14be2
            • Opcode Fuzzy Hash: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
            • Instruction Fuzzy Hash: 63D19E76A1824386E726BF2B94502B966E1FF84B98F444036EB4DC7A87DFBCE441C744
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
            • String ID:
            • API String ID: 3155671162-0
            • Opcode ID: a3f64c159e1f8c12281d3a723323b544dea2ed46356e4a2f7a8bc90ff95b8b61
            • Instruction ID: 90ce4c9426b34c505a14f02d652acb503f74787811c1531888f47628de0331c3
            • Opcode Fuzzy Hash: a3f64c159e1f8c12281d3a723323b544dea2ed46356e4a2f7a8bc90ff95b8b61
            • Instruction Fuzzy Hash: 17028122F18B8289EB01EB6AD4102AD23E1BB55BACF004635DF5D977DBDEBCE4558340
            APIs
            • _get_daylight.LIBCMT ref: 00007FF6B29C2052
              • Part of subcall function 00007FF6B29C14C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C14D8
            • _get_daylight.LIBCMT ref: 00007FF6B29C2063
              • Part of subcall function 00007FF6B29C1464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C1478
            • _get_daylight.LIBCMT ref: 00007FF6B29C2074
              • Part of subcall function 00007FF6B29C1494: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C14A8
              • Part of subcall function 00007FF6B29BE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6D2
              • Part of subcall function 00007FF6B29BE6BC: GetLastError.KERNEL32(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6DC
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6B29C22B4), ref: 00007FF6B29C209B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 3458911817-239921721
            • Opcode ID: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
            • Instruction ID: 6aa1b5d89f0463fc672d90b3ba8910fadf23b53b1a48edd3022df90f9414eca5
            • Opcode Fuzzy Hash: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
            • Instruction Fuzzy Hash: 2D515C32E1864386E715FF2BE8815A966A0BF48B98F444136EB4DC3A97DFBCE4418744
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: InfoSystem$AddressHandleModuleNativeProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 3433367815-192647395
            • Opcode ID: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
            • Instruction ID: 7cd90928bbaec4b78396997377c179bc3712e39229f76de56d1bbc489d77e2b2
            • Opcode Fuzzy Hash: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
            • Instruction Fuzzy Hash: F7F0FC15E1868383FB22B716D80027523D0FFA8708F805336D68E8155BEF9CE2D48700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1405656091-0
            • Opcode ID: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
            • Instruction ID: 6c53f56adb53d1e94ada9bce8c7821b79935d90a284e72e06f9e4d2ac0048399
            • Opcode Fuzzy Hash: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
            • Instruction Fuzzy Hash: 6591B5B2B0534787EB59AF2AC9452B862D1FB5CB8CF049435DB0D8AB86EF7CE5418740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ControlCreateDeviceFile
            • String ID: L$\\.\
            • API String ID: 107608037-1891537229
            • Opcode ID: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
            • Instruction ID: 9512a40e1fd0233078cadf059cc98f5e7eda6e5b653e2e30163f0df62a078ac7
            • Opcode Fuzzy Hash: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
            • Instruction Fuzzy Hash: AF319062A0878681E7019F56B0543797BD0EB85BE8F084335EBAD477DADEBCD0018B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$AllocFreeTimerecvselecttime
            • String ID:
            • API String ID: 1996171534-0
            • Opcode ID: 53c4d6481df4593ba0870d21542054a705a6c523d21be50c4b1c7e2cbff31edc
            • Instruction ID: 93f7299d57ac51ac5ac0769fd496db7a0ccba36055e354220caa564fb2ef1a05
            • Opcode Fuzzy Hash: 53c4d6481df4593ba0870d21542054a705a6c523d21be50c4b1c7e2cbff31edc
            • Instruction Fuzzy Hash: B5717F72A08A8285E721AF2ED4142BD33A0FB95B9CF149235DF4D83A57EF78E494C705
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
            • Instruction ID: 0f9108c91283d71621e4fc753dd586fe52280817ea3872241ff858a92b3b0909
            • Opcode Fuzzy Hash: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
            • Instruction Fuzzy Hash: 2141E432B08A828AE70AEE2BE4506796795FB44F98B054139EF0EC7746EE78D851C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 727 7ff6b2998900-7ff6b2998938 GetCurrentProcessId OpenProcess 728 7ff6b2998967-7ff6b299896c 727->728 729 7ff6b299893a-7ff6b299895c OpenProcessToken 727->729 732 7ff6b2998a9a-7ff6b2998ab4 728->732 730 7ff6b299895e-7ff6b2998961 CloseHandle 729->730 731 7ff6b2998971-7ff6b2998a12 call 7ff6b2998690 call 7ff6b29cd110 CloseHandle * 2 729->731 730->728 737 7ff6b2998a4f-7ff6b2998a63 731->737 738 7ff6b2998a14-7ff6b2998a2b 731->738 739 7ff6b2998a65-7ff6b2998a7c 737->739 740 7ff6b2998a98 737->740 741 7ff6b2998a42-7ff6b2998a47 call 7ff6b29ade64 738->741 742 7ff6b2998a2d-7ff6b2998a40 738->742 745 7ff6b2998a7e-7ff6b2998a91 739->745 746 7ff6b2998a93 call 7ff6b29ade64 739->746 740->732 741->737 742->741 743 7ff6b2998abb-7ff6b2998b39 call 7ff6b29b3d58 call 7ff6b29aded4 GetCurrentProcessId wsprintfW call 7ff6b2998900 call 7ff6b29cd7b0 GetVersionExW 742->743 761 7ff6b2998b3f-7ff6b2998b44 743->761 762 7ff6b2998c92 743->762 745->746 748 7ff6b2998ab5-7ff6b2998aba call 7ff6b29b3d58 745->748 746->740 748->743 761->762 763 7ff6b2998b4a-7ff6b2998b4f 761->763 764 7ff6b2998c99-7ff6b2998ca3 wsprintfW 762->764 763->762 766 7ff6b2998b55-7ff6b2998b7b GetCurrentProcess OpenProcessToken 763->766 765 7ff6b2998ca9-7ff6b2998cc0 call 7ff6b29ade64 764->765 766->762 768 7ff6b2998b81-7ff6b2998bb0 GetTokenInformation 766->768 770 7ff6b2998bb6-7ff6b2998bbf GetLastError 768->770 771 7ff6b2998c3c-7ff6b2998c4c CloseHandle 768->771 770->771 773 7ff6b2998bc1-7ff6b2998be1 LocalAlloc 770->773 771->762 772 7ff6b2998c4e-7ff6b2998c54 771->772 774 7ff6b2998c56-7ff6b2998c5c 772->774 775 7ff6b2998c89-7ff6b2998c90 772->775 776 7ff6b2998be3-7ff6b2998c10 GetTokenInformation 773->776 777 7ff6b2998c34 773->777 778 7ff6b2998c5e-7ff6b2998c64 774->778 779 7ff6b2998c80-7ff6b2998c87 774->779 775->764 780 7ff6b2998c12-7ff6b2998c29 GetSidSubAuthorityCount GetSidSubAuthority 776->780 781 7ff6b2998c2b-7ff6b2998c2e LocalFree 776->781 777->771 782 7ff6b2998c77-7ff6b2998c7e 778->782 783 7ff6b2998c66-7ff6b2998c6c 778->783 779->764 780->781 781->777 782->764 783->765 784 7ff6b2998c6e-7ff6b2998c75 783->784 784->764
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process$CloseHandleToken$CurrentOpen$AuthorityInformationLocal_invalid_parameter_noinfo_noreturnwsprintf$AllocCountErrorFreeLastVersion
            • String ID: -N/$NO/$None/%s$VenNetwork
            • API String ID: 3589523989-819860926
            • Opcode ID: 0a9c1788867b4a701d7bd4d16366bb909b7284601da0f9e1282e206d5775d4bc
            • Instruction ID: be6dc55af5113a280204e147b604b9ff38b0dd3d9dfa7e8ed402c6759a749fba
            • Opcode Fuzzy Hash: 0a9c1788867b4a701d7bd4d16366bb909b7284601da0f9e1282e206d5775d4bc
            • Instruction Fuzzy Hash: 09A1A721A0DB8386EB22AB1AE4443B963E0FF85BA9F404535DB8D83796DFBCD545C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 785 7ff6b29a02a0-7ff6b29a0319 GlobalAlloc GlobalLock call 7ff6b29cd110 GlobalUnlock CreateStreamOnHGlobal 788 7ff6b29a031f-7ff6b29a037e call 7ff6b29961e0 EnterCriticalSection LeaveCriticalSection call 7ff6b299c9b0 785->788 789 7ff6b29a0671-7ff6b29a067a GlobalFree 785->789 795 7ff6b29a05ee-7ff6b29a0604 788->795 796 7ff6b29a0384-7ff6b29a03ae GdipCreateBitmapFromStream 788->796 790 7ff6b29a067d-7ff6b29a0697 789->790 801 7ff6b29a0606-7ff6b29a0624 DeleteObject 795->801 802 7ff6b29a062a-7ff6b29a0640 call 7ff6b29961e0 EnterCriticalSection 795->802 797 7ff6b29a03b0-7ff6b29a03b6 GdipDisposeImage 796->797 798 7ff6b29a03bb-7ff6b29a03d6 call 7ff6b299c340 GdipDisposeImage 796->798 797->795 798->795 804 7ff6b29a03dc-7ff6b29a03f3 CreateStreamOnHGlobal 798->804 801->802 808 7ff6b29a0642-7ff6b29a0652 EnterCriticalSection 802->808 809 7ff6b29a0667-7ff6b29a066b LeaveCriticalSection 802->809 804->795 807 7ff6b29a03f9-7ff6b29a0428 call 7ff6b299c7b0 GetHGlobalFromStream GlobalLock 804->807 814 7ff6b29a04bf-7ff6b29a0508 GlobalSize call 7ff6b29aded4 call 7ff6b29cd110 call 7ff6b2999e70 807->814 815 7ff6b29a042e-7ff6b29a044d GlobalFree 807->815 811 7ff6b29a0654 GdiplusShutdown 808->811 812 7ff6b29a065a-7ff6b29a0661 LeaveCriticalSection 808->812 809->789 811->812 812->809 829 7ff6b29a055e 814->829 830 7ff6b29a050a-7ff6b29a0512 814->830 820 7ff6b29a044f-7ff6b29a046b DeleteObject 815->820 821 7ff6b29a0471-7ff6b29a0487 call 7ff6b29961e0 EnterCriticalSection 815->821 820->821 827 7ff6b29a04ae-7ff6b29a04ba LeaveCriticalSection 821->827 828 7ff6b29a0489-7ff6b29a0499 EnterCriticalSection 821->828 827->790 831 7ff6b29a04a1-7ff6b29a04a8 LeaveCriticalSection 828->831 832 7ff6b29a049b GdiplusShutdown 828->832 835 7ff6b29a0562-7ff6b29a0566 829->835 833 7ff6b29a0544-7ff6b29a055c 830->833 834 7ff6b29a0514-7ff6b29a0521 830->834 831->827 832->831 833->835 836 7ff6b29a053f call 7ff6b29ade64 834->836 837 7ff6b29a0523-7ff6b29a0536 834->837 838 7ff6b29a0599-7ff6b29a05ad call 7ff6b29ade64 835->838 839 7ff6b29a0568-7ff6b29a0579 835->839 836->833 843 7ff6b29a0698-7ff6b29a069f call 7ff6b29b3d58 837->843 844 7ff6b29a053c 837->844 849 7ff6b29a05af-7ff6b29a05cd DeleteObject 838->849 850 7ff6b29a05d3-7ff6b29a05e1 GlobalUnlock 838->850 840 7ff6b29a0594 call 7ff6b29ade64 839->840 841 7ff6b29a057b-7ff6b29a058e 839->841 840->838 841->840 841->843 844->836 849->850 852 7ff6b29a05e7 850->852 852->795
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 953580087-0
            • Opcode ID: 115e2526ca109c9e428483d497415ba78719f10449944d8e4256b42c43ed8cf6
            • Instruction ID: 25eaac5faa02de67057c88ff01717c8e446bf61530d4e855cd3fe449a3104726
            • Opcode Fuzzy Hash: 115e2526ca109c9e428483d497415ba78719f10449944d8e4256b42c43ed8cf6
            • Instruction Fuzzy Hash: FBC14D36F08B4289EB01EB6AE4142AD33B1FB45B9CB004136CF5E9769ADF78D459D340

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 853 7ff6b299c340-7ff6b299c383 GdipGetImagePixelFormat 854 7ff6b299c385 853->854 855 7ff6b299c387-7ff6b299c3a4 853->855 854->855 856 7ff6b299c3a6-7ff6b299c3b3 855->856 857 7ff6b299c3b9-7ff6b299c3c4 855->857 856->857 858 7ff6b299c3c6-7ff6b299c3d4 857->858 859 7ff6b299c3db-7ff6b299c400 GdipGetImageHeight 857->859 858->859 860 7ff6b299c40f-7ff6b299c422 GdipGetImageWidth 859->860 861 7ff6b299c402-7ff6b299c40c 859->861 862 7ff6b299c424 860->862 863 7ff6b299c426-7ff6b299c447 call 7ff6b299c160 860->863 861->860 862->863 866 7ff6b299c453-7ff6b299c45b 863->866 867 7ff6b299c449-7ff6b299c44e 863->867 868 7ff6b299c461-7ff6b299c478 GdipGetImagePaletteSize 866->868 869 7ff6b299c60d-7ff6b299c61c 866->869 870 7ff6b299c773-7ff6b299c78c 867->870 871 7ff6b299c47a 868->871 872 7ff6b299c47c-7ff6b299c487 868->872 873 7ff6b299c6e2-7ff6b299c74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 869->873 874 7ff6b299c622-7ff6b299c64e GdipBitmapLockBits 869->874 871->872 875 7ff6b299c489-7ff6b299c492 call 7ff6b299b2e0 872->875 876 7ff6b299c4ba-7ff6b299c4c6 call 7ff6b29b3dd0 872->876 877 7ff6b299c753-7ff6b299c756 873->877 878 7ff6b299c650-7ff6b299c65a 874->878 879 7ff6b299c66a-7ff6b299c686 874->879 875->876 894 7ff6b299c494-7ff6b299c49b 875->894 896 7ff6b299c4c8-7ff6b299c4cb 876->896 897 7ff6b299c4cd-7ff6b299c4d4 876->897 881 7ff6b299c770 877->881 882 7ff6b299c758 877->882 878->877 884 7ff6b299c6c4-7ff6b299c6db GdipBitmapUnlockBits 879->884 885 7ff6b299c688-7ff6b299c68b 879->885 881->870 888 7ff6b299c760-7ff6b299c76e call 7ff6b29b3938 882->888 884->877 887 7ff6b299c6dd-7ff6b299c6e0 884->887 890 7ff6b299c6ad-7ff6b299c6c2 885->890 891 7ff6b299c68d-7ff6b299c690 885->891 887->877 888->881 890->884 890->885 892 7ff6b299c794-7ff6b299c7af call 7ff6b29b8afc call 7ff6b29b3d38 call 7ff6b29910f0 891->892 893 7ff6b299c696-7ff6b299c69f 891->893 900 7ff6b299c6a5-7ff6b299c6a8 call 7ff6b29cd110 893->900 901 7ff6b299c78d-7ff6b299c78f call 7ff6b29cd7b0 893->901 902 7ff6b299c4a7-7ff6b299c4b8 call 7ff6b29ae4e0 894->902 903 7ff6b299c49d 894->903 898 7ff6b299c4d7-7ff6b299c4da 896->898 897->898 905 7ff6b299c4e7-7ff6b299c4f9 GdipGetImagePalette 898->905 906 7ff6b299c4dc-7ff6b299c4e2 898->906 900->890 901->892 902->898 903->902 911 7ff6b299c4ff-7ff6b299c50a 905->911 912 7ff6b299c4fb 905->912 906->877 916 7ff6b299c65f-7ff6b299c665 911->916 917 7ff6b299c510-7ff6b299c515 911->917 912->911 916->877 919 7ff6b299c555-7ff6b299c55d 917->919 920 7ff6b299c517 917->920 923 7ff6b299c55f-7ff6b299c56a call 7ff6b2996280 919->923 924 7ff6b299c5aa-7ff6b299c5c2 SetDIBColorTable 919->924 922 7ff6b299c520-7ff6b299c553 920->922 922->919 922->922 931 7ff6b299c570-7ff6b299c57d 923->931 925 7ff6b299c5c4-7ff6b299c5de SelectObject call 7ff6b2996280 924->925 926 7ff6b299c607 924->926 932 7ff6b299c5e0-7ff6b299c5ea 925->932 926->869 933 7ff6b299c57f-7ff6b299c584 931->933 934 7ff6b299c58e-7ff6b299c5a6 SelectObject 931->934 935 7ff6b299c5fc-7ff6b299c603 932->935 936 7ff6b299c5ec-7ff6b299c5f1 932->936 933->931 937 7ff6b299c586-7ff6b299c588 CreateCompatibleDC 933->937 934->924 935->926 936->932 938 7ff6b299c5f3-7ff6b299c5f6 DeleteDC 936->938 937->934 938->935
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
            • String ID: &
            • API String ID: 4034434136-3042966939
            • Opcode ID: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
            • Instruction ID: 885c57a02b4fef552e35fdf1067c42197bcdb1dc9b905d1278abbb1709d92168
            • Opcode Fuzzy Hash: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
            • Instruction Fuzzy Hash: 25D19E726086838EEB61AF2AD8446A937E4FB48BACF014135DB2D97B46DF78E514C740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
            • String ID: 0u
            • API String ID: 3082052849-3203441087
            • Opcode ID: 31de75bcb46c380d304f1bc485ab5eacb48e194165f0f16ba2058fbbb71b66c7
            • Instruction ID: 345fcccee196c636c46f33b0f1503f920e7d5a3bef5b1f1736702e696d28faf8
            • Opcode Fuzzy Hash: 31de75bcb46c380d304f1bc485ab5eacb48e194165f0f16ba2058fbbb71b66c7
            • Instruction Fuzzy Hash: AF71507260878286E721DF26F44476AB7A5FB84B98F00423AEB8E43B59DF7CD155CB04

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
            • String ID: VenNetwork
            • API String ID: 4155081256-3057682757
            • Opcode ID: 098a7c2237c4f32fb2c44998094c6b0ae8eacec6811162fafead4cf2eb3aac2f
            • Instruction ID: 2c6efcd1953f2f97a7175527006cdb0ba52b1962b5ffef8c604124f04e8a7a48
            • Opcode Fuzzy Hash: 098a7c2237c4f32fb2c44998094c6b0ae8eacec6811162fafead4cf2eb3aac2f
            • Instruction Fuzzy Hash: 78414F31A0A68385EB62AB26E4443B923E0FB85B99F444536CB4E83796EF7DD545C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1029 7ff6b29abdd0-7ff6b29abdf7 1030 7ff6b29ac190-7ff6b29ac1a1 CloseHandle 1029->1030 1031 7ff6b29abdfd-7ff6b29abe17 1029->1031 1032 7ff6b29abe20-7ff6b29abe3a call 7ff6b29b3dd0 1031->1032 1035 7ff6b29ac170-7ff6b29ac188 1032->1035 1036 7ff6b29abe40-7ff6b29abe7c DeviceIoControl 1032->1036 1035->1030 1037 7ff6b29abe82-7ff6b29abe86 1036->1037 1038 7ff6b29ac168-7ff6b29ac16b call 7ff6b29b3938 1036->1038 1039 7ff6b29abe8c-7ff6b29abeeb DeviceIoControl 1037->1039 1040 7ff6b29ac15a-7ff6b29ac160 1037->1040 1038->1035 1042 7ff6b29abef1-7ff6b29abef8 1039->1042 1043 7ff6b29abf84-7ff6b29abf88 1039->1043 1040->1032 1044 7ff6b29ac166 1040->1044 1042->1043 1045 7ff6b29abefe-7ff6b29abf06 1042->1045 1046 7ff6b29abf8e-7ff6b29abfd5 DeviceIoControl 1043->1046 1047 7ff6b29ac075-7ff6b29ac0cd call 7ff6b29cd7b0 call 7ff6b29ac5c0 * 2 1043->1047 1044->1035 1045->1043 1048 7ff6b29abf08-7ff6b29abf1e GlobalAlloc 1045->1048 1046->1047 1050 7ff6b29abfdb-7ff6b29abfe8 1046->1050 1065 7ff6b29ac0d2-7ff6b29ac0f9 call 7ff6b29abd70 1047->1065 1048->1043 1052 7ff6b29abf20-7ff6b29abf64 DeviceIoControl 1048->1052 1050->1047 1051 7ff6b29abfee-7ff6b29ac001 GlobalAlloc 1050->1051 1051->1047 1054 7ff6b29ac003-7ff6b29ac03f DeviceIoControl 1051->1054 1055 7ff6b29abf66-7ff6b29abf6c 1052->1055 1056 7ff6b29abf7b-7ff6b29abf7e GlobalFree 1052->1056 1058 7ff6b29ac041-7ff6b29ac059 call 7ff6b29ac520 GlobalFree 1054->1058 1059 7ff6b29ac06c-7ff6b29ac06f GlobalFree 1054->1059 1055->1056 1060 7ff6b29abf6e-7ff6b29abf79 1055->1060 1056->1043 1058->1047 1067 7ff6b29ac05b-7ff6b29ac06a call 7ff6b29ac1b0 1058->1067 1059->1047 1060->1043 1060->1056 1070 7ff6b29ac100-7ff6b29ac107 1065->1070 1067->1047 1070->1070 1072 7ff6b29ac109-7ff6b29ac10d 1070->1072 1073 7ff6b29ac114-7ff6b29ac11c 1072->1073 1073->1073 1074 7ff6b29ac11e-7ff6b29ac128 1073->1074 1074->1035 1075 7ff6b29ac12a-7ff6b29ac12d 1074->1075 1076 7ff6b29ac130-7ff6b29ac138 1075->1076 1076->1076 1077 7ff6b29ac13a-7ff6b29ac13e 1076->1077 1078 7ff6b29ac140-7ff6b29ac14e 1077->1078 1078->1078 1079 7ff6b29ac150-7ff6b29ac155 1078->1079 1079->1040
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ControlDeviceGlobal$Free$Alloc
            • String ID: - External Hub$%s-%s|
            • API String ID: 3253977144-729331614
            • Opcode ID: 6ebde190928095b1eae62e95338309e58df42c3839912d6c9fa9ddc0bde6fb78
            • Instruction ID: b79c7f8b78959922fa59c737171fc270811fd71ce8bfea4cbb0971ad9e3095cb
            • Opcode Fuzzy Hash: 6ebde190928095b1eae62e95338309e58df42c3839912d6c9fa9ddc0bde6fb78
            • Instruction Fuzzy Hash: 2EB1B072A08B8285EB21DF16A4403AE77E0FB86B98F444235DB9D977A6DF7CD544C700

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
            • String ID: %d min$Console$IpDatespecial
            • API String ID: 357503962-2712035571
            • Opcode ID: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
            • Instruction ID: 0f121d609caf87a1ca192bee026d68d287163a90d5a3341f579f580407e91e8a
            • Opcode Fuzzy Hash: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
            • Instruction Fuzzy Hash: DC51AE72604E8289EB62AF2AEC543A923A4FB44BADF444131DB4C8769ADF7CC595C700

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
            • String ID: \\.\HCD%d
            • API String ID: 2324936672-2696249065
            • Opcode ID: b16b9414ff4f5bba01ca19ea586cfc01d35dadd3bdcc9ae74a2dc0319bdc3a1e
            • Instruction ID: 92f1c130d6ddac46c4bb642fe9e901dd089f9d063f5bbad53858f1c61fca56da
            • Opcode Fuzzy Hash: b16b9414ff4f5bba01ca19ea586cfc01d35dadd3bdcc9ae74a2dc0319bdc3a1e
            • Instruction Fuzzy Hash: 61517531A0C78286EB61AB16F44076A77D4FB86798F041135EB9E87BA6EF7CD405CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
            • String ID: &
            • API String ID: 370471037-3042966939
            • Opcode ID: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
            • Instruction ID: c252f41f4ad1989ecdc9c4b2c08a1e3d795d22c90ac1a55201c9a5092b06fe46
            • Opcode Fuzzy Hash: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
            • Instruction Fuzzy Hash: 95516731A08A438AEB12AB1BD8006B863E1FB48BACF544231DF5D87797DF78E5568340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcmp
            • String ID:
            • API String ID: 4288439342-0
            • Opcode ID: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
            • Instruction ID: 1fffa0f37c195f40a6f3b258e905ac8ecce18b9c6ecead429cc1a9c8969b2428
            • Opcode Fuzzy Hash: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
            • Instruction Fuzzy Hash: 6831C931618B8286E760DF2AE88865A73E4FF94BA4F504235DB5C837AADF7DD504C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
            • String ID: %s%s %d %d $%s%s %d*%d
            • API String ID: 2331002265-1924168580
            • Opcode ID: 14b910ee6d1905bd923c8d4c79364dee4b4ada9110bf2d8ad23789b6dab43fb2
            • Instruction ID: 6f467ed43e4ee15e499669aaab5d7f3d861ae73abcf05f8549bf2f03315b850e
            • Opcode Fuzzy Hash: 14b910ee6d1905bd923c8d4c79364dee4b4ada9110bf2d8ad23789b6dab43fb2
            • Instruction Fuzzy Hash: BCA1C232B04B8689EB11DF6AD4442ED77A1FB89BA8F500622DF5D97B9ACF78D441C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2067211477-0
            • Opcode ID: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
            • Instruction ID: 4f70235d4b8b399ca20b5584cdd5cb76ba72fc674199e9c2208e17d8b9f1bc7d
            • Opcode Fuzzy Hash: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
            • Instruction Fuzzy Hash: EC213025A09B8386EE16AB6BE418179A3D0BF8CFD8F044935DF4D83756DFBCE4448600
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CurrentThreadsend
            • String ID:
            • API String ID: 302076607-0
            • Opcode ID: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
            • Instruction ID: b2723552ea56cce3e4af07cde25376d06d6ac546c8f9f050cb89976d3742bb47
            • Opcode Fuzzy Hash: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
            • Instruction Fuzzy Hash: B1518422A04B478BE715AF2AE54436A77F0FB84B98F048035DB4D87B57DFB8E4628345
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CancelEventclosesocketsetsockopt
            • String ID:
            • API String ID: 852421847-0
            • Opcode ID: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
            • Instruction ID: 4eff75bcf255fa3d8c403d2422b6c42920f2169c29c3e4a82308d6f3e1978bc4
            • Opcode Fuzzy Hash: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
            • Instruction Fuzzy Hash: C3F08132604A8287D7109F2AE45832AB370FB84BA8F500336CBAC476E4CF7DD065C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
            • String ID:
            • API String ID: 3058672631-0
            • Opcode ID: b93dd64b9f0b49e4cdd69b6c5962fb9da2149387bcda9f15ac00ed83222854a4
            • Instruction ID: a2b36c81bbc2e0648e2731cfea137b277452e259d49f4126d41a073ed62afc5e
            • Opcode Fuzzy Hash: b93dd64b9f0b49e4cdd69b6c5962fb9da2149387bcda9f15ac00ed83222854a4
            • Instruction Fuzzy Hash: 4E31A831A0C78385DB21EB1AA4443BA63E1EB86B94F544235FB9D87796DF7DD441C700
            APIs
              • Part of subcall function 00007FF6B29961E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF6B2996231
              • Part of subcall function 00007FF6B29961E0: GetLastError.KERNEL32 ref: 00007FF6B299623B
            • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6B299C7D4), ref: 00007FF6B299C9DA
            • GdiplusStartup.GDIPLUS ref: 00007FF6B299CA0F
            • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF6B299C7D4), ref: 00007FF6B299CA27
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
            • String ID:
            • API String ID: 2723390537-0
            • Opcode ID: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
            • Instruction ID: 48c241e28d44acbc42431294f789d10a3e714c26fb9624b156953c6943c8ad91
            • Opcode Fuzzy Hash: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
            • Instruction Fuzzy Hash: 15019232908B81CAD7119F1AE40436A73E1F784B45F481025EBCE83656CF7CD065CB40
            APIs
              • Part of subcall function 00007FF6B29BEBE8: GetLastError.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEBF7
              • Part of subcall function 00007FF6B29BEBE8: SetLastError.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC97
            • CloseHandle.KERNEL32(?,?,?,00007FF6B29B8A25,?,?,?,?,00007FF6B29B8869), ref: 00007FF6B29B88B3
            • FreeLibraryAndExitThread.KERNEL32(?,?,?,00007FF6B29B8A25,?,?,?,?,00007FF6B29B8869), ref: 00007FF6B29B88C9
            • ExitThread.KERNEL32 ref: 00007FF6B29B88D2
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
            • String ID:
            • API String ID: 1991824761-0
            • Opcode ID: 9d899525cbf94069d0aecb2dad8b7ed7b52f5d6c34f84ba4291cfdf2ce1d2a7a
            • Instruction ID: 1e0478dae7c30ec8f18c14d385e3aec235bc2304348b30879bdfac47419ff3bb
            • Opcode Fuzzy Hash: 9d899525cbf94069d0aecb2dad8b7ed7b52f5d6c34f84ba4291cfdf2ce1d2a7a
            • Instruction Fuzzy Hash: 25F0F411A0898753FE167B2A944817D22E5AF48F7DF184B35D73D822D6DFBDD4458340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: SleepTimetime
            • String ID:
            • API String ID: 346578373-0
            • Opcode ID: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
            • Instruction ID: 2915e837e6280e0d4abceb805b99b8a6e03be13940aa49cacb00b20932dc9e79
            • Opcode Fuzzy Hash: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
            • Instruction Fuzzy Hash: 2901AD22B182428BE7655F6AE18833C22E0FB84B98F441234C75E876D2CFBCD4E1C705
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorExitLastThread
            • String ID:
            • API String ID: 1611280651-0
            • Opcode ID: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
            • Instruction ID: 3f9b76f4db1fad160fe894c32d69f1c9586f11f11f5d83ba1c3fcda503d73d17
            • Opcode Fuzzy Hash: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
            • Instruction Fuzzy Hash: 29F09022E0A68382EF16BBBBC41917C12E0AF5DB48F040434DB0ED33A7DEACE8458300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-0
            • Opcode ID: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
            • Instruction ID: 2c3f0a8e6cfe96b1c560fa428fd29e6dca15c87eeaf0738913abed0f0197ee7e
            • Opcode Fuzzy Hash: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
            • Instruction Fuzzy Hash: 22E0B610E1A30749FB2B72AB24190B810C01F6AB78F381B70EB7E842D3ADACA4918160
            APIs
            • RtlFreeHeap.NTDLL(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6D2
            • GetLastError.KERNEL32(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6DC
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
            • Instruction ID: 8fbd794e6b0aa1cd551b234b220a843dcc3815be1dc2ca20f3e973d787c9457f
            • Opcode Fuzzy Hash: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
            • Instruction Fuzzy Hash: 93E08C10F2820382FB1A7FFB588D03822D4BF89B09F804834CB4DC6253EEBCA8464700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
            • Instruction ID: 44331951c2abdc8da844ecdbd9144273b77ff17392aa1f96c130517dc8e2c3b6
            • Opcode Fuzzy Hash: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
            • Instruction Fuzzy Hash: A8216521B18A4386D725DB2FF44012AB7A1FB88B84B148135EB9ED3B1ADF7DE4918744
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
            • Instruction ID: 017c42d57b4264c2a0d66c2d1730f0ca2c56a79a353ec0565b8eb5d90a670bf6
            • Opcode Fuzzy Hash: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
            • Instruction Fuzzy Hash: AC11D631B28A4286E7169F2BE440129A3E5FF88FC8B144131EB4ED3759DE7CD8918740
            APIs
              • Part of subcall function 00007FF6B29ADC60: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF6B29ADC74
            • __scrt_release_startup_lock.LIBCMT ref: 00007FF6B29AE057
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
            • String ID:
            • API String ID: 2217363868-0
            • Opcode ID: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
            • Instruction ID: e1e96de9940274303f3f4e34c27295575357f9b05eedae11b64ab5d453d48309
            • Opcode Fuzzy Hash: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
            • Instruction Fuzzy Hash: 0A311A21E0C65785FB56BB2FD4163B922D1AF8278CF844439DB8D872D7DEEDA8468210
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Startup
            • String ID:
            • API String ID: 724789610-0
            • Opcode ID: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
            • Instruction ID: 0d4caf0878dfdcf45eca1345592e0adab7c85f7339eec5717a0eee577334652c
            • Opcode Fuzzy Hash: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
            • Instruction Fuzzy Hash: C7E08676B19A46CAE722BF29D44506473E4F75D708F404132E68D83756DE7CD555CF00
            APIs
            • HeapAlloc.KERNEL32(?,?,?,00007FF6B29C252D,?,?,00000000,00007FF6B29BA3FB,?,?,?,00007FF6B29BC5D3,?,?,?,00007FF6B29BC4C9), ref: 00007FF6B29BEE0E
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
            • Instruction ID: e58149fa15b22173c2da201ccaab2fe6196ea4a83b7ca48ee0266203179da325
            • Opcode Fuzzy Hash: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
            • Instruction Fuzzy Hash: FCF08C14F0924381FE677AAF584D27412C86F88BA8F880A34DF6EC62C3DEECE4824111
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
            • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
            • API String ID: 3040193174-4212407401
            • Opcode ID: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
            • Instruction ID: 296e50d22feedf6552422d393e00a342d130bc6890cf88043790389ba46e43e7
            • Opcode Fuzzy Hash: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
            • Instruction Fuzzy Hash: 6EA15131A14B8385EB22AF66E8147E963E4FB48B9CF004135DA4D57769DFBCD289C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
            • String ID: [$[$%s%s$%s%s$%s%s$[esc]
            • API String ID: 3669393114-972647286
            • Opcode ID: d6aaf4cc0b16be0cfc139be86f6c0c07443d0355c293c4668fa737ea5698b350
            • Instruction ID: 1a27a18e72edd45374f11d97871fa7531853581d70632786dcf3a46713353040
            • Opcode Fuzzy Hash: d6aaf4cc0b16be0cfc139be86f6c0c07443d0355c293c4668fa737ea5698b350
            • Instruction Fuzzy Hash: 62D17E31A1864786E716FB5AE8542B933E0FF84B58F404136DB4E826AADFBCE559C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: lstrlen$CreateEventLocalTimewsprintf
            • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
            • API String ID: 2157945651-1225219777
            • Opcode ID: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
            • Instruction ID: 18c8fe5865808538b5daa0b3666987a21f8bef7e95a72fdb6e4ebce624bf4570
            • Opcode Fuzzy Hash: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
            • Instruction Fuzzy Hash: 56F1C762A146938AEB26BF2AD4803BD23E0FB44F98F404135DB4D97A97DFBC9551C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
            • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
            • API String ID: 2977986460-1099148085
            • Opcode ID: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
            • Instruction ID: eb66beea7fcfdf136e4d290ad66de9e0365b99b144dd67a497f2abb33d6ed6ce
            • Opcode Fuzzy Hash: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
            • Instruction Fuzzy Hash: A641B52560964386FA22AB1BE81077A67E0FF89BE8F444135CE5E4775ADF7CD144CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
            • String ID:
            • API String ID: 1851032462-0
            • Opcode ID: 053006599248480e0e75eb044b7655b43ea2afb6fb7c4dc984e0c9e667b39775
            • Instruction ID: bb2130739c6eec51fb5ecdce3c36cacae756cda98d7a25d431ed8e5907967b56
            • Opcode Fuzzy Hash: 053006599248480e0e75eb044b7655b43ea2afb6fb7c4dc984e0c9e667b39775
            • Instruction Fuzzy Hash: C7D19362F0978782EB11AF6AE4442AD63E1FF46B98F144136EB5D8779ADE7CE4408700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
            • String ID: %s %s$%s%s$994fb371-6ab9-47a0-b675-d4b4b918e869$@$Windows\System32\svchost.exe$h$nlyloadinmyself$plugmark
            • API String ID: 4033188109-1978679259
            • Opcode ID: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
            • Instruction ID: 68087de76a85f8e4e1fea7275351914c1551d170e90e410684f3b2025e90dd2e
            • Opcode Fuzzy Hash: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
            • Instruction Fuzzy Hash: AF12AF62B08A8286E721EF2AD4442BD67E1FB99B88F448136DB4D83B97DF7CD554C310
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
            • Instruction ID: 80e66701e2d224df8365a2356f4f23ab43faa0e73dc7a0cb310a33036c018801
            • Opcode Fuzzy Hash: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
            • Instruction Fuzzy Hash: 98313235508E8385E721EF2AE8143BA67A0FB84F59F404037DB4D92666CFBDD18AC710
            APIs
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA5E5
            • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA66A
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA6BF
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA6DE
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA741
            • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA762
            • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA776
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA793
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA7AF
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AA7CC
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B299D242), ref: 00007FF6B29AAAB2
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
            • String ID:
            • API String ID: 1282860858-0
            • Opcode ID: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
            • Instruction ID: 9c197ba6612529c838e08a2afdf4939395ee47ae1043f0f957f0f36ac8f0a1cc
            • Opcode Fuzzy Hash: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
            • Instruction Fuzzy Hash: 91D14B32F1974387EB6AAB1BD4547B962E1FB4AB88F054035CB4E87792EE7CE4418700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
            • Instruction ID: d820eed2a0f0b871258b18e18e6de06826e0e7220b81f63ebfdfe835cc536e34
            • Opcode Fuzzy Hash: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
            • Instruction Fuzzy Hash: E5314135508E8385E721EF2AE8143BA67A0FB84F59F404037DB4D92665CFBDD19AC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
            • Instruction ID: c80285f2489b602b07f5d055b110422f9c807d67484b65d5676dda725c7b0ade
            • Opcode Fuzzy Hash: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
            • Instruction Fuzzy Hash: 7031FF36508E8385E721EF2AEC143AA67A0FB85F5AF404436DB4D92665DFBDD18AC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 808467561-2761157908
            • Opcode ID: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
            • Instruction ID: 5a730f6528543dc74c3f7be7fc9be2f0cba8a4df4edba4c056f61ad0cb0fd496
            • Opcode Fuzzy Hash: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
            • Instruction Fuzzy Hash: 74B2D372A182938AE7269F6AD5447FC37E1FB44B8CF405535DB0D97A86DFB8A900CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
            • String ID: <$<
            • API String ID: 2446585644-213342407
            • Opcode ID: 9a1c078e3228495278893d6781b09ac20f0541c42d9d3174516128dd3c727907
            • Instruction ID: e5d2e84a1036d6ecb1930b09a3ac2aaf835b4e2dcf8bf815a658b6d01e62b2b7
            • Opcode Fuzzy Hash: 9a1c078e3228495278893d6781b09ac20f0541c42d9d3174516128dd3c727907
            • Instruction Fuzzy Hash: E6B14A72605B828AE745EF3AE4943A933E5FB44B08F58413CCB4D4B79ADF79A064C718
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcpy
            • String ID: %08X
            • API String ID: 2032971926-3773563069
            • Opcode ID: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
            • Instruction ID: 849c3d7b595723e30209c41d1c497a2309a2353cef6b01d49804f78b45bde32b
            • Opcode Fuzzy Hash: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
            • Instruction Fuzzy Hash: 2E516272A08B8295EB71EB1AE4443ABB3E0FB85758F804135D78D83AA9DF7CD545CB04
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
            • TranslateName.LIBCMT ref: 00007FF6B29C7746
            • TranslateName.LIBCMT ref: 00007FF6B29C7781
            • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF6B29BD4D8), ref: 00007FF6B29C77C8
            • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF6B29BD4D8), ref: 00007FF6B29C7800
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C79BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
            • String ID: utf8
            • API String ID: 3069159798-905460609
            • Opcode ID: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
            • Instruction ID: c0db1d63f051833ad133387a70ca0bb2c937c5261dc281b90cd880f6cdda7b9c
            • Opcode Fuzzy Hash: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
            • Instruction Fuzzy Hash: B4917A22A0874382EB26BB2BD5416F922E8AF48F88F444531DB4DC7786DFBCE951C340
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAB5
            • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF6B29C8294
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAE2
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAF3
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB04
            • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF6B29BD4D1), ref: 00007FF6B29C827B
            • ProcessCodePage.LIBCMT ref: 00007FF6B29C82BE
            • IsValidCodePage.KERNEL32 ref: 00007FF6B29C82D0
            • IsValidLocale.KERNEL32 ref: 00007FF6B29C82E6
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C8342
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C835E
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
            • String ID:
            • API String ID: 2591520935-0
            • Opcode ID: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
            • Instruction ID: e4c8c288563e79beec6289ede86d6d28f6386cf9410cc092c4b4d35f49e53f54
            • Opcode Fuzzy Hash: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
            • Instruction Fuzzy Hash: BB718E22B14603A6FB13AB6AD8546F923E4BF44B8CF444536CB0D83686DFBCE945C350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 3140674995-0
            • Opcode ID: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
            • Instruction ID: f8f0be035f3a8b999c5d57d9dc82820006ef0ff4dea99845267f9763f934d19c
            • Opcode Fuzzy Hash: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
            • Instruction Fuzzy Hash: 6E316572A08B8286EB61AF65E8403ED73A4FB85748F44403ADB4D87B95EF7CD548C714
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Event$ClearCloseOpen
            • String ID: Application$Security$System
            • API String ID: 1391105993-2169399579
            • Opcode ID: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
            • Instruction ID: 840aa28efede09ad0d7412a73eb552838eb33fb9054b6a9c2348aa3d20145416
            • Opcode Fuzzy Hash: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
            • Instruction Fuzzy Hash: B5F0E626A09F4385EA16EB1EF45026563E4FB88BA9F040436CA4D93766EE7CD0969700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
            • Instruction ID: 2541a9e4391c02fc507910317a10ce464ad8d2a030b2e145d0abc09da740f920
            • Opcode Fuzzy Hash: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
            • Instruction Fuzzy Hash: A4316532618F8286DB61EF2AE8442AD73A4FB85758F540136EB9D83B59DF7CC545C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: FileFindFirst_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2227656907-0
            • Opcode ID: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
            • Instruction ID: e297b0a9bd2225a690cf01676d2f86d708e81c3f01e6a69b51960cdcad77e5bd
            • Opcode Fuzzy Hash: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
            • Instruction Fuzzy Hash: 18B1C922B1869341EA62EB2B94052B963E0EB54FE8F445131EF5D97BCADFBCE4418300
            APIs
            Strings
            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6B29AC78F
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: DebugDebuggerErrorLastOutputPresentString
            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
            • API String ID: 389471666-631824599
            • Opcode ID: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
            • Instruction ID: 40c2a15d593c728c5fdcd634736cdd8f141c552e451b06ce20566f6ed968cc2e
            • Opcode Fuzzy Hash: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
            • Instruction Fuzzy Hash: 69112832A14B83A7E716AB2BDA543B932E4FB44749F404135C74D86AA2EFBCE074C710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: memcpy_s
            • String ID:
            • API String ID: 1502251526-0
            • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction ID: 3da6521487bac6b1ec987cd933cfba66c554c8f89a6bcdb344a5f4cce6c69458
            • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction Fuzzy Hash: 81C1E672B18686C7D725DF1AA29866AB7D1F794788F448134DF4E83B89DE7CE801CB00
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAB5
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C7C0C
              • Part of subcall function 00007FF6B29C3D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C3D49
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C7C55
              • Part of subcall function 00007FF6B29C3D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C3DA2
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C7D1D
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1791019856-0
            • Opcode ID: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
            • Instruction ID: 9de665fa8606d9aa7323ab2bd1cfe03802591346717ad746af008caab55e38eb
            • Opcode Fuzzy Hash: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
            • Instruction Fuzzy Hash: 18618332A0864386EB75AF2AD4402B973E9FB84B48F048135DB5ED76D6DEBCE551C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID: GetLocaleInfoEx
            • API String ID: 2299586839-2904428671
            • Opcode ID: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
            • Instruction ID: 4fba6aa203e3b0156358386581501a3b6f49c63344593ba468d2f4a4e0fc5de2
            • Opcode Fuzzy Hash: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
            • Instruction Fuzzy Hash: 2D018420B08B4385F705AB5BB4000A6A6A0AF84FD4F544036EF4D87B66CEBCD5458380
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
            • Instruction ID: e01cfbed420c0309a43c7aaeca74054c1cef178e610c1d543ca115dab1783425
            • Opcode Fuzzy Hash: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
            • Instruction Fuzzy Hash: 3AB14873618B8A8AEB1A9F2EC8463683BE0F744F48F148821DB5D837A5CF79D451C705
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID: $
            • API String ID: 0-227171996
            • Opcode ID: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
            • Instruction ID: 0576c9628f1cf897b5e16c4d125b24d4cb7932a32931dbb914a528f06b1d2e37
            • Opcode Fuzzy Hash: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
            • Instruction Fuzzy Hash: 13E1A033A0864781EB6AAE2E80581BD27E1FB45B8CF145335DB4EC7696DFADE841C740
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID: e+000$gfff
            • API String ID: 0-3030954782
            • Opcode ID: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
            • Instruction ID: 74fb86eb73b5bc173547ddf113301587a1d77e0d483a2c0f5d1b7b030424b104
            • Opcode Fuzzy Hash: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
            • Instruction Fuzzy Hash: 58517962B182C646E726DE3E98487697BD1E744B98F488271DBAC87AC6CEBDD0458700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Info
            • String ID:
            • API String ID: 1807457897-0
            • Opcode ID: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
            • Instruction ID: 76afae96498239ccd6ee3716e4a99d15ece7c4d7a19b83c9ece9ca712d792ae1
            • Opcode Fuzzy Hash: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
            • Instruction Fuzzy Hash: C312AC22A08BC686E756DF3995092F973E4FB59748F059235EB9C82693EF78E181C700
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
            • Instruction ID: 4b1362363205a2165791af3d473e631d3aba12a13662f9cb38e0ab9616636937
            • Opcode Fuzzy Hash: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
            • Instruction Fuzzy Hash: 3BE14336A04B8286E721EB66E4512EE77A4FB94B88F404535DF8D93757EFB8E245C300
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID: [RO] %ld bytes
            • API String ID: 0-772938740
            • Opcode ID: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
            • Instruction ID: 5c5f350a4bc8c8d4ab0f699596ac6792327df379571c4443c5f65a412a72af47
            • Opcode Fuzzy Hash: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
            • Instruction Fuzzy Hash: E9429D336093C58FC329CF2DD44026E7BA1F795B48F448129DB8A87B46DB78E865CB51
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
              • Part of subcall function 00007FF6B29BEA70: FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAB5
            • GetLocaleInfoW.KERNEL32 ref: 00007FF6B29C7E50
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLastValue$InfoLocale
            • String ID:
            • API String ID: 673564084-0
            • Opcode ID: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
            • Instruction ID: b6d5a671a7b1d2ae298d5aca7c67a7caa795ecab6ce23f8b80409ac5c725924d
            • Opcode Fuzzy Hash: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
            • Instruction Fuzzy Hash: 2F317172A0868386EB65AB2BE4413EA63E5FB44B88F444035DB4DC7697DFBCE9418700
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6B29C8227,00000000,00000092,?,?,00000000,?,?,00007FF6B29BD4D1), ref: 00007FF6B29C7AD6
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
            • Instruction ID: 34e91a7017c3ebf6bf7ccca439bad61011afb48a8244e6c46f02852cc60cffc9
            • Opcode Fuzzy Hash: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
            • Instruction Fuzzy Hash: 8211C367A086468AEB16AF2AD4806A877E5FB40FE4F444135C72DC32C1DEACD6D1C740
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
            • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6B29C7D9A), ref: 00007FF6B29C8027
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocaleValue
            • String ID:
            • API String ID: 3796814847-0
            • Opcode ID: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
            • Instruction ID: d87a402b51041a3c123f398a658b06beed6bdfcac439a66c3f57105946e51ef2
            • Opcode Fuzzy Hash: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
            • Instruction Fuzzy Hash: 2F112B31B1855393E767E62AA0406BA62D1FB40B78F544B31D76E836C6DEAAD8818700
            APIs
              • Part of subcall function 00007FF6B29BEA70: GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
              • Part of subcall function 00007FF6B29BEA70: FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
              • Part of subcall function 00007FF6B29BEA70: SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF6B29C81E3,00000000,00000092,?,?,00000000,?,?,00007FF6B29BD4D1), ref: 00007FF6B29C7B86
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
            • Instruction ID: e9549d4f2e6e465702f357609d7352dc48ae1d1930abe47062e25eced3ce487d
            • Opcode Fuzzy Hash: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
            • Instruction Fuzzy Hash: FB01D272E0828246E7126B1AE4407B972EAEF40FA8F459236D72DC32C6DEAC94818700
            APIs
            • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF6B29C0CDF,?,?,?,?,?,?,?,?,00000000,00007FF6B29C7088), ref: 00007FF6B29C0887
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: EnumLocalesSystem
            • String ID:
            • API String ID: 2099609381-0
            • Opcode ID: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
            • Instruction ID: 0acb5b8f6e79fa8003aad5e9a8a770bb99e7239bc7840e235bc2bd15c0f432aa
            • Opcode Fuzzy Hash: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
            • Instruction Fuzzy Hash: 36F06D71A18A4282E605EB1AE8902A923A1FB88BC4F548035EB5DC3366CE7CD9958340
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID: gfffffff
            • API String ID: 0-1523873471
            • Opcode ID: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
            • Instruction ID: cac8eb6cc3c29e6feb43c9cb2f883072e81ff6e202348a010fc874bf7f0dc4c1
            • Opcode Fuzzy Hash: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
            • Instruction Fuzzy Hash: 30A12762A0878646EB22DF2AA4087BD77D5EB54BC8F048131EF8D87786DEBDD501C701
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3916222277
            • Opcode ID: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
            • Instruction ID: 514d8d71a94d3d01542ed911a430fb81614f60df34ec2395fc6dbf911932677a
            • Opcode Fuzzy Hash: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
            • Instruction Fuzzy Hash: FEB15B7290879686EB66AF2EC09823C3BE0E749B4CF244135CB4D87796CFA9E441DB45
            APIs
            • GetLastError.KERNEL32 ref: 00007FF6B29C27E9
              • Part of subcall function 00007FF6B29C0788: HeapAlloc.KERNEL32(?,?,00000000,00007FF6B29BEC4A,?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000), ref: 00007FF6B29C07DD
              • Part of subcall function 00007FF6B29BE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6D2
              • Part of subcall function 00007FF6B29BE6BC: GetLastError.KERNEL32(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6DC
              • Part of subcall function 00007FF6B29C9FAC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29C9FDF
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
            • String ID:
            • API String ID: 916656526-0
            • Opcode ID: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
            • Instruction ID: a035f2871c589b85438ff73884e0ceb3ed1e89048af237ce6fc44099daf50948
            • Opcode Fuzzy Hash: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
            • Instruction Fuzzy Hash: 2841CE21F0D74342FA62BA2F68516BAA6D07F95F88F444535EF8D87787EEBCE4018600
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction ID: a5ab865a3540ee3158ec47449b2c85723a159fe035d8fc19690b2dc1e64cda1e
            • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction Fuzzy Hash: 1E22CEB7B3805047D36DCB1DEC52FA97692B7A5308748A02CBA07C3F45EA3DEA458A44
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction ID: 1b2d150ef7b717b48b68882bf9403456f580bb4c66b2db73783112dafc4714af
            • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction Fuzzy Hash: 9AC1CC73B0869287EB0ACE2AD9515BD7792BBC5BD4B55C134DB4A87B89DE3C9801CB00
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
            • Instruction ID: 3ab84d2548cdc458783c0249e81b00837227122a6b652c856c4e2cd4585f6f13
            • Opcode Fuzzy Hash: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
            • Instruction Fuzzy Hash: 4AD1B123A0864785EB6AAA2F84582BD27E0EB45B4CF144336DF0DC7696DFBDE845C340
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 4023145424-0
            • Opcode ID: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
            • Instruction ID: 497a930b4a76943837158dabe66784c9083bcab6301dddb20b0f4f0dab44eb6e
            • Opcode Fuzzy Hash: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
            • Instruction Fuzzy Hash: 5FC1D366A0868385EB65AB6B94143FA27E0FB94B8CF404035DF4DC7A8ADFBCE545C710
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$Value_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1500699246-0
            • Opcode ID: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
            • Instruction ID: 10af15968fe523998db66456edcb90b37632e8c37666b9ec7784ff37c3f0c708
            • Opcode Fuzzy Hash: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
            • Instruction Fuzzy Hash: B3B1A122A1864782EB66AB2AD4116F923E5EB50F8CF504235EF5DC368ADFBCE5418740
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
            • Instruction ID: 5f44a8613c41acaf458fe7b1f5e5987bd8ff66735f46ac5f0dc90217d7a79690
            • Opcode Fuzzy Hash: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
            • Instruction Fuzzy Hash: 87B17F72908A4685EB669F2EC05827C3BE1F749F4CF284139CB4E8739ACFA9E451C744
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
            • Instruction ID: d7d68ab94ed36a5957a8c27275b4886ef9341d59ae026a16ee8287179fc34879
            • Opcode Fuzzy Hash: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
            • Instruction Fuzzy Hash: 4F81A372A04A1286EB65EE2AD4853BD23A0FB84B9CF444636EF5DC7786DF7CD4418304
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
            • Instruction ID: 5b0f2d872feba363dcc24fa4d8250cbee7632048de62ca105945bf76e5d0096b
            • Opcode Fuzzy Hash: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
            • Instruction Fuzzy Hash: 6E81B572A0878246E775EF1E944837976D1FB86798F144239EB8D87B9ADF7CD4408B00
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction ID: 1fc06f9b3dfa3e94764cebdcf93304a34fb8e3ac0e30fa707c974b67fce4a1f9
            • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction Fuzzy Hash: 90610962F14B8A82DF218F1EE4411B963A0F75A784F545231EB9C87B55EF7DE180C340
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction ID: 15715bbdd8e5d0eb956d3e93c95e72f1355f79a7c084728d55a7b8b5b8063c15
            • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction Fuzzy Hash: 54519572A28652C6E7269B2ED05823833E1EB44F5DF249131DB4D97796CFBAE843C740
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction ID: 43a7e9fc15fd525c9e960642e1836e19fed5c6d5a8fad0b7380631145e62aa9d
            • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction Fuzzy Hash: 9F518336A2865782E7259F2EC05822837E0EB45B5CF245131CF4D977A6CF7AE853D780
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction ID: d403bc84e49303b5c7560f50e762255abaa56136e852505e4fb3ca72d16a841b
            • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction Fuzzy Hash: 39514576A24652C6EB269B2EC05822837E1EB58B6CF244131CF4D97796CF7AE853C740
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction ID: 625187136cbf02163f85c0a95e02ff70bc972f91ab6f64cc38e8d7976bc08328
            • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction Fuzzy Hash: 6D518276A2965286E7669B2ED04823837E0EB58B5CF244131CF4D97796CFBAEC43C740
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction ID: 421e74106888e0c0af70065e3cf36223c04f10440b62515ec375bad51138c197
            • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction Fuzzy Hash: 8A51B736A1465686E7269B2EC05833937E0EB44F5CF246131CF4C97796CF7AE852D780
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction ID: 2d77fd0261134bf2f8db9080c197fcbfc7d16a9defa84e2e98665d8d673227f4
            • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction Fuzzy Hash: 6C517276A28652C6E7269B2EC04822937E1EB44F5CF244131CF4D977A6CFBAE843C740
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
            • Instruction ID: 8ce5ad92a17d14d90394385194e157015fd719384cbddaf4b310bdc0a1f2c950
            • Opcode Fuzzy Hash: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
            • Instruction Fuzzy Hash: F641E172724A5686EB04DF2BD92826973E1BB48FD4B48A032EF0D97B59DE7CC5418300
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
            • Instruction ID: cba72152f41ce78a5e9b832c674daed4676a35a5061068dd284ae6aa649e34c2
            • Opcode Fuzzy Hash: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
            • Instruction Fuzzy Hash: 62F06871B282568ADB99AF2DA402A2977E0F708394F408539D6CDC7F05DE7C94668F04
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
            • Instruction ID: 646923c4f4139efc29af49fb64a25228d40d912ec7d2af674f14d60b99619362
            • Opcode Fuzzy Hash: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
            • Instruction Fuzzy Hash: 86A002A1D0CD17E0EB0AAB0AE95503023B0FB51748B410032D35DC1062EFBCB901C301
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
            • String ID:
            • API String ID: 4058177064-0
            • Opcode ID: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
            • Instruction ID: 2094812f2dca2a3118d19ae292024128771db1e20077e0a2ce8f8851a4cc3103
            • Opcode Fuzzy Hash: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
            • Instruction Fuzzy Hash: 12917C36B08A839BE75AAB2AD5442A973E4FB44B58F005536CB6DC3692CF7CE474C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
            • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
            • API String ID: 1783372451-551013563
            • Opcode ID: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
            • Instruction ID: b71557b61de371177dbb69fe9b21de7d73455ae5248c8c4f6c9b7f926d3eac1f
            • Opcode Fuzzy Hash: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
            • Instruction Fuzzy Hash: 08616222E18B4395FB21EB6AD8542ED23A1FB8974CF444136DB4D83A9ADFBCD244C750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
            • String ID:
            • API String ID: 1455939504-0
            • Opcode ID: 4ac987161481c806979eb549acd9b2fb4a9050b8bf4fb52e0da1e9413c634ef5
            • Instruction ID: 05c04ed34cea952c4d2b45cc578ada9436a5b2e47f40553e30fe916b0d8156f9
            • Opcode Fuzzy Hash: 4ac987161481c806979eb549acd9b2fb4a9050b8bf4fb52e0da1e9413c634ef5
            • Instruction Fuzzy Hash: B5515332608B9286E721DF26E84426977E5FB85FA8F100236EB9D83B99CF7CD555C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
            • String ID:
            • API String ID: 2081738530-0
            • Opcode ID: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
            • Instruction ID: cbfbbad254b51b88e3981da847553213691430b1127b2aba1316c20f853acb8f
            • Opcode Fuzzy Hash: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
            • Instruction Fuzzy Hash: 9A512D31E18B4785EB16FB1ED44417923E1FB56B98F180232DB6E876A6DFACE446C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
            • String ID:
            • API String ID: 957247320-3916222277
            • Opcode ID: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
            • Instruction ID: 0d48ab2f72568117b720ffec591f90a431d480650c11294a1172a018925a4fde
            • Opcode Fuzzy Hash: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
            • Instruction Fuzzy Hash: CA714D72A086828BE7629F2AD58436977E0FB48B6CF145035CB4DC3697CFBDE4658B40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
            • Instruction ID: 948d517b78a46e0401e3f0304be8f3ba3ede22d3a8bde2c91774a7a5fcd8f46e
            • Opcode Fuzzy Hash: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
            • Instruction Fuzzy Hash: A961A032B186438AE756AB1AD44867E63A5FB84B99F804031CB1EC3693EF7CE465C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
            • Instruction ID: 0a4de56c420fe3e2c06225113054ddb241a53e9afba9381d1fd0fa9306bc7a0a
            • Opcode Fuzzy Hash: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
            • Instruction Fuzzy Hash: 41316221718A438BE76AAB1F948C17A22E5FF45B99F140035DB4EC6693CFACE465CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseValue$CreateDeleteOpenlstrlen
            • String ID: Software$VenNetwork
            • API String ID: 3197061591-1820303132
            • Opcode ID: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
            • Instruction ID: 9522f6a6f8ef5f71867de2d1e2056e84daea1f795f76a377b84de2527101c591
            • Opcode Fuzzy Hash: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
            • Instruction Fuzzy Hash: 61214F36608A8186E711EF26E844359B3A1FB98FE5F444132DE4D87B69DFBCD149CB04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: f55aaaeb9bf5abb5e56e4c07576fdde1d1ad88dce2b004d0039bc8ed51f55d31
            • Instruction ID: 154b950a411a559e18c2bbafed40b6c92521117d5c15c6f7f17b5d6a02a75203
            • Opcode Fuzzy Hash: f55aaaeb9bf5abb5e56e4c07576fdde1d1ad88dce2b004d0039bc8ed51f55d31
            • Instruction Fuzzy Hash: 4751BC32A086428BE765AB1AE44467C77E5FB48B98F05413ADB4E87393DF7CE815CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$f$p$p$f
            • API String ID: 3215553584-1325933183
            • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction ID: 6c34db3235cfe950e5ff448e9d8afe17d0d161fae04803a50ab946daafab1308
            • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction Fuzzy Hash: 0F12D625A0C14386FB25BE1ED06C3B972D1FB80B58F945135E78D866CADFBCE480AB15
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
            • String ID:
            • API String ID: 2911610646-0
            • Opcode ID: 38ec76155e6582f6451855719efb9cc3d848e3c7da57bc883881785bdfc9cc07
            • Instruction ID: 8e194fb7e094836520ceadfd59c68091a130f855381a2f30509ad550ed8064a2
            • Opcode Fuzzy Hash: 38ec76155e6582f6451855719efb9cc3d848e3c7da57bc883881785bdfc9cc07
            • Instruction Fuzzy Hash: 65515D72A05A829BE716AF2AE50436D73E0FB48759F000136DB4C97792DFBDE0758B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
            • String ID:
            • API String ID: 3019579578-0
            • Opcode ID: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
            • Instruction ID: 637cdd6b80dd6208882207a84e317ccfb9e61679e3e2a7a63339064c9631d077
            • Opcode Fuzzy Hash: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
            • Instruction Fuzzy Hash: 724130329186438BE762AB1AD44823E73A5FB84B58F140135D74EC3A93DFBDF8918700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
            • Instruction ID: 767746adf16e24533f143b7a4f3ad2b36d2e9e685c36265dd508a14fb45f2410
            • Opcode Fuzzy Hash: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
            • Instruction Fuzzy Hash: 2731F932A289838AE791AB2AD44826933E4FB44B5DF440031DB0EC6696DFBDD869C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
            • Instruction ID: 56c0701d7f2eb6a2055bf671a97ace91e2efb3e551ea3efe2ba9bf91197b356c
            • Opcode Fuzzy Hash: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
            • Instruction Fuzzy Hash: 8ED16F22A087428AEB21AB6A94893AD77E0FB4578CF100135EF8D97796DF78E181C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AddressFreeLibraryProc
            • String ID: api-ms-$ext-ms-
            • API String ID: 3013587201-537541572
            • Opcode ID: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
            • Instruction ID: 8b6f3688860991290be1d0eec153f371c0680022553644b5cb1dcec4179caef4
            • Opcode Fuzzy Hash: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
            • Instruction Fuzzy Hash: 8741E521B19A0385FA2BEB1BD81427622D5BF44FA8F484136DF0DD7796EEBCE4458300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
            • String ID: %s %s
            • API String ID: 958574092-2939940506
            • Opcode ID: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
            • Instruction ID: 57fec25729c6b4d4955641e3a7dba262d78f2e0ad07448c0b29684dcdab6fd85
            • Opcode Fuzzy Hash: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
            • Instruction Fuzzy Hash: D4415122A18BC686E7219F2DD9042FC2360F795B5CF51A322DB8C56653EF79E2D6C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ErrorLastsend
            • String ID:
            • API String ID: 3480985631-0
            • Opcode ID: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
            • Instruction ID: 7d5bde7f496a979f338799e928bf1bd7738b9a3b2cee8a5f9b0fd5c66ff1a16a
            • Opcode Fuzzy Hash: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
            • Instruction Fuzzy Hash: 90416A36608B8286E756AF2AE5442AC73E4FB04F98F041136CF0D87B5ADFB8E561C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$p$p
            • API String ID: 3215553584-1995029353
            • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction ID: 8e581385e99d2eb6226cf30b9851a8438b4f67446c5977ca12b55a4b9ce485a0
            • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction Fuzzy Hash: 1C12A161E2C25386FB627A1ED0582BA72D1FB80758F944035E79D866C6DFBCE5808F14
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
            • String ID:
            • API String ID: 2807917265-0
            • Opcode ID: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
            • Instruction ID: 975e86c8abfd0052774e6accc3cadaceb06c113fa5e441d18481d815325c5898
            • Opcode Fuzzy Hash: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
            • Instruction Fuzzy Hash: 60516F71A086438AEB62AF2A945427D23E4FB08B6CF146635DB5DC6797EFBCE4508700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
            • String ID: bad locale name
            • API String ID: 1386471777-1405518554
            • Opcode ID: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
            • Instruction ID: ece2e2a306f5ae8edbb75ca09112d0edc1aa71eaed5b72cf02bc1184dc3fa4c1
            • Opcode Fuzzy Hash: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
            • Instruction Fuzzy Hash: 18518D22F09B42CAFB16EBA6D4502BC33A0EF55758F444138DF8D66A9BDF78E5568300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
            • String ID: bad locale name
            • API String ID: 3908275632-1405518554
            • Opcode ID: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
            • Instruction ID: 8dd2593e5fc436cd4fce1be8b4c800f2bc246c12f4f31e1db2d8c6461eaff23b
            • Opcode Fuzzy Hash: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
            • Instruction Fuzzy Hash: 7F516C22F09B4289FB12EBBAD4503AC33A1AF4574CF544135DF4DA7A9ADFB8A4469304
            APIs
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF6B29B37DE,?,?,?,00007FF6B29B34D0,?,?,?,00007FF6B29B0109), ref: 00007FF6B29B35B1
            • GetLastError.KERNEL32(?,?,?,00007FF6B29B37DE,?,?,?,00007FF6B29B34D0,?,?,?,00007FF6B29B0109), ref: 00007FF6B29B35BF
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF6B29B37DE,?,?,?,00007FF6B29B34D0,?,?,?,00007FF6B29B0109), ref: 00007FF6B29B35E9
            • FreeLibrary.KERNEL32(?,?,?,00007FF6B29B37DE,?,?,?,00007FF6B29B34D0,?,?,?,00007FF6B29B0109), ref: 00007FF6B29B3657
            • GetProcAddress.KERNEL32(?,?,?,00007FF6B29B37DE,?,?,?,00007FF6B29B34D0,?,?,?,00007FF6B29B0109), ref: 00007FF6B29B3663
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Library$Load$AddressErrorFreeLastProc
            • String ID: api-ms-
            • API String ID: 2559590344-2084034818
            • Opcode ID: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
            • Instruction ID: 2af9cfc25decc88a5df79aa8b3c51d6036ee8afc4b9c97515130bd16f3b7104c
            • Opcode Fuzzy Hash: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
            • Instruction Fuzzy Hash: 2531A121A1AA43D1EE23FB1B980957923D4BF48BA8F590536DF1D86392EFBCE4458305
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AttributesCreateErrorFileLastProcesslstrlen
            • String ID: WinSta0\Default$h
            • API String ID: 591566999-1620045033
            • Opcode ID: a60264ea15cd282e93fead91a259f625f489fd1ea87d5066e0c8bc18fc457f1c
            • Instruction ID: 607e13baddb687d1f9f7a5036997510b311bd4a37e62ad36b0970cd0ba287987
            • Opcode Fuzzy Hash: a60264ea15cd282e93fead91a259f625f489fd1ea87d5066e0c8bc18fc457f1c
            • Instruction Fuzzy Hash: AF316422E087C346E761AB1AB51037A63D1EB96798F105335E69D83B9AEF7CD0948700
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA7F
            • FlsGetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEA94
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAB5
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAE2
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEAF3
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB04
            • SetLastError.KERNEL32(?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F,?,?,?,00007FF6B29B6443), ref: 00007FF6B29BEB1F
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
            • Instruction ID: 7820afaeeb74f104f851e1b2c5e9154ed789337632f90c0a96a15bc15034023b
            • Opcode Fuzzy Hash: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
            • Instruction Fuzzy Hash: 6C217C20B0D60341FA5B773F954A13961CA6F44BBCF944638EBBEC66C7DEACB4428200
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
            • Instruction ID: 433e540581fa909d63b60b47b8639ffcef3457d3faabeca20ca53b8dafb6f6c3
            • Opcode Fuzzy Hash: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
            • Instruction Fuzzy Hash: ED117231A18B4282E751AB1BE85432566E1BF48FE8F400235DB5DC77A6DFBCD4448740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
            • String ID:
            • API String ID: 4202892810-0
            • Opcode ID: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
            • Instruction ID: 625e952ad4ed599ed472c1cae6fe4e580448b4e216e9d50066082290774b7eeb
            • Opcode Fuzzy Hash: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
            • Instruction Fuzzy Hash: 62111F7561864382E711AB1AF91876577A0FB84BF8F104232DB5E47BA5CFBCD4498700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value$CloseDeleteOpen
            • String ID: Console$IpDatespecial
            • API String ID: 3183427449-1840232981
            • Opcode ID: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
            • Instruction ID: a1076f11d5467ef882a9b886227538659c6a07dc0a0faeed71ae479c8a08e09e
            • Opcode Fuzzy Hash: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
            • Instruction Fuzzy Hash: 81015E36608E8286E722DF29EC207693760FB84BA9F044126CB4D8365ADF7CD199CB04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
            • String ID:
            • API String ID: 3421218197-3916222277
            • Opcode ID: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
            • Instruction ID: ba25a01f4cc6454f4a942975f560a66ddc539af69e7a874c9a453c2da056aed5
            • Opcode Fuzzy Hash: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
            • Instruction Fuzzy Hash: 3CF01D32618A8286DB609F25F85875AB7E0FB88758F500236E78E86B69DF7CC145CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLast$recv
            • String ID:
            • API String ID: 316788870-0
            • Opcode ID: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
            • Instruction ID: 99cbc46e04d213e1314bf3fe116effaf0e6abf1ddb1ce569e7f8f3b6cc91fda0
            • Opcode Fuzzy Hash: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
            • Instruction Fuzzy Hash: AD316E32A086438AEB62AF2EE44437D23E1FB45B5CF541436CB0DC2297DEBDD8549701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 3523768491-393685449
            • Opcode ID: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
            • Instruction ID: 4b7710ecb5a0f30c34406b4eda2d4f87d1023f08b7ac7466f1f6743b7e9cef09
            • Opcode Fuzzy Hash: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
            • Instruction Fuzzy Hash: 7BE1AF72D087838AE752AF6AD4893AD37E0FB4578CF100135EB8D87696DEB8E585C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
            • String ID:
            • API String ID: 2235205178-0
            • Opcode ID: dd32348ce441aaf97619a2f265975deae253349b76a9a1e61c24f21497cea129
            • Instruction ID: d1a9ba3568ddb1d87991a3a1ad5cc871418e5eb3e9cb23813468e5e20d74f5af
            • Opcode Fuzzy Hash: dd32348ce441aaf97619a2f265975deae253349b76a9a1e61c24f21497cea129
            • Instruction Fuzzy Hash: E5217131608A4286E742DF2AE84816973A0FB48F9CF184132DF4DD776ACF78D591C750
            APIs
            • GetLastError.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEBF7
            • FlsSetValue.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC2D
            • FlsSetValue.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC5A
            • FlsSetValue.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC6B
            • FlsSetValue.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC7C
            • SetLastError.KERNEL32(?,?,00005315DED5DA85,00007FF6B29B8B05,?,?,?,?,00007FF6B29C2546,?,?,00000000,00007FF6B29BA3FB,?,?,?), ref: 00007FF6B29BEC97
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
            • Instruction ID: 994ed1270198ec085fc6e059d02c47a319900580f416624a2e29169c56c48133
            • Opcode Fuzzy Hash: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
            • Instruction Fuzzy Hash: 68115E21A0964342FA5B773F955903962C66F48BBDF940734DBAEC66C7DEACB4428200
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
            • Instruction ID: 0bb501ec297ab0d4112cb647762736e01391f3885c27f3a9aba493217c3125ee
            • Opcode Fuzzy Hash: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
            • Instruction Fuzzy Hash: 50F0686171960381EE15AB1EE45437963A0EF49B6AF540236CB5D855F9CFACD049C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseDeleteOpenValue
            • String ID: Console$IpDatespecial
            • API String ID: 849931509-1840232981
            • Opcode ID: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
            • Instruction ID: 504c1f729412bead3cb74b6f9c1e93373012a11f5b7caf9bfb866dbbcbbc20f7
            • Opcode Fuzzy Hash: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
            • Instruction Fuzzy Hash: 4FF01236604DC285E721DF19EC107A97360FB84B6EF000132CE4D57669DE7DD1DA8B04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
            • Instruction ID: c00948e3ec2b6ce65c767eb67ad11e14296b431bb6a7f0e1acbc83816ab68f23
            • Opcode Fuzzy Hash: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
            • Instruction Fuzzy Hash: 01B1C222E0A75781FA67BA2F94C823D62D0AF44B8CF088535DB4D87B97DEACE4418740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction ID: 4e19926065f17e8a1d871b06e26d0e3a912de24aa48380fedd516f97e40eb4ab
            • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction Fuzzy Hash: 35119132E1CA5301F6E6312EE54237958C1AF58B78E090739EB7EC62DB9FDCAC414219
            APIs
            • FlsGetValue.KERNEL32(?,?,?,00007FF6B29B39FB,?,?,00000000,00007FF6B29B3C96,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29BECCF
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29B39FB,?,?,00000000,00007FF6B29B3C96,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29BECEE
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29B39FB,?,?,00000000,00007FF6B29B3C96,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29BED16
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29B39FB,?,?,00000000,00007FF6B29B3C96,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29BED27
            • FlsSetValue.KERNEL32(?,?,?,00007FF6B29B39FB,?,?,00000000,00007FF6B29B3C96,?,?,?,?,?,00007FF6B29B3C22), ref: 00007FF6B29BED38
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
            • Instruction ID: ab161ccc502188c764a7590f87bdf823ade831a47c5550ac4988cb5675e52234
            • Opcode Fuzzy Hash: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
            • Instruction Fuzzy Hash: 4C114C20A0960381FA9A772FA55917961C96F847ACF944334EABE866D7DEECF4428600
            APIs
            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F), ref: 00007FF6B29BEB55
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F), ref: 00007FF6B29BEB74
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F), ref: 00007FF6B29BEB9C
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F), ref: 00007FF6B29BEBAD
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF6B29C6E73,?,?,?,00007FF6B29BF1A4,?,?,?,00007FF6B29B819F), ref: 00007FF6B29BEBBE
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
            • Instruction ID: f6ad3e3d47cc4d9ab398508d2bde083ceef5e0e132150483d62bbad5647e7b48
            • Opcode Fuzzy Hash: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
            • Instruction Fuzzy Hash: 4311E864A0D61741FD9AB63F941A17921C55F5576CF940B38EBBF8A2C3DDACB4528200
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
            • Instruction ID: 5366f5c580037ef7ebdad70716526a7f52a414760f0ce9e1bd2e7e8f8c57fd1d
            • Opcode Fuzzy Hash: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
            • Instruction Fuzzy Hash: 4F110632624946C7DB51AB2AF4543AD63A0FB44B5DF441031DB8F83A56CF7CE595C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
            • String ID:
            • API String ID: 1513102227-0
            • Opcode ID: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
            • Instruction ID: 373447289f374c7950bd4f17e4a262c99a2db579ec747371ce4cf1323356876b
            • Opcode Fuzzy Hash: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
            • Instruction Fuzzy Hash: D1113D32505B4381EB11AF2EE84406873B4FB58FADB244236D76D827A6DF78D552C744
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
            • String ID:
            • API String ID: 1535946027-0
            • Opcode ID: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
            • Instruction ID: 94ee944c712f122dfa4d2e6c84d6c3271abd534aa69606426fcc06b5362b9636
            • Opcode Fuzzy Hash: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
            • Instruction Fuzzy Hash: CCF0E13560494686E706AF2AD8581683360FB89F69F144131DB2DC73A5CF78D9858360
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
            • Instruction ID: 1ff5254d1e95d66f238ca7b4b1fcabb9639ca6a1e5fb5c22a54a9059fbd2d960
            • Opcode Fuzzy Hash: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
            • Instruction Fuzzy Hash: B591A073A087928AE711EB6AE4443AC77E0FB45788F10412AEB8C97756DF78D1A5C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
            • String ID: csm
            • API String ID: 2395640692-1018135373
            • Opcode ID: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
            • Instruction ID: c98e1f7fab6b66df4e719422c017bf5864cbb815b33634a48eaca81b8b4a2ede
            • Opcode Fuzzy Hash: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
            • Instruction Fuzzy Hash: A7519F32A1A7038ADB55EB1BE454A7863E1EB45B8CF104135DB4E8778ADFBEE841C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
            • Instruction ID: e8f3c1d3244679eec9331111245fab2a72e531753f74c43533c4e79a0559504c
            • Opcode Fuzzy Hash: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
            • Instruction Fuzzy Hash: B7619832908BC685DB619F1AE4447AAB7E0FB95B98F044235EB9C47B56DFBCD190CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
            • Instruction ID: dec3396b001db5f20dc3870fd66b85b6d92234ecb36aa66c9c3eb8f40e09273e
            • Opcode Fuzzy Hash: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
            • Instruction Fuzzy Hash: AD516C36A0828386EB66AE1B944C36877E0EB55B98F144135EB9CC7BD6CFBCE450C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: FileWrite$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 2718003287-0
            • Opcode ID: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
            • Instruction ID: b0180c8bfe2e0019d785e386eee1c816bd10e43da762716b4d60d2af8a0d46c3
            • Opcode Fuzzy Hash: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
            • Instruction Fuzzy Hash: 61D1B032B08A828AE716DF6AD4401EC37B2FB44B9CF544226DF5D97B9ADE78D456C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
            • Instruction ID: 89ec53f7ae162a5c8d9e9e968f8ab48d2a3dab07842dae3b6bb796413158744c
            • Opcode Fuzzy Hash: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
            • Instruction Fuzzy Hash: BAB1A062F14B5685FB01DBAAC4457EC23B1FB45B9CF405225DF6CA7A9ADFB8A481C300
            APIs
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6B29CB0CF), ref: 00007FF6B29CB200
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF6B29CB0CF), ref: 00007FF6B29CB28B
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode
            • String ID:
            • API String ID: 953036326-0
            • Opcode ID: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
            • Instruction ID: a4d1f368e9a8094d59a937474f92b3ffc724b002e834bf68d70041d34fc0813a
            • Opcode Fuzzy Hash: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
            • Instruction Fuzzy Hash: 2791AF32E18653C5F752AB6A94602BD3BE4BB15F8CF144139DF0E9768ADEB8D485C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 3936042273-0
            • Opcode ID: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
            • Instruction ID: 922952f0d5452c713e1b3f68cd1dd0661575c124c44ef1ce5dfafd2b4dbbdd0a
            • Opcode Fuzzy Hash: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
            • Instruction Fuzzy Hash: 89717162F14B8685EA05EB1AD40836C63A1FB85FD8F558A31DF6C57B96DFB8E481C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 4260596558-0
            • Opcode ID: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
            • Instruction ID: 1401c81396461cd9d653be5d449cfa29faf6292985233cf7489fe27e3a97e655
            • Opcode Fuzzy Hash: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
            • Instruction Fuzzy Hash: 2071E362B1868385EA21AB6AD44426DA3E1FB85BF8F408231DB6D837C6DFBCD540C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: Virtual$AllocInfoProtectQuerySystem
            • String ID:
            • API String ID: 3562403962-0
            • Opcode ID: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
            • Instruction ID: f3f9e40ba938407150608720aec2be6aecc0650f83b45bdaf41a91ec8f2b7c49
            • Opcode Fuzzy Hash: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
            • Instruction Fuzzy Hash: C4314C32714A929EEB20DF36D8547E923A5FB48B88F444036EA4D87B49DF78E645C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterEvent
            • String ID:
            • API String ID: 3394196147-0
            • Opcode ID: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
            • Instruction ID: fbe85f1c18b1d3fa817a9693767c034f44a19add28019d66059e4e68e21f4c01
            • Opcode Fuzzy Hash: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
            • Instruction Fuzzy Hash: B0213732704B8297D749DB2AE5842ADB3A4FB48B98F144035DB6D83766DF78E4B1C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
            • Instruction ID: 4fdc8d47e19c39aef56fe7ff84ef2de554903839a8f8ea7f5bf65825b330e316
            • Opcode Fuzzy Hash: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
            • Instruction Fuzzy Hash: 81113336B24F0289EB00EF65E8542B833A4FB19B58F440E31EB5D867A5DF7CD5548340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ObjectSingleWait$Sleep
            • String ID:
            • API String ID: 2961732021-0
            • Opcode ID: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
            • Instruction ID: cc54ef8d259f48877f59abe6d7da5f196e118953032a1b3bf167d574c3b8498e
            • Opcode Fuzzy Hash: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
            • Instruction Fuzzy Hash: A7F0DA72604A4686D741AB3AD85822832A1FF89F39F150331CB2D873E5CF78C5868350
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID: ^(T[A-Za-z0-9]*|0x[A-Za-z0-9]*)$
            • API String ID: 3668304517-660079095
            • Opcode ID: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
            • Instruction ID: e6c55fac188d6e1614c1c92a19c1c13230469c40a17bbd4888505a4166bca03f
            • Opcode Fuzzy Hash: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
            • Instruction Fuzzy Hash: F3819D72E15B4689EB51EF6AE4403AC33E5FB89B98F044235EB5D83B9ADE78D550C300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: __except_validate_context_record
            • String ID: csm$csm
            • API String ID: 1467352782-3733052814
            • Opcode ID: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
            • Instruction ID: 021dda013af5e021a980fc742a7d9bd163a8bcd4ada41df5d1c178ff8b6f1314
            • Opcode Fuzzy Hash: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
            • Instruction Fuzzy Hash: 0F71C272D0868286DB66AF2A94487797BE0FB05B88F148135DF8C87A9ACF7CD552C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CloseHandlewsprintf
            • String ID: %s_bin
            • API String ID: 3088109604-2665034546
            • Opcode ID: 24dfbce03fa251961b6e58b78a80fa440e1697bf0a0f73e4a5768ea3ed20b2a8
            • Instruction ID: 75031d494b9ca8313ede069c464cf8d1a87b8e5a7e72a5179f9ed7042af38bb9
            • Opcode Fuzzy Hash: 24dfbce03fa251961b6e58b78a80fa440e1697bf0a0f73e4a5768ea3ed20b2a8
            • Instruction Fuzzy Hash: F951AE62A09A9785EB12FB2AC0546B92394EF85F58F558136DB0D837C3EE7CD401C321
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo
            • String ID: ?
            • API String ID: 1286766494-1684325040
            • Opcode ID: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
            • Instruction ID: e4bc56416e86b5ccfab665549ed25925f8a576e5678109ee26d9a558a39b5245
            • Opcode Fuzzy Hash: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
            • Instruction Fuzzy Hash: 6B41C522A1868341FB66AB2A945537A66E0EF80FA8F144235EF5C87AD7DFBCD441C704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: CreateFrameInfo__except_validate_context_record
            • String ID: csm
            • API String ID: 2558813199-1018135373
            • Opcode ID: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
            • Instruction ID: 33b224754f2c9755433c037fd1a2f2246f993f6f7f02aa51066fed004c4f801a
            • Opcode Fuzzy Hash: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
            • Instruction Fuzzy Hash: 12517E32A1874686E621FB2AE48526D77E4FB89B94F140134EF8D87B96CF7CE451CB01
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6B29BBFB6
              • Part of subcall function 00007FF6B29BE6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6D2
              • Part of subcall function 00007FF6B29BE6BC: GetLastError.KERNEL32(?,?,?,00007FF6B29C65C2,?,?,?,00007FF6B29C693F,?,?,00000000,00007FF6B29C6D85,?,?,?,00007FF6B29C6CB7), ref: 00007FF6B29BE6DC
            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6B29ADF31), ref: 00007FF6B29BBFD4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
            • String ID: C:\Users\user\Desktop\vYeaC4s9zP.exe
            • API String ID: 3580290477-1601645339
            • Opcode ID: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
            • Instruction ID: ff1bf0d5607282cf32189ee11e9f65f7f088497aa2c4f1ab1308372da68937fa
            • Opcode Fuzzy Hash: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
            • Instruction Fuzzy Hash: CD414A76A08A1389EB16BF2B95550B936E4FB44B98B444035EB4E83B86DEBCE4858340
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
            • Instruction ID: bbd29deb8829676ac24e417cc3dcdee94b2935f1d95f6949039a4246f1622a01
            • Opcode Fuzzy Hash: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
            • Instruction Fuzzy Hash: 0B41B372A18A4285DB21AF2AE4543A967A0FB88B98F404031EF4DC7799DF7CD441C750
            APIs
            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B2991111), ref: 00007FF6B29B00A0
            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6B2991111), ref: 00007FF6B29B00E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
            • Instruction ID: 393ea2f6d572d40f73899da830d386ba7d9fa2383c5337011414876a81c6116a
            • Opcode Fuzzy Hash: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
            • Instruction Fuzzy Hash: 5F116D32609B8282EB229F1AF44426977E1FB88B98F584231DF8C47B5ADF7CC551CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4457821352.00007FF6B2991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2990000, based on PE: true
            • Associated: 00000000.00000002.4457804138.00007FF6B2990000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457850898.00007FF6B29CF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457872657.00007FF6B29E5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457889926.00007FF6B29E8000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457905765.00007FF6B29EC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4457921458.00007FF6B29F0000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6b2990000_vYeaC4s9zP.jbxd
            Similarity
            • API ID: ErrorLastRead
            • String ID:
            • API String ID: 4100373531-0
            • Opcode ID: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
            • Instruction ID: 3179f1487561307ad3b2bc7f7bd5fd6c9f8f06b3f99d58362df23cc4d2a531c2
            • Opcode Fuzzy Hash: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
            • Instruction Fuzzy Hash: 44415A62A09B4287EB199B2AE04426937F0FB49B98F055431DF4E83756DFBCE4A1C710