Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WgnsGjhA3P.exe

Overview

General Information

Sample name:WgnsGjhA3P.exe
renamed because original name is a hash value
Original sample name:7766c46c93d028e2e11517cfcf797fbb.exe
Analysis ID:1585664
MD5:7766c46c93d028e2e11517cfcf797fbb
SHA1:147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb
SHA256:52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Sample is not signed and drops a device driver
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates driver files
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain checking for process token information
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Stores large binary data to the registry

Classification

  • System is w10x64
  • WgnsGjhA3P.exe (PID: 7604 cmdline: "C:\Users\user\Desktop\WgnsGjhA3P.exe" MD5: 7766C46C93D028E2E11517CFCF797FBB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
WgnsGjhA3P.exeJoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    Process Memory Space: WgnsGjhA3P.exe PID: 7604JoeSecurity_GhostRatYara detected GhostRatJoe Security
      SourceRuleDescriptionAuthorStrings
      0.2.WgnsGjhA3P.exe.7ff61b730000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
        0.0.WgnsGjhA3P.exe.7ff61b730000.0.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 192.238.134.52, DestinationIsIpv6: false, DestinationPort: 4433, EventID: 3, Image: C:\Users\user\Desktop\WgnsGjhA3P.exe, Initiated: true, ProcessId: 7604, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-08T00:12:01.585527+010020528751A Network Trojan was detected192.168.2.449730192.238.134.524433TCP
          2025-01-08T00:13:08.671511+010020528751A Network Trojan was detected192.168.2.449730192.238.134.524433TCP
          2025-01-08T00:14:17.530330+010020528751A Network Trojan was detected192.168.2.450003192.238.134.5210443TCP
          2025-01-08T00:15:24.190279+010020528751A Network Trojan was detected192.168.2.450006192.238.134.524433TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: WgnsGjhA3P.exeReversingLabs: Detection: 50%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: WgnsGjhA3P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: z:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: x:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: v:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: t:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: r:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: p:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: n:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: l:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: j:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: h:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: f:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: b:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: y:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: w:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: u:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: s:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: q:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: o:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: m:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: k:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: i:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: g:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: e:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile opened: [:Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B73F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B763EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF61B763EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 192.238.134.52:4433
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50003 -> 192.238.134.52:10443
          Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50006 -> 192.238.134.52:4433
          Source: Joe Sandbox ViewASN Name: LEASEWEB-USA-LAX-11US LEASEWEB-USA-LAX-11US
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: unknownTCP traffic detected without corresponding DNS query: 192.238.134.52
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B733B00 select,recv,timeGetTime,0_2_00007FF61B733B00

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: [esc]0_2_00007FF61B73ADB0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B740E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B740E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B740E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B740E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B740E20 _invalid_parameter_noinfo_noreturn,lstrlenW,Sleep,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,CloseClipboard,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B740E20
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B73FD10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B737250 MultiByteToWideChar,MultiByteToWideChar,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,CreateMutexExW,GetLastError,Sleep,CreateMutexW,GetLastError,lstrlenW,lstrcmpW,SleepEx,GetModuleHandleW,GetConsoleWindow,SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_00007FF61B737250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74C2E0: wsprintfW,CreateFileW,DeviceIoControl,DeviceIoControl,DeviceIoControl,DeviceIoControl,CloseHandle,CloseHandle,0_2_00007FF61B74C2E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF61B73E4EE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF61B73E46D
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF61B73E3E9
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7315000_2_00007FF61B731500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B5000_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73FD100_2_00007FF61B73FD10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73F4100_2_00007FF61B73F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B758C100_2_00007FF61B758C10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F00_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7372500_2_00007FF61B737250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7379E00_2_00007FF61B7379E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7380400_2_00007FF61B738040
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74AD800_2_00007FF61B74AD80
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B761DA80_2_00007FF61B761DA8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75A4F80_2_00007FF61B75A4F8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75C51C0_2_00007FF61B75C51C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B765D340_2_00007FF61B765D34
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75FD300_2_00007FF61B75FD30
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75AC800_2_00007FF61B75AC80
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73B4100_2_00007FF61B73B410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73D4100_2_00007FF61B73D410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7573400_2_00007FF61B757340
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75B3500_2_00007FF61B75B350
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75536C0_2_00007FF61B75536C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7393200_2_00007FF61B739320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75D3200_2_00007FF61B75D320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7492500_2_00007FF61B749250
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75F21C0_2_00007FF61B75F21C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7562280_2_00007FF61B756228
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B76714C0_2_00007FF61B76714C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7551680_2_00007FF61B755168
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7478F00_2_00007FF61B7478F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7409000_2_00007FF61B740900
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7620240_2_00007FF61B762024
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B756F3C0_2_00007FF61B756F3C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7627440_2_00007FF61B762744
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B754F5C0_2_00007FF61B754F5C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7637600_2_00007FF61B763760
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75577C0_2_00007FF61B75577C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7397A00_2_00007FF61B7397A0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B742EC00_2_00007FF61B742EC0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B763EF00_2_00007FF61B763EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B732E500_2_00007FF61B732E50
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B75F6B00_2_00007FF61B75F6B0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73CD400_2_00007FF61B73CD40
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B754D580_2_00007FF61B754D58
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7555780_2_00007FF61B755578
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7685840_2_00007FF61B768584
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74A5A00_2_00007FF61B74A5A0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7565AC0_2_00007FF61B7565AC
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73ADB00_2_00007FF61B73ADB0
          Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@1/1@0/1
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E4EE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF61B73E4EE
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E46D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_00007FF61B73E46D
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E3E9 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,ExitWindowsEx,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_00007FF61B73E3E9
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B739320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF61B739320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B73F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeMutant created: \Sessions\1\BaseNamedObjects\????
          Source: WgnsGjhA3P.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: WgnsGjhA3P.exeReversingLabs: Detection: 50%
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dinput8.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: inputhost.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: devenum.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: devobj.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: msdmo.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
          Source: WgnsGjhA3P.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: WgnsGjhA3P.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: WgnsGjhA3P.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile created: C:\ProgramData\kernelquick.sysJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73E36A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_00007FF61B73E36A
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE VenkernalData_infoJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeStalling execution: Execution stalls by calling Sleepgraph_0-22187
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindow / User API: threadDelayed 1271Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindow / User API: threadDelayed 3258Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeWindow / User API: threadDelayed 4888Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-22042
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7664Thread sleep count: 1271 > 30Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7664Thread sleep time: -1271000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7688Thread sleep count: 3258 > 30Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7688Thread sleep time: -32580s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7664Thread sleep count: 4888 > 30Jump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exe TID: 7664Thread sleep time: -4888000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73F410 GetLastInputInfo,GetTickCount,wsprintfW,GetForegroundWindow,GetWindowTextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,SHGetFolderPathW,lstrcatW,CreateFileW,lstrlenW,WriteFile,CloseHandle,FindFirstFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B73F410
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B763EF0 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF61B763EF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: WgnsGjhA3P.exe, 00000000.00000002.4113113501.000001A31230C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74C70C GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF61B74C70C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B7362F0 gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B738690 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_00007FF61B738690
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74BCD0 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF61B74BCD0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B753A6C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61B753A6C
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74E8E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF61B74E8E0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74E6F4 SetUnhandledExceptionFilter,0_2_00007FF61B74E6F4
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74E54C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61B74E54C

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B739320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF61B739320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B739320 GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_00007FF61B739320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetSystemDirectoryA,CreateProcessA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_00007FF61B739320
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: WgnsGjhA3P.exe, 00000000.00000002.4113113501.000001A31238E000.00000004.00000020.00020000.00000000.sdmp, WgnsGjhA3P.exe, 00000000.00000003.3736336309.000001A3123AC000.00000004.00000020.00020000.00000000.sdmp, WgnsGjhA3P.exe, 00000000.00000003.3736336309.000001A31238E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0 minProgram Manager
          Source: WgnsGjhA3P.exe, 00000000.00000002.4113113501.000001A3123BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B76C8C0 cpuid 0_2_00007FF61B76C8C0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,GetSystemInfo,wsprintfW,GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,GetForegroundWindow,GetWindowTextW,lstrlenW,GetLocalTime,wsprintfW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,OpenProcess,K32GetProcessImageFileNameW,GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,CloseHandle,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,RegOpenKeyExW,RegQueryInfoKeyW,RegEnumKeyExW,lstrlenW,lstrlenW,RegCloseKey,lstrlenW,GetTickCount,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,lstrcpyW,lstrcatW,lstrlenW,GetLocalTime,wsprintfW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,RegCreateKeyW,lstrlenW,RegSetValueExW,RegCloseKey,RegCloseKey,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF61B7362F0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF61B760D10
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF61B767BA0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF61B767B08
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF61B767A38
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF61B768124
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: EnumSystemLocalesW,0_2_00007FF61B760838
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF61B767FF0
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF61B767F40
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF61B7676DC
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: GetLocaleInfoW,0_2_00007FF61B767DE8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B74B500 SleepEx,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,GetCurrentProcessId,OpenProcess,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,AllocateAndInitializeSid,CheckTokenMembership,FreeSid,RegOpenKeyExW,RegDeleteValueW,RegSetValueExW,RegCloseKey,SleepEx,CreateEventA,Sleep,Sleep,CloseHandle,_invalid_parameter_noinfo_noreturn,IsDebuggerPresent,LoadLibraryW,GetProcAddress,FreeLibrary,GetLocalTime,wsprintfW,CreateFileW,FreeLibrary,GetCurrentThreadId,GetCurrentProcessId,GetCurrentProcess,CloseHandle,FreeLibrary,0_2_00007FF61B74B500
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B761DA8 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF61B761DA8
          Source: C:\Users\user\Desktop\WgnsGjhA3P.exeCode function: 0_2_00007FF61B73FD10 GetVersion,GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,_invalid_parameter_noinfo_noreturn,0_2_00007FF61B73FD10
          Source: WgnsGjhA3P.exe, 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmp, WgnsGjhA3P.exe, 00000000.00000000.1655178184.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: KSafeTray.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: WgnsGjhA3P.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.WgnsGjhA3P.exe.7ff61b730000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.WgnsGjhA3P.exe.7ff61b730000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: WgnsGjhA3P.exe PID: 7604, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: WgnsGjhA3P.exe, type: SAMPLE
          Source: Yara matchFile source: 0.2.WgnsGjhA3P.exe.7ff61b730000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.0.WgnsGjhA3P.exe.7ff61b730000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: WgnsGjhA3P.exe PID: 7604, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Replication Through Removable Media
          2
          Native API
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Modify Registry
          121
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Screen Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Windows Service
          1
          Virtualization/Sandbox Evasion
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol121
          Input Capture
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)211
          Process Injection
          1
          Access Token Manipulation
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Archive Collected Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          211
          Process Injection
          NTDS3
          Process Discovery
          Distributed Component Object Model3
          Clipboard Data
          Protocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Indicator Removal
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain Credentials11
          Peripheral Device Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
          File and Directory Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
          System Information Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          WgnsGjhA3P.exe50%ReversingLabsWin64.Backdoor.GhostRAT
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          192.238.134.52
          unknownUnited States
          395954LEASEWEB-USA-LAX-11UStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1585664
          Start date and time:2025-01-08 00:11:04 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 30s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:WgnsGjhA3P.exe
          renamed because original name is a hash value
          Original Sample Name:7766c46c93d028e2e11517cfcf797fbb.exe
          Detection:MAL
          Classification:mal96.troj.spyw.evad.winEXE@1/1@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 44
          • Number of non-executed functions: 118
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • VT rate limit hit for: WgnsGjhA3P.exe
          TimeTypeDescription
          18:12:29API Interceptor6261546x Sleep call for process: WgnsGjhA3P.exe modified
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          LEASEWEB-USA-LAX-11USMes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
          • 23.83.76.85
          fuckunix.sh4.elfGet hashmaliciousMiraiBrowse
          • 23.85.171.227
          armv7l.elfGet hashmaliciousUnknownBrowse
          • 23.83.17.216
          f3fBEUL66b.exeGet hashmaliciousGhostRatBrowse
          • 192.238.134.113
          f3fBEUL66b.exeGet hashmaliciousGhostRatBrowse
          • 192.238.134.113
          nabarm7.elfGet hashmaliciousUnknownBrowse
          • 23.84.102.105
          52C660192933BE09807FC4895F376764A2BE35AA68567819BB854E83CF5F9E5C.dllGet hashmaliciousUnknownBrowse
          • 192.238.132.206
          mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
          • 23.87.203.7
          la.bot.arm6.elfGet hashmaliciousMiraiBrowse
          • 108.187.71.205
          la.bot.sparc.elfGet hashmaliciousMiraiBrowse
          • 23.87.103.174
          No context
          No context
          Process:C:\Users\user\Desktop\WgnsGjhA3P.exe
          File Type:data
          Category:dropped
          Size (bytes):30
          Entropy (8bit):2.6616157143988106
          Encrypted:false
          SSDEEP:3:tblM6lEjln:tbhEZn
          MD5:AE50B29A0B8DCC411F24F1863B0EAFDE
          SHA1:D415A55627B1ADED8E4B2CBBA402F816B0461155
          SHA-256:6B4BBBCE480FBC50D39A8EC4B72CDB7D781B151921E063DD899FD9B736ADCF68
          SHA-512:D9A9BA42D99BE32D26667060BE1D523DCD20EAFA187A67F7919002CC6DA349FD058053C9C6F721D6FDB730EA02FBAA3013E51C0C653368BD6B3F57A4C0FCABA8
          Malicious:true
          Reputation:moderate, very likely benign file
          Preview:C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.060388863278636
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:WgnsGjhA3P.exe
          File size:389'632 bytes
          MD5:7766c46c93d028e2e11517cfcf797fbb
          SHA1:147b40c5fe1e860d77c7e02a0c986cb1eaac3ceb
          SHA256:52e5833f1dedcc6f05d9585c6b4b52bab86c592061eddf38356492373583f8a0
          SHA512:18c849a8de6220e2109c24352016d82201184738197acf4b8c37999ba36cd6b27540048095d3903212b52c44a064ab57a4f3f9f0dc48e4c042881c4d166e7a8c
          SSDEEP:6144:4KtL0RSVgMoEao8ItdKwzBFdYmT+xmCiRLBVmLhkM:NtwSqEao8It4wlDCxm/qx
          TLSH:1F848E49F79405F8E5678138C9634916EBB27C6D03A09BDF33A4866A2F237D0AD3E711
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........A...A...A.......D...............@.......@...Q(..K...Q(..S...Q(..........U.......X...A...m....)..S....)..@...RichA..........
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x14001e13c
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x677168BF [Sun Dec 29 15:20:31 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:d7444b6dc7c8cddb50fba5269ad57bce
          Instruction
          dec eax
          sub esp, 28h
          call 00007FD1C47E65E0h
          dec eax
          add esp, 28h
          jmp 00007FD1C47E5E37h
          int3
          int3
          dec eax
          sub esp, 28h
          dec ebp
          mov eax, dword ptr [ecx+38h]
          dec eax
          mov ecx, edx
          dec ecx
          mov edx, ecx
          call 00007FD1C47E5FD2h
          mov eax, 00000001h
          dec eax
          add esp, 28h
          ret
          int3
          int3
          int3
          inc eax
          push ebx
          inc ebp
          mov ebx, dword ptr [eax]
          dec eax
          mov ebx, edx
          inc ecx
          and ebx, FFFFFFF8h
          dec esp
          mov ecx, ecx
          inc ecx
          test byte ptr [eax], 00000004h
          dec esp
          mov edx, ecx
          je 00007FD1C47E5FD5h
          inc ecx
          mov eax, dword ptr [eax+08h]
          dec ebp
          arpl word ptr [eax+04h], dx
          neg eax
          dec esp
          add edx, ecx
          dec eax
          arpl ax, cx
          dec esp
          and edx, ecx
          dec ecx
          arpl bx, ax
          dec edx
          mov edx, dword ptr [eax+edx]
          dec eax
          mov eax, dword ptr [ebx+10h]
          mov ecx, dword ptr [eax+08h]
          dec eax
          mov eax, dword ptr [ebx+08h]
          test byte ptr [ecx+eax+03h], 0000000Fh
          je 00007FD1C47E5FCDh
          movzx eax, byte ptr [ecx+eax+03h]
          and eax, FFFFFFF0h
          dec esp
          add ecx, eax
          dec esp
          xor ecx, edx
          dec ecx
          mov ecx, ecx
          pop ebx
          jmp 00007FD1C47E5FDAh
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          cmp ecx, dword ptr [00036E59h]
          jne 00007FD1C47E5FD2h
          dec eax
          rol ecx, 10h
          test cx, FFFFh
          jne 00007FD1C47E5FC3h
          ret
          dec eax
          ror ecx, 10h
          jmp 00007FD1C47E66DBh
          int3
          int3
          dec eax
          mov dword ptr [esp+00h], ebx
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x523b00x104.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x600000x3420.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000xc80.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x4c7b00x38.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x4c9800x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4c6700x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x918.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x3dbf00x3dc00d3f6189e43bbd290b28f7518c02b76a1False0.5461593813259109data6.462564110280856IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x3f0000x1519e0x152006edb872335ad42db6aa2ce85a47a3af5False0.4149986131656805data4.932101759530432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x550000xaa6c0x7c00b1cb403515f9a2e2bde815147bd596cdFalse0.10622479838709678DOS executable (block device driver \377\3)1.5580115815014906IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x600000x34200x360020b7b9769859dd90801ea597a1d992beFalse0.4626736111111111data5.517914471579984IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x640000xc800xe00316f5780e4a2c74c1946985bacab1ae4False0.4916294642857143data5.228910762857474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          DLLImport
          KERNEL32.dllQueryDosDeviceW, WriteProcessMemory, GetCommandLineW, GetCurrentProcess, WriteFile, OutputDebugStringA, GetModuleFileNameW, GetProcessId, CreateMutexW, GetLocaleInfoW, LocalAlloc, CreateFileW, GetVersionExW, K32GetProcessImageFileNameW, GetSystemDirectoryW, ResumeThread, GetModuleHandleA, OpenProcess, GetVersion, GetLogicalDriveStringsW, CreateToolhelp32Snapshot, MultiByteToWideChar, Process32NextW, GetDiskFreeSpaceExW, GetSystemDirectoryA, LoadLibraryA, lstrcatW, GlobalAlloc, Process32FirstW, GlobalFree, GetSystemInfo, LoadLibraryW, GetLocalTime, VirtualProtectEx, GetThreadContext, GetProcAddress, VirtualAllocEx, LocalFree, ExitProcess, GetCurrentProcessId, GlobalMemoryStatusEx, CreateProcessW, GetModuleHandleW, FreeLibrary, GetConsoleWindow, lstrcpyW, CreateRemoteThread, CreateProcessA, SetThreadContext, GetModuleFileNameA, GetTickCount, lstrcmpW, GetDriveTypeW, GetExitCodeProcess, SetFilePointer, ReleaseMutex, GlobalSize, DeleteFileW, GlobalLock, GetFileSize, GlobalUnlock, FindFirstFileW, ExpandEnvironmentStringsW, FindClose, GetFileAttributesW, TerminateThread, VirtualProtect, IsBadReadPtr, CreateThread, IsDebuggerPresent, SetUnhandledExceptionFilter, WriteConsoleW, GetCurrentThreadId, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, SetFilePointerEx, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, GetStartupInfoW, CreateWaitableTimerW, SetWaitableTimer, TryEnterCriticalSection, WideCharToMultiByte, ResetEvent, CreateEventW, lstrlenW, CancelIo, GetNativeSystemInfo, SetLastError, lstrcmpiW, CreateEventA, CloseHandle, SetEvent, Sleep, HeapFree, WaitForSingleObject, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, HeapCreate, GetProcessHeap, DeleteCriticalSection, HeapDestroy, DecodePointer, HeapAlloc, HeapReAlloc, GetLastError, HeapSize, InitializeCriticalSectionEx, VirtualAlloc, VirtualFree, FlsGetValue, FlsAlloc, GetFileType, GetCommandLineA, GetStdHandle, VirtualQuery, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlPcToFileHeader, RtlUnwindEx, lstrcpyA, CreateFileA, GetSystemDefaultLangID, DeviceIoControl, TerminateProcess, InitializeSListHead, GetSystemTimeAsFileTime, QueryPerformanceCounter, IsProcessorFeaturePresent, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, CompareStringEx, GetStringTypeW, RaiseException, OutputDebugStringW, SwitchToThread
          USER32.dllMsgWaitForMultipleObjects, GetWindowTextW, wsprintfW, GetForegroundWindow, GetLastInputInfo, GetClipboardData, CloseClipboard, OpenClipboard, GetKeyState, ReleaseDC, GetDesktopWindow, SetClipboardData, ExitWindowsEx, EmptyClipboard, GetSystemMetrics, GetDC, GetInputState, PostThreadMessageA, TranslateMessage, DispatchMessageW, PeekMessageW, ShowWindow
          GDI32.dllCreateCompatibleBitmap, SelectObject, CreateDIBSection, SetDIBColorTable, CreateCompatibleDC, StretchBlt, GetDIBits, GetDeviceCaps, GetObjectW, SetStretchBltMode, DeleteObject, DeleteDC
          ADVAPI32.dllOpenProcessToken, RegQueryValueExW, AllocateAndInitializeSid, FreeSid, CheckTokenMembership, ClearEventLogW, CloseEventLog, OpenEventLogW, LookupPrivilegeValueW, AdjustTokenPrivileges, GetCurrentHwProfileW, RegCloseKey, RegQueryInfoKeyW, GetSidSubAuthorityCount, GetSidSubAuthority, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, LookupAccountSidW, GetTokenInformation
          SHELL32.dllSHGetFolderPathW
          ole32.dllCreateStreamOnHGlobal, GetHGlobalFromStream, CoInitialize, CoUninitialize, CoCreateInstance
          OLEAUT32.dllSysFreeString
          WS2_32.dllWSASetLastError, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, WSAEnumNetworkEvents, WSAGetLastError, WSACleanup, WSAIoctl, closesocket, WSACreateEvent, select, WSAStartup, send, socket, connect, recv, htons, setsockopt, inet_ntoa, WSACloseEvent, gethostbyname, gethostname, shutdown
          WINMM.dlltimeGetTime
          gdiplus.dllGdipCreateBitmapFromStream, GdipBitmapUnlockBits, GdipCloneImage, GdipAlloc, GdiplusShutdown, GdipDrawImageI, GdipCreateBitmapFromScan0, GdipCreateBitmapFromHBITMAP, GdipGetImageWidth, GdipGetImagePalette, GdipDeleteGraphics, GdipGetImageEncodersSize, GdipGetImageGraphicsContext, GdipFree, GdipGetImagePixelFormat, GdipDisposeImage, GdipSaveImageToStream, GdipBitmapLockBits, GdipGetImagePaletteSize, GdiplusStartup, GdipGetImageHeight, GdipGetImageEncoders
          dxgi.dllCreateDXGIFactory
          DINPUT8.dllDirectInput8Create
          TimestampSource PortDest PortSource IPDest IP
          Jan 8, 2025 00:12:00.202624083 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:00.207495928 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:00.207586050 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:00.907207012 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:00.912353992 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:00.912365913 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:00.912373066 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:00.912970066 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.453531027 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.498518944 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:01.579081059 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:01.585473061 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.585485935 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.585494995 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.585526943 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:01.587110996 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:01.591562986 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:17.483025074 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:17.489440918 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:17.804632902 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:17.857949018 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:34.936197996 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:34.941112041 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:35.256238937 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:35.311120033 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:51.952037096 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:52.264276028 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:12:52.279103994 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:52.279117107 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:52.595305920 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:12:52.639446974 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:08.671510935 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:08.826009989 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:09.141424894 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:09.186274052 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:24.373775959 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:24.379800081 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:24.695079088 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:24.748718023 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:39.998878956 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:40.005362034 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:40.324783087 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:40.373740911 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:55.780076981 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:55.780126095 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:13:55.784955978 CET443349730192.238.134.52192.168.2.4
          Jan 8, 2025 00:13:55.785008907 CET497304433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:00.858652115 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:00.865443945 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:00.865545988 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:01.911205053 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:01.918189049 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:01.918201923 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:01.918210983 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:01.920358896 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.495383978 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.670469046 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:02.677465916 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.677476883 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.677488089 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.677509069 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:02.679085970 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:02.684648037 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:17.530329943 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:17.532785892 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:17.536575079 CET1044350003192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:17.536627054 CET5000310443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:22.608628988 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:22.614841938 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:22.614942074 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:23.587145090 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:23.593871117 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:23.593888998 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:23.593898058 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:23.595498085 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.168555975 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.276314020 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:24.283138037 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.283150911 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.283178091 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.283190966 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:24.284925938 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:24.289897919 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:39.827176094 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:39.827224016 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:39.834100962 CET443350004192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:39.834156036 CET500044433192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:44.780755997 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:44.786494017 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:44.786582947 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:45.569356918 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:45.575814009 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:45.575828075 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:45.575838089 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:45.577475071 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.146478891 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.280150890 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:46.303646088 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:46.311610937 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.311625004 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.311641932 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.311659098 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:14:46.314043999 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:14:46.318022013 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:01.124195099 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:01.130754948 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:01.442296028 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:01.577071905 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:17.186532974 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:17.186613083 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:17.191467047 CET1044350005192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:17.191550016 CET5000510443192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:22.231259108 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:22.237684965 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:22.237838030 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:23.538778067 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:23.632702112 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:23.632863998 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:23.632910967 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:23.632972956 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:23.998034954 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:24.108369112 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:24.185384989 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:24.190228939 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:24.190241098 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:24.190253019 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:24.190279007 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:24.190288067 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:24.195049047 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:38.858520031 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:38.864381075 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:39.174294949 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:39.217792988 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:54.608483076 CET500064433192.168.2.4192.238.134.52
          Jan 8, 2025 00:15:54.615223885 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:54.925074100 CET443350006192.238.134.52192.168.2.4
          Jan 8, 2025 00:15:54.967819929 CET500064433192.168.2.4192.238.134.52

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:18:11:53
          Start date:07/01/2025
          Path:C:\Users\user\Desktop\WgnsGjhA3P.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\WgnsGjhA3P.exe"
          Imagebase:0x7ff61b730000
          File size:389'632 bytes
          MD5 hash:7766C46C93D028E2E11517CFCF797FBB
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:7.6%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:39.4%
            Total number of Nodes:1053
            Total number of Limit Nodes:42
            execution_graph 22282 7ff61b73bfc0 GdipDisposeImage GdipFree 22148 7ff61b74dfc0 22171 7ff61b74dc60 22148->22171 22151 7ff61b74e117 22191 7ff61b74e54c 7 API calls 2 library calls 22151->22191 22152 7ff61b74dfe1 22154 7ff61b74e121 22152->22154 22156 7ff61b74dfff 22152->22156 22192 7ff61b74e54c 7 API calls 2 library calls 22154->22192 22157 7ff61b74e024 22156->22157 22161 7ff61b74e041 __scrt_release_startup_lock 22156->22161 22177 7ff61b75cb44 22156->22177 22158 7ff61b74e12c BuildCatchObjectHelperInternal 22160 7ff61b74e0aa 22181 7ff61b75c44c 22160->22181 22161->22160 22188 7ff61b75bd34 47 API calls 22161->22188 22164 7ff61b74e0af 22187 7ff61b74bcd0 10 API calls 22164->22187 22166 7ff61b74e0cc 22189 7ff61b74e6a0 GetModuleHandleW 22166->22189 22168 7ff61b74e0d3 22168->22158 22190 7ff61b74dde4 7 API calls 22168->22190 22170 7ff61b74e0ea 22170->22157 22172 7ff61b74dc68 22171->22172 22173 7ff61b74dc74 __scrt_dllmain_crt_thread_attach 22172->22173 22174 7ff61b74dc7d 22173->22174 22175 7ff61b74dc81 22173->22175 22174->22151 22174->22152 22175->22174 22193 7ff61b750128 7 API calls 2 library calls 22175->22193 22178 7ff61b75cb7a 22177->22178 22179 7ff61b75cb49 22177->22179 22178->22161 22179->22178 22194 7ff61b731000 WSAStartup 22179->22194 22182 7ff61b75c45c 22181->22182 22183 7ff61b75c471 22181->22183 22182->22183 22201 7ff61b75c108 50 API calls __free_lconv_mon 22182->22201 22183->22164 22185 7ff61b75c47a 22185->22183 22202 7ff61b75c2d8 12 API calls 3 library calls 22185->22202 22187->22166 22188->22160 22189->22168 22190->22170 22191->22154 22192->22158 22193->22174 22197 7ff61b74de4c 22194->22197 22200 7ff61b74de10 50 API calls 22197->22200 22199 7ff61b73103a 22199->22179 22200->22199 22201->22185 22202->22183 22207 7ff61b73e2c8 144 API calls BuildCatchObjectHelperInternal 22284 7ff61b73e3c7 ExitProcess 22285 7ff61b751dcc 61 API calls 5 library calls 22210 7ff61b7318d0 47 API calls Concurrency::cancel_current_task 22211 7ff61b73bcd0 LCMapStringEx __crtLCMapStringW 22286 7ff61b73bbd0 GetStringTypeW 22287 7ff61b76ddd0 RegCloseKey RegCloseKey 22214 7ff61b74dedc 59 API calls 2 library calls 22215 7ff61b741ce0 48 API calls 22289 7ff61b73b3e0 CloseHandle RtlPcToFileHeader RaiseException 22292 7ff61b73e3e9 14 API calls 22217 7ff61b75c8e8 11 API calls 22295 7ff61b767de8 55 API calls 4 library calls 22296 7ff61b733ff0 WaitForSingleObject Sleep WaitForSingleObject WaitForSingleObject Sleep 22297 7ff61b739df0 49 API calls 22222 7ff61b74e0ee GetModuleHandleW BuildCatchObjectHelperInternal 22224 7ff61b763ef0 54 API calls 6 library calls 22299 7ff61b73eff2 188 API calls 22225 7ff61b75a4f8 60 API calls 5 library calls 22226 7ff61b735300 115 API calls 22301 7ff61b735200 8 API calls BuildCatchObjectHelperInternal 22227 7ff61b741300 8 API calls 22228 7ff61b74e704 56 API calls 21612 7ff61b74b500 21666 7ff61b759c1c 21612->21666 21615 7ff61b74b573 21617 7ff61b74b64f GetLocalTime wsprintfW SetUnhandledExceptionFilter 21615->21617 21618 7ff61b74b580 GetCurrentProcess OpenProcessToken 21615->21618 21616 7ff61b74b543 21619 7ff61b74de98 std::_Facet_Register 49 API calls 21616->21619 21674 7ff61b758940 21617->21674 21620 7ff61b74b5f4 GetModuleHandleA GetProcAddress 21618->21620 21621 7ff61b74b59f LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 21618->21621 21623 7ff61b74b54d 21619->21623 21620->21617 21624 7ff61b74b619 GetCurrentProcessId OpenProcess 21620->21624 21621->21620 21626 7ff61b758940 52 API calls 21623->21626 21624->21617 21627 7ff61b74b56a CloseHandle 21626->21627 21627->21615 21628 7ff61b74de98 std::_Facet_Register 49 API calls 21629 7ff61b74b6dd 21628->21629 21692 7ff61b7336e0 WSAStartup CreateEventW 21629->21692 21631 7ff61b74b6ec 21693 7ff61b74ad80 RegOpenKeyExW 21631->21693 21634 7ff61b74b75b CheckTokenMembership 21636 7ff61b74b77c FreeSid 21634->21636 21637 7ff61b74b775 21634->21637 21635 7ff61b74b789 21638 7ff61b74b792 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 21635->21638 21650 7ff61b74b80d 21635->21650 21636->21635 21637->21636 21638->21650 21639 7ff61b7587a0 47 API calls std::_Locinfo::_Locinfo_ctor 21639->21650 21640 7ff61b759c1c ProcessCodePage 47 API calls 21641 7ff61b74b91d SleepEx 21640->21641 21642 7ff61b759c1c ProcessCodePage 47 API calls 21641->21642 21642->21650 21643 7ff61b759c1c ProcessCodePage 47 API calls 21643->21650 21644 7ff61b74b992 CreateEventA 21645 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21644->21645 21645->21650 21647 7ff61b74ba3c Sleep 21651 7ff61b74ba30 21647->21651 21648 7ff61b74ba72 Sleep 21648->21650 21649 7ff61b74bad5 CloseHandle 21649->21650 21650->21639 21650->21640 21650->21643 21650->21644 21650->21649 21650->21651 21652 7ff61b74bae9 21650->21652 21726 7ff61b733820 ResetEvent timeGetTime socket 21650->21726 21739 7ff61b7362f0 21650->21739 21651->21647 21651->21648 21651->21649 21653 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21652->21653 21654 7ff61b74baee IsDebuggerPresent 21653->21654 21655 7ff61b74bb06 21654->21655 21656 7ff61b74bb11 LoadLibraryW 21654->21656 21657 7ff61b74bb40 GetProcAddress 21656->21657 21663 7ff61b74bb36 21656->21663 21658 7ff61b74bb73 memcpy_s 21657->21658 21659 7ff61b74bb60 FreeLibrary 21657->21659 21660 7ff61b74bb95 GetLocalTime wsprintfW CreateFileW 21658->21660 21659->21663 21661 7ff61b74bc27 FreeLibrary 21660->21661 21662 7ff61b74bc35 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess 21660->21662 21661->21663 21664 7ff61b74bc84 CloseHandle FreeLibrary 21662->21664 21664->21663 21667 7ff61b759c4c 21666->21667 21864 7ff61b759480 21667->21864 21670 7ff61b759ca0 21672 7ff61b74b52b SleepEx 21670->21672 21884 7ff61b75394c 47 API calls 2 library calls 21670->21884 21672->21615 21672->21616 21675 7ff61b758977 21674->21675 21676 7ff61b758960 21674->21676 21893 7ff61b7588dc 21675->21893 21900 7ff61b758afc 11 API calls _Wcrtomb 21676->21900 21680 7ff61b758965 21901 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21680->21901 21681 7ff61b75898a CreateThread 21683 7ff61b7589ba GetLastError 21681->21683 21684 7ff61b74b6ca CloseHandle 21681->21684 21902 7ff61b758a70 11 API calls 2 library calls 21683->21902 21684->21628 21686 7ff61b7589c7 21687 7ff61b7589d6 21686->21687 21688 7ff61b7589d0 CloseHandle 21686->21688 21689 7ff61b7589e5 21687->21689 21690 7ff61b7589df FreeLibrary 21687->21690 21688->21687 21691 7ff61b75e6bc __free_lconv_mon 11 API calls 21689->21691 21690->21689 21691->21684 21692->21631 21694 7ff61b74adec memcpy_s 21693->21694 21695 7ff61b74adbf RegQueryValueExW 21693->21695 21696 7ff61b74ae22 RegQueryValueExW lstrlenW 21694->21696 21723 7ff61b74b471 AllocateAndInitializeSid 21694->21723 21695->21694 21903 7ff61b76d7b0 21696->21903 21698 7ff61b74ae70 lstrlenW lstrlenW 21699 7ff61b74af18 lstrlenW 21698->21699 21705 7ff61b74ae99 BuildCatchObjectHelperInternal 21698->21705 21700 7ff61b76d7b0 memcpy_s 21699->21700 21701 7ff61b74af3d lstrlenW lstrlenW 21700->21701 21702 7ff61b74afe8 lstrlenW lstrlenW 21701->21702 21709 7ff61b74af6a BuildCatchObjectHelperInternal 21701->21709 21703 7ff61b74b07a lstrlenW 21702->21703 21711 7ff61b74b011 21702->21711 21704 7ff61b76d7b0 memcpy_s 21703->21704 21706 7ff61b74b09f lstrlenW lstrlenW 21704->21706 21705->21699 21707 7ff61b74b148 lstrlenW 21706->21707 21716 7ff61b74b0cc BuildCatchObjectHelperInternal 21706->21716 21708 7ff61b76d7b0 memcpy_s 21707->21708 21710 7ff61b74b16d lstrlenW lstrlenW 21708->21710 21709->21702 21712 7ff61b74b218 lstrlenW lstrlenW 21710->21712 21719 7ff61b74b19a BuildCatchObjectHelperInternal 21710->21719 21711->21703 21713 7ff61b74b2aa lstrlenW 21712->21713 21721 7ff61b74b241 21712->21721 21714 7ff61b76d7b0 memcpy_s 21713->21714 21715 7ff61b74b2cf lstrlenW lstrlenW 21714->21715 21717 7ff61b74b378 lstrlenW 21715->21717 21724 7ff61b74b2fc BuildCatchObjectHelperInternal 21715->21724 21716->21707 21718 7ff61b76d7b0 memcpy_s 21717->21718 21720 7ff61b74b39d lstrlenW lstrlenW 21718->21720 21719->21712 21722 7ff61b74b448 lstrlenW lstrlenW 21720->21722 21725 7ff61b74b3ca BuildCatchObjectHelperInternal 21720->21725 21721->21713 21722->21723 21723->21634 21723->21635 21724->21717 21725->21722 21727 7ff61b733893 lstrlenW WideCharToMultiByte 21726->21727 21728 7ff61b733ad9 21726->21728 21729 7ff61b74ded4 21727->21729 21728->21650 21730 7ff61b7338d4 lstrlenW WideCharToMultiByte gethostbyname 21729->21730 21731 7ff61b73391d 21730->21731 21731->21728 21732 7ff61b73392e htons connect 21731->21732 21732->21728 21733 7ff61b733971 setsockopt setsockopt setsockopt setsockopt 21732->21733 21734 7ff61b733a86 21733->21734 21735 7ff61b733a37 WSAIoctl 21733->21735 21736 7ff61b758940 52 API calls 21734->21736 21735->21734 21737 7ff61b733ab0 21736->21737 21738 7ff61b758940 52 API calls 21737->21738 21738->21728 21740 7ff61b73631d std::_Locinfo::_Locinfo_ctor 21739->21740 21741 7ff61b74de98 std::_Facet_Register 49 API calls 21740->21741 21742 7ff61b73632a memcpy_s 21741->21742 21743 7ff61b73635e memcpy_s 21742->21743 21744 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21742->21744 21745 7ff61b736376 gethostname gethostbyname 21743->21745 21744->21743 21746 7ff61b73644f 8 API calls 21745->21746 21747 7ff61b7363b2 inet_ntoa 21745->21747 21749 7ff61b73665c GetSystemInfo wsprintfW 21746->21749 21750 7ff61b73653e GetProcAddress 21746->21750 21988 7ff61b758f58 47 API calls 2 library calls 21747->21988 21751 7ff61b7366a0 GetDriveTypeW 21749->21751 21753 7ff61b736557 21750->21753 21754 7ff61b736653 FreeLibrary 21750->21754 21755 7ff61b7366f8 21751->21755 21756 7ff61b7366c1 GetDiskFreeSpaceExW 21751->21756 21752 7ff61b7363d5 21989 7ff61b758f58 47 API calls 2 library calls 21752->21989 21905 7ff61b733670 21753->21905 21754->21749 21755->21751 21758 7ff61b7366ff GlobalMemoryStatusEx 21755->21758 21756->21755 21760 7ff61b733670 50 API calls 21758->21760 21762 7ff61b736762 21760->21762 21761 7ff61b7365a0 21909 7ff61b7391a0 GetModuleHandleW GetProcAddress 21761->21909 21764 7ff61b733670 50 API calls 21762->21764 21763 7ff61b736400 inet_ntoa 21990 7ff61b758f58 47 API calls 2 library calls 21763->21990 21766 7ff61b736786 21764->21766 21913 7ff61b738e00 CreateDXGIFactory 21766->21913 21767 7ff61b7363ed 21767->21746 21767->21763 21991 7ff61b758f58 47 API calls 2 library calls 21767->21991 21772 7ff61b736799 GetForegroundWindow 21774 7ff61b7367ba lstrlenW 21772->21774 21775 7ff61b7367a4 GetWindowTextW 21772->21775 21925 7ff61b738cd0 21774->21925 21775->21774 21776 7ff61b736640 RegCloseKey 21779 7ff61b74de64 21776->21779 21777 7ff61b736622 21777->21776 21781 7ff61b759248 std::_Locinfo::_Locinfo_ctor 47 API calls 21777->21781 21779->21754 21780 7ff61b7367fa 21782 7ff61b7367ff GetLocalTime wsprintfW 21780->21782 21783 7ff61b736823 21780->21783 21781->21776 21782->21783 21784 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21783->21784 21785 7ff61b73683b lstrlenW 21784->21785 21786 7ff61b738cd0 6 API calls 21785->21786 21787 7ff61b73685f 21786->21787 21788 7ff61b736878 GetModuleHandleW GetProcAddress 21787->21788 21789 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21787->21789 21790 7ff61b7368ad GetNativeSystemInfo 21788->21790 21791 7ff61b7368b1 GetSystemInfo 21788->21791 21789->21788 21792 7ff61b7368b7 wsprintfW 21790->21792 21791->21792 21934 7ff61b738ad0 21792->21934 21795 7ff61b736906 GetCurrentProcessId 21796 7ff61b73691c OpenProcess 21795->21796 21797 7ff61b736a5e CoInitializeEx CoCreateInstance 21795->21797 21798 7ff61b736a57 21796->21798 21799 7ff61b73693d K32GetProcessImageFileNameW 21796->21799 21800 7ff61b736b8f 21797->21800 21828 7ff61b736a95 21797->21828 21798->21797 21801 7ff61b73695b GetLogicalDriveStringsW 21799->21801 21802 7ff61b736a4e CloseHandle 21799->21802 21804 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 21800->21804 21803 7ff61b736a3e lstrcpyW 21801->21803 21820 7ff61b736975 21801->21820 21802->21798 21803->21802 21805 7ff61b736bab memcpy_s 21804->21805 21808 7ff61b736bc6 RegOpenKeyExW 21805->21808 21806 7ff61b736990 lstrcmpiW 21807 7ff61b7369b2 lstrcmpiW 21806->21807 21806->21820 21809 7ff61b7369c6 QueryDosDeviceW 21807->21809 21807->21820 21810 7ff61b736bf5 RegQueryInfoKeyW 21808->21810 21811 7ff61b736d52 lstrlenW 21808->21811 21809->21802 21812 7ff61b736a00 lstrlenW 21809->21812 21813 7ff61b736d82 21810->21813 21834 7ff61b736c55 memcpy_s 21810->21834 21811->21813 21814 7ff61b736d64 21811->21814 21992 7ff61b7590ac 53 API calls 3 library calls 21812->21992 21963 7ff61b7379e0 21813->21963 21954 7ff61b759248 21814->21954 21817 7ff61b736b7e CoUninitialize 21817->21800 21820->21803 21820->21806 21822 7ff61b736e8d lstrcpyW lstrcatW 21820->21822 21821 7ff61b759248 std::_Locinfo::_Locinfo_ctor 47 API calls 21823 7ff61b736da1 GetTickCount 21821->21823 21822->21802 21981 7ff61b758b9c GetSystemTimeAsFileTime 21823->21981 21824 7ff61b736d47 RegCloseKey 21824->21811 21828->21800 21828->21817 21831 7ff61b736b36 SysFreeString 21828->21831 21829 7ff61b736cb4 RegEnumKeyExW lstrlenW 21832 7ff61b736cf7 lstrlenW 21829->21832 21829->21834 21831->21828 21832->21834 21833 7ff61b736e7f 21835 7ff61b737250 116 API calls 21833->21835 21834->21811 21834->21824 21834->21829 21838 7ff61b758b24 47 API calls std::_Locinfo::_Locinfo_ctor 21834->21838 21836 7ff61b736ed1 lstrlenW 21835->21836 21837 7ff61b738cd0 6 API calls 21836->21837 21839 7ff61b736f0a 21837->21839 21838->21834 21840 7ff61b736fe7 CreateToolhelp32Snapshot 21839->21840 21841 7ff61b736f13 6 API calls 21839->21841 21844 7ff61b737088 CreateToolhelp32Snapshot 21840->21844 21845 7ff61b737001 memcpy_s 21840->21845 21842 7ff61b736f98 lstrlenW RegSetValueExW 21841->21842 21843 7ff61b736fda RegCloseKey 21841->21843 21842->21843 21847 7ff61b736fcd RegCloseKey 21842->21847 21843->21840 21848 7ff61b737138 CreateToolhelp32Snapshot 21844->21848 21849 7ff61b7370ab memcpy_s 21844->21849 21850 7ff61b737015 Process32FirstW 21845->21850 21847->21843 21853 7ff61b73715b memcpy_s 21848->21853 21854 7ff61b7371e4 21848->21854 21852 7ff61b7370bf Process32FirstW 21849->21852 21850->21844 21856 7ff61b737033 21850->21856 21852->21848 21859 7ff61b7370dd 21852->21859 21858 7ff61b73716f Process32FirstW 21853->21858 21863 7ff61b733e30 10 API calls 21854->21863 21855 7ff61b73721c 21855->21650 21856->21844 21857 7ff61b737074 Process32NextW 21856->21857 21857->21844 21857->21856 21858->21854 21861 7ff61b73718d 21858->21861 21859->21848 21860 7ff61b737124 Process32NextW 21859->21860 21860->21848 21860->21859 21861->21854 21862 7ff61b7371d0 Process32NextW 21861->21862 21862->21854 21862->21861 21863->21855 21865 7ff61b7594ca 21864->21865 21866 7ff61b7594b8 21864->21866 21868 7ff61b759514 21865->21868 21870 7ff61b7594d8 21865->21870 21885 7ff61b758afc 11 API calls _Wcrtomb 21866->21885 21874 7ff61b75952f ProcessCodePage 21868->21874 21888 7ff61b758160 47 API calls 2 library calls 21868->21888 21869 7ff61b7594bd 21886 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21869->21886 21887 7ff61b753c6c 47 API calls _invalid_parameter_noinfo_noreturn 21870->21887 21875 7ff61b7598b5 21874->21875 21889 7ff61b758afc 11 API calls _Wcrtomb 21874->21889 21880 7ff61b7594c8 21875->21880 21891 7ff61b758afc 11 API calls _Wcrtomb 21875->21891 21877 7ff61b7598aa 21890 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21877->21890 21880->21670 21883 7ff61b75394c 47 API calls 2 library calls 21880->21883 21881 7ff61b759b46 21892 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21881->21892 21883->21670 21884->21672 21885->21869 21886->21880 21887->21880 21888->21874 21889->21877 21890->21875 21891->21881 21892->21880 21894 7ff61b760788 _Wcrtomb 11 API calls 21893->21894 21895 7ff61b7588fe 21894->21895 21896 7ff61b75e6bc __free_lconv_mon 11 API calls 21895->21896 21897 7ff61b758908 21896->21897 21898 7ff61b75890d 21897->21898 21899 7ff61b758911 GetModuleHandleExW 21897->21899 21898->21681 21898->21684 21899->21898 21900->21680 21901->21684 21902->21686 21904 7ff61b76d7a0 21903->21904 21904->21698 21904->21904 21906 7ff61b733695 21905->21906 21993 7ff61b75868c 21906->21993 21910 7ff61b7391dd GetNativeSystemInfo 21909->21910 21911 7ff61b7391e1 GetSystemInfo 21909->21911 21912 7ff61b7365c2 RegOpenKeyExW RegQueryValueExW 21910->21912 21911->21912 21912->21776 21912->21777 21915 7ff61b739143 21913->21915 21919 7ff61b738e5a 21913->21919 21914 7ff61b739175 21914->21772 21915->21914 21916 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21915->21916 21917 7ff61b739196 21916->21917 21920 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21917->21920 21924 7ff61b738ed5 21919->21924 22007 7ff61b73a4c0 49 API calls BuildCatchObjectHelperInternal 21919->22007 21921 7ff61b73919c 21920->21921 21922 7ff61b733670 50 API calls 21922->21924 21924->21915 21924->21917 21924->21922 22008 7ff61b73a4c0 49 API calls BuildCatchObjectHelperInternal 21924->22008 21926 7ff61b76d7b0 memcpy_s 21925->21926 21927 7ff61b738d11 RegOpenKeyExW 21926->21927 21929 7ff61b738d46 21927->21929 21932 7ff61b738d3c 21927->21932 21928 7ff61b738dc8 RegCloseKey RegCloseKey 21928->21780 21929->21928 21930 7ff61b738d54 RegQueryValueExW 21929->21930 21930->21928 21931 7ff61b738d93 lstrcmpW 21930->21931 21931->21932 21933 7ff61b738db0 lstrcpyW 21931->21933 21932->21928 21933->21928 21935 7ff61b74ded4 21934->21935 21936 7ff61b738ae8 GetCurrentProcessId wsprintfW 21935->21936 22009 7ff61b738900 GetCurrentProcessId OpenProcess 21936->22009 21938 7ff61b738b10 memcpy_s 21939 7ff61b738b24 GetVersionExW 21938->21939 21940 7ff61b738b3f 21939->21940 21941 7ff61b738c92 21939->21941 21940->21941 21944 7ff61b738b55 GetCurrentProcess OpenProcessToken 21940->21944 21942 7ff61b738c99 wsprintfW 21941->21942 21943 7ff61b738ca9 21942->21943 21943->21795 21944->21941 21945 7ff61b738b81 GetTokenInformation 21944->21945 21946 7ff61b738bb6 GetLastError 21945->21946 21947 7ff61b738c3c CloseHandle 21945->21947 21946->21947 21948 7ff61b738bc1 LocalAlloc 21946->21948 21947->21941 21953 7ff61b738c4e 21947->21953 21949 7ff61b738c34 21948->21949 21950 7ff61b738be3 GetTokenInformation 21948->21950 21949->21947 21951 7ff61b738c2b LocalFree 21950->21951 21952 7ff61b738c12 GetSidSubAuthorityCount GetSidSubAuthority 21950->21952 21951->21949 21952->21951 21953->21942 21953->21943 21959 7ff61b759265 21954->21959 21955 7ff61b75926a 21956 7ff61b759280 21955->21956 22059 7ff61b758afc 11 API calls _Wcrtomb 21955->22059 21956->21813 21958 7ff61b759274 22060 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21958->22060 21959->21955 21959->21956 21961 7ff61b7592b6 21959->21961 21961->21956 22061 7ff61b758afc 11 API calls _Wcrtomb 21961->22061 21966 7ff61b737a13 memcpy_s 21963->21966 21964 7ff61b737afc CoCreateInstance 21965 7ff61b737d21 lstrlenW 21964->21965 21977 7ff61b737b2d memcpy_s 21964->21977 21967 7ff61b737d2e lstrcatW 21965->21967 21968 7ff61b736d87 21965->21968 21966->21964 21969 7ff61b737a64 CreateToolhelp32Snapshot 21966->21969 21973 7ff61b737abf Process32NextW 21966->21973 21974 7ff61b737d65 CloseHandle 21966->21974 21967->21968 21968->21821 21969->21966 21971 7ff61b737a7a Process32FirstW 21969->21971 21970 7ff61b737d0f 21970->21965 21971->21966 21972 7ff61b737acd CloseHandle 21971->21972 21972->21966 21973->21966 21973->21972 21974->21966 21976 7ff61b737d75 lstrcatW lstrcatW 21974->21976 21975 7ff61b737bb5 wsprintfW RegOpenKeyExW 21975->21977 21976->21966 21977->21970 21977->21975 21978 7ff61b737c77 RegQueryValueExW 21977->21978 21979 7ff61b737ce0 RegCloseKey 21978->21979 21980 7ff61b737cc0 lstrcatW lstrcatW 21978->21980 21979->21977 21980->21979 21982 7ff61b736db2 21981->21982 21983 7ff61b758f10 21982->21983 22062 7ff61b76177c 21983->22062 21987 7ff61b736dd2 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 21987->21833 21988->21752 21989->21767 21990->21767 21991->21767 21992->21820 21995 7ff61b7586c5 21993->21995 21994 7ff61b758708 21998 7ff61b758747 21994->21998 22004 7ff61b753c6c 47 API calls _invalid_parameter_noinfo_noreturn 21994->22004 21995->21994 22003 7ff61b753fe0 50 API calls 3 library calls 21995->22003 21999 7ff61b75876d 21998->21999 22005 7ff61b75394c 47 API calls 2 library calls 21998->22005 22001 7ff61b7336b4 21999->22001 22006 7ff61b75394c 47 API calls 2 library calls 21999->22006 22001->21761 22003->21994 22004->21998 22005->21999 22006->22001 22007->21919 22008->21924 22010 7ff61b738967 22009->22010 22011 7ff61b73893a OpenProcessToken 22009->22011 22010->21938 22012 7ff61b738971 22011->22012 22013 7ff61b73895e CloseHandle 22011->22013 22040 7ff61b738690 22012->22040 22013->22010 22015 7ff61b7389bb BuildCatchObjectHelperInternal 22016 7ff61b7389e8 CloseHandle CloseHandle 22015->22016 22017 7ff61b738a14 22016->22017 22017->22010 22020 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 22017->22020 22021 7ff61b738aba 22017->22021 22018 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 22019 7ff61b738ac0 22018->22019 22022 7ff61b738ae8 GetCurrentProcessId wsprintfW 22019->22022 22020->22021 22021->22018 22023 7ff61b738900 58 API calls 22022->22023 22024 7ff61b738b10 memcpy_s 22023->22024 22025 7ff61b738b24 GetVersionExW 22024->22025 22026 7ff61b738b3f 22025->22026 22027 7ff61b738c92 22025->22027 22026->22027 22030 7ff61b738b55 GetCurrentProcess OpenProcessToken 22026->22030 22028 7ff61b738c99 wsprintfW 22027->22028 22029 7ff61b738ca9 22028->22029 22029->21938 22030->22027 22031 7ff61b738b81 GetTokenInformation 22030->22031 22032 7ff61b738bb6 GetLastError 22031->22032 22033 7ff61b738c3c CloseHandle 22031->22033 22032->22033 22034 7ff61b738bc1 LocalAlloc 22032->22034 22033->22027 22039 7ff61b738c4e 22033->22039 22035 7ff61b738c34 22034->22035 22036 7ff61b738be3 GetTokenInformation 22034->22036 22035->22033 22037 7ff61b738c2b LocalFree 22036->22037 22038 7ff61b738c12 GetSidSubAuthorityCount GetSidSubAuthority 22036->22038 22037->22035 22038->22037 22039->22028 22039->22029 22041 7ff61b7386c1 22040->22041 22042 7ff61b7386f3 GetTokenInformation 22041->22042 22045 7ff61b7387e8 22041->22045 22043 7ff61b73874e GetTokenInformation 22042->22043 22044 7ff61b738715 GetLastError 22042->22044 22047 7ff61b73877c LookupAccountSidW 22043->22047 22048 7ff61b7387e3 BuildCatchObjectHelperInternal 22043->22048 22044->22045 22046 7ff61b738724 GetProcessHeap HeapAlloc 22044->22046 22045->22015 22046->22043 22046->22045 22050 7ff61b7387c0 GetLastError 22047->22050 22053 7ff61b7387ef 22047->22053 22048->22045 22049 7ff61b7388c4 GetProcessHeap HeapFree 22048->22049 22049->22045 22050->22045 22051 7ff61b7387cd 22050->22051 22052 7ff61b7587a0 std::_Locinfo::_Locinfo_ctor 47 API calls 22051->22052 22052->22048 22055 7ff61b73881a BuildCatchObjectHelperInternal 22053->22055 22057 7ff61b73a1a0 49 API calls 4 library calls 22053->22057 22055->22048 22058 7ff61b73a1a0 49 API calls 4 library calls 22055->22058 22057->22055 22058->22048 22059->21958 22060->21956 22061->21958 22063 7ff61b75ebe8 _Wcrtomb 11 API calls 22062->22063 22064 7ff61b761787 22063->22064 22065 7ff61b7617ab 22064->22065 22066 7ff61b758f27 22064->22066 22102 7ff61b75edd0 22064->22102 22065->22066 22109 7ff61b758afc 11 API calls _Wcrtomb 22065->22109 22066->21987 22071 7ff61b758c10 22066->22071 22070 7ff61b75e6bc __free_lconv_mon 11 API calls 22070->22065 22072 7ff61b758c26 22071->22072 22073 7ff61b758c41 22071->22073 22124 7ff61b758afc 11 API calls _Wcrtomb 22072->22124 22073->22072 22075 7ff61b758c5a 22073->22075 22076 7ff61b758c60 22075->22076 22079 7ff61b758c7d 22075->22079 22126 7ff61b758afc 11 API calls _Wcrtomb 22076->22126 22077 7ff61b758c2b 22125 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 22077->22125 22112 7ff61b76233c 22079->22112 22085 7ff61b758ef7 22086 7ff61b753d88 _invalid_parameter_noinfo_noreturn 17 API calls 22085->22086 22088 7ff61b758f0c 22086->22088 22090 7ff61b76177c 12 API calls 22088->22090 22092 7ff61b758f27 22090->22092 22094 7ff61b758f3c 22092->22094 22097 7ff61b758c10 61 API calls 22092->22097 22094->21987 22095 7ff61b758cc1 22096 7ff61b758d3a 22095->22096 22098 7ff61b758cda 22095->22098 22101 7ff61b758c37 22096->22101 22140 7ff61b762380 47 API calls _isindst 22096->22140 22097->22094 22098->22101 22139 7ff61b762380 47 API calls _isindst 22098->22139 22101->21987 22103 7ff61b75ee1b 22102->22103 22107 7ff61b75eddf _Wcrtomb 22102->22107 22111 7ff61b758afc 11 API calls _Wcrtomb 22103->22111 22104 7ff61b75ee02 HeapAlloc 22106 7ff61b75ee19 22104->22106 22104->22107 22106->22070 22107->22103 22107->22104 22110 7ff61b75ca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 22107->22110 22109->22066 22110->22107 22111->22106 22113 7ff61b76234b 22112->22113 22114 7ff61b758c82 22112->22114 22141 7ff61b75aba4 EnterCriticalSection 22113->22141 22118 7ff61b761464 22114->22118 22116 7ff61b762353 22116->22114 22117 7ff61b7621ac 61 API calls 22116->22117 22117->22114 22119 7ff61b76146d 22118->22119 22120 7ff61b758c97 22118->22120 22142 7ff61b758afc 11 API calls _Wcrtomb 22119->22142 22120->22085 22127 7ff61b761494 22120->22127 22122 7ff61b761472 22143 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 22122->22143 22124->22077 22125->22101 22126->22101 22128 7ff61b76149d 22127->22128 22132 7ff61b758ca8 22127->22132 22144 7ff61b758afc 11 API calls _Wcrtomb 22128->22144 22130 7ff61b7614a2 22145 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 22130->22145 22132->22085 22133 7ff61b7614c4 22132->22133 22134 7ff61b7614cd 22133->22134 22135 7ff61b758cb9 22133->22135 22146 7ff61b758afc 11 API calls _Wcrtomb 22134->22146 22135->22085 22135->22095 22137 7ff61b7614d2 22147 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 22137->22147 22139->22101 22140->22101 22142->22122 22143->22120 22144->22130 22145->22132 22146->22137 22147->22135 22229 7ff61b750100 10 API calls 2 library calls 22303 7ff61b76ce0c RtlUnwindEx __GSHandlerCheck_SEH __GSHandlerCheckCommon 22230 7ff61b76070c 57 API calls _isindst 21018 7ff61b758808 21019 7ff61b758816 GetLastError ExitThread 21018->21019 21020 7ff61b758825 21018->21020 21033 7ff61b75ea70 GetLastError 21020->21033 21026 7ff61b758843 21059 7ff61b737250 21026->21059 21099 7ff61b733da0 21026->21099 21107 7ff61b733b00 21026->21107 21027 7ff61b758862 21121 7ff61b758a1c 21027->21121 21034 7ff61b75ea94 FlsGetValue 21033->21034 21035 7ff61b75eab1 FlsSetValue 21033->21035 21036 7ff61b75eaab 21034->21036 21037 7ff61b75eaa1 21034->21037 21035->21037 21038 7ff61b75eac3 21035->21038 21036->21035 21039 7ff61b75eb1d SetLastError 21037->21039 21125 7ff61b760788 21038->21125 21041 7ff61b75882a 21039->21041 21042 7ff61b75eb3d 21039->21042 21055 7ff61b76137c 21041->21055 21141 7ff61b753dd8 47 API calls 2 library calls 21042->21141 21045 7ff61b75eaf0 FlsSetValue 21048 7ff61b75eafc FlsSetValue 21045->21048 21049 7ff61b75eb0e 21045->21049 21046 7ff61b75eae0 FlsSetValue 21047 7ff61b75eae9 21046->21047 21134 7ff61b75e6bc 21047->21134 21048->21047 21140 7ff61b75e820 11 API calls _Wcrtomb 21049->21140 21053 7ff61b75eb16 21054 7ff61b75e6bc __free_lconv_mon 11 API calls 21053->21054 21054->21039 21056 7ff61b758836 21055->21056 21057 7ff61b76138b 21055->21057 21056->21026 21124 7ff61b7610b0 5 API calls std::_Lockit::_Lockit 21056->21124 21057->21056 21145 7ff61b760ac8 5 API calls std::_Lockit::_Lockit 21057->21145 21060 7ff61b7372b0 21059->21060 21062 7ff61b7372c6 BuildCatchObjectHelperInternal 21060->21062 21157 7ff61b73a300 49 API calls 4 library calls 21060->21157 21064 7ff61b737312 BuildCatchObjectHelperInternal 21062->21064 21158 7ff61b73a300 49 API calls 4 library calls 21062->21158 21066 7ff61b737381 BuildCatchObjectHelperInternal 21064->21066 21159 7ff61b73a300 49 API calls 4 library calls 21064->21159 21068 7ff61b7373f4 BuildCatchObjectHelperInternal 21066->21068 21160 7ff61b73a300 49 API calls 4 library calls 21066->21160 21070 7ff61b73744f BuildCatchObjectHelperInternal 21068->21070 21161 7ff61b73a300 49 API calls 4 library calls 21068->21161 21072 7ff61b7374d0 BuildCatchObjectHelperInternal 21070->21072 21162 7ff61b73a300 49 API calls 4 library calls 21070->21162 21074 7ff61b737540 BuildCatchObjectHelperInternal 21072->21074 21163 7ff61b73a300 49 API calls 4 library calls 21072->21163 21146 7ff61b749b00 21074->21146 21077 7ff61b737636 21078 7ff61b7376ad 21077->21078 21079 7ff61b7376d8 21077->21079 21081 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21077->21081 21078->21027 21152 7ff61b753d58 21079->21152 21081->21079 21082 7ff61b7376de CreateMutexExW GetLastError 21083 7ff61b737749 21082->21083 21084 7ff61b737719 21082->21084 21086 7ff61b7377f0 9 API calls 21083->21086 21089 7ff61b737760 lstrlenW 21083->21089 21085 7ff61b737720 Sleep CreateMutexW GetLastError 21084->21085 21085->21083 21085->21085 21087 7ff61b7378ad ReleaseMutex DirectInput8Create 21086->21087 21088 7ff61b7378a4 DeleteFileW 21086->21088 21090 7ff61b737980 21087->21090 21095 7ff61b7378e3 21087->21095 21088->21087 21091 7ff61b738cd0 6 API calls 21089->21091 21090->21027 21092 7ff61b7377be 21091->21092 21093 7ff61b7377d8 SleepEx 21092->21093 21094 7ff61b7377c2 lstrcmpW 21092->21094 21093->21086 21093->21089 21094->21086 21094->21093 21095->21090 21096 7ff61b73799f GetTickCount GetKeyState 21095->21096 21097 7ff61b73adb0 37 API calls 21096->21097 21098 7ff61b7379d1 21097->21098 21100 7ff61b733e22 21099->21100 21104 7ff61b733db4 21099->21104 21100->21027 21101 7ff61b733dc8 SleepEx 21101->21104 21102 7ff61b733e15 21102->21027 21104->21101 21104->21102 21195 7ff61b733e30 GetCurrentThreadId 21104->21195 21211 7ff61b7337a0 21104->21211 21108 7ff61b733b18 21107->21108 21109 7ff61b733be0 select 21108->21109 21110 7ff61b733c54 21108->21110 21111 7ff61b733c08 recv 21108->21111 21112 7ff61b731500 VirtualAlloc VirtualFree 21108->21112 21113 7ff61b758afc 11 API calls _Wcrtomb 21108->21113 21114 7ff61b731730 2 API calls 21108->21114 21115 7ff61b733d04 timeGetTime 21108->21115 21233 7ff61b73d9c0 21108->21233 21248 7ff61b73e29b 21108->21248 21252 7ff61b73dbef 21108->21252 21260 7ff61b731810 VirtualAlloc VirtualFree BuildCatchObjectHelperInternal 21108->21260 21109->21108 21109->21110 21110->21027 21111->21108 21112->21108 21113->21108 21114->21108 21116 7ff61b731730 2 API calls 21115->21116 21116->21108 21584 7ff61b758878 21121->21584 21124->21026 21126 7ff61b760799 21125->21126 21132 7ff61b7607a7 _Wcrtomb 21125->21132 21127 7ff61b7607ea 21126->21127 21126->21132 21143 7ff61b758afc 11 API calls _Wcrtomb 21127->21143 21128 7ff61b7607ce HeapAlloc 21129 7ff61b7607e8 21128->21129 21128->21132 21131 7ff61b75ead2 21129->21131 21131->21045 21131->21046 21132->21127 21132->21128 21142 7ff61b75ca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21132->21142 21135 7ff61b75e6c1 RtlFreeHeap 21134->21135 21139 7ff61b75e6f0 21134->21139 21136 7ff61b75e6dc GetLastError 21135->21136 21135->21139 21137 7ff61b75e6e9 __free_lconv_mon 21136->21137 21144 7ff61b758afc 11 API calls _Wcrtomb 21137->21144 21139->21037 21140->21053 21142->21132 21143->21131 21144->21139 21145->21056 21147 7ff61b749b2d 21146->21147 21164 7ff61b749d20 21147->21164 21149 7ff61b749e70 49 API calls 21150 7ff61b749c2f 21149->21150 21150->21149 21151 7ff61b7375dd MultiByteToWideChar MultiByteToWideChar 21150->21151 21151->21077 21189 7ff61b753bd0 47 API calls _invalid_parameter_noinfo_noreturn 21152->21189 21154 7ff61b753d71 21190 7ff61b753d88 IsProcessorFeaturePresent 21154->21190 21157->21062 21158->21064 21159->21066 21160->21068 21161->21070 21162->21072 21163->21074 21165 7ff61b749e65 21164->21165 21168 7ff61b749d49 21164->21168 21185 7ff61b7361c0 49 API calls 21165->21185 21170 7ff61b749ddd 21168->21170 21171 7ff61b749da1 21168->21171 21176 7ff61b749d94 BuildCatchObjectHelperInternal 21168->21176 21173 7ff61b74de98 std::_Facet_Register 49 API calls 21170->21173 21172 7ff61b749e5f 21171->21172 21178 7ff61b74de98 21171->21178 21184 7ff61b7319d0 49 API calls Concurrency::cancel_current_task 21172->21184 21173->21176 21175 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21175->21172 21176->21175 21177 7ff61b749e27 BuildCatchObjectHelperInternal 21176->21177 21177->21150 21183 7ff61b74dea3 21178->21183 21179 7ff61b74debc 21179->21176 21183->21178 21183->21179 21186 7ff61b75ca30 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 21183->21186 21187 7ff61b74cb90 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 21183->21187 21188 7ff61b7319d0 49 API calls Concurrency::cancel_current_task 21183->21188 21184->21165 21186->21183 21188->21183 21189->21154 21191 7ff61b753d9b 21190->21191 21194 7ff61b753a6c 14 API calls 3 library calls 21191->21194 21193 7ff61b753db6 GetCurrentProcess TerminateProcess 21194->21193 21196 7ff61b733e5c 21195->21196 21214 7ff61b731670 21196->21214 21198 7ff61b733e9b 21199 7ff61b731670 2 API calls 21198->21199 21200 7ff61b733ec4 21199->21200 21221 7ff61b731500 21200->21221 21202 7ff61b733efa 21207 7ff61b733f06 21202->21207 21209 7ff61b733f1a 21202->21209 21203 7ff61b733fa1 21227 7ff61b731730 21203->21227 21204 7ff61b733f80 send 21204->21203 21204->21207 21206 7ff61b733f30 send 21206->21209 21207->21203 21207->21204 21208 7ff61b733fba GetCurrentThreadId 21210 7ff61b733df1 timeGetTime 21208->21210 21209->21203 21209->21206 21209->21207 21210->21104 21212 7ff61b73381a 21211->21212 21213 7ff61b7337af setsockopt CancelIo closesocket SetEvent 21211->21213 21212->21104 21213->21212 21215 7ff61b731686 21214->21215 21216 7ff61b73167e 21214->21216 21217 7ff61b7316ac VirtualAlloc 21215->21217 21216->21198 21218 7ff61b7316d6 BuildCatchObjectHelperInternal 21217->21218 21219 7ff61b7316f6 VirtualFree 21218->21219 21220 7ff61b731704 21218->21220 21219->21220 21220->21198 21222 7ff61b73152a 21221->21222 21223 7ff61b73155b VirtualAlloc 21222->21223 21224 7ff61b7315b5 BuildCatchObjectHelperInternal 21222->21224 21225 7ff61b731587 BuildCatchObjectHelperInternal 21223->21225 21224->21202 21224->21224 21225->21224 21226 7ff61b7315a7 VirtualFree 21225->21226 21226->21224 21228 7ff61b73174b 21227->21228 21229 7ff61b7317fb 21228->21229 21230 7ff61b73177c VirtualAlloc 21228->21230 21229->21208 21231 7ff61b7317a8 BuildCatchObjectHelperInternal 21230->21231 21232 7ff61b7317be VirtualFree 21231->21232 21232->21208 21234 7ff61b73da2a CloseHandle 21233->21234 21235 7ff61b73d9df 21233->21235 21237 7ff61b73da44 21234->21237 21236 7ff61b73da0b 21235->21236 21235->21237 21236->21234 21238 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21237->21238 21239 7ff61b73da49 21238->21239 21240 7ff61b74de98 std::_Facet_Register 49 API calls 21239->21240 21247 7ff61b73daf7 21239->21247 21242 7ff61b73da83 memcpy_s 21240->21242 21241 7ff61b73db41 RegOpenKeyExW 21243 7ff61b73db7c RegQueryValueExW 21241->21243 21244 7ff61b73dbb0 21241->21244 21245 7ff61b73da97 GetLastInputInfo GetTickCount wsprintfW 21242->21245 21243->21244 21244->21108 21261 7ff61b738040 21245->21261 21247->21241 21247->21244 21249 7ff61b73e2a2 21248->21249 21250 7ff61b73e2c3 21249->21250 21251 7ff61b733e30 10 API calls 21249->21251 21250->21108 21251->21250 21253 7ff61b73dbfb 21252->21253 21258 7ff61b73e2c3 21252->21258 21255 7ff61b73dc19 21253->21255 21422 7ff61b7587a0 21253->21422 21255->21258 21368 7ff61b73f410 21255->21368 21257 7ff61b73dc41 21257->21258 21259 7ff61b733e30 10 API calls 21257->21259 21258->21108 21259->21258 21260->21108 21262 7ff61b7380e4 memcpy_s 21261->21262 21264 7ff61b738076 memcpy_s 21261->21264 21263 7ff61b74c2e0 77 API calls 21262->21263 21266 7ff61b738105 21263->21266 21298 7ff61b74c2e0 21264->21298 21266->21266 21267 7ff61b7382b7 21266->21267 21268 7ff61b7381bb 21266->21268 21269 7ff61b73818f 21266->21269 21270 7ff61b7380b8 BuildCatchObjectHelperInternal 21266->21270 21328 7ff61b739c80 49 API calls 4 library calls 21267->21328 21312 7ff61b739c80 49 API calls 4 library calls 21268->21312 21269->21270 21273 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21269->21273 21282 7ff61b738681 21269->21282 21270->21247 21274 7ff61b738675 21273->21274 21277 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21274->21277 21275 7ff61b7381d6 21275->21275 21313 7ff61b739e70 21275->21313 21276 7ff61b7382d6 21276->21276 21279 7ff61b739e70 49 API calls 21276->21279 21280 7ff61b73867b 21277->21280 21284 7ff61b738303 21279->21284 21281 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21280->21281 21281->21282 21285 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21282->21285 21283 7ff61b738206 21327 7ff61b739bc0 47 API calls _invalid_parameter_noinfo_noreturn 21283->21327 21329 7ff61b739bc0 47 API calls _invalid_parameter_noinfo_noreturn 21284->21329 21288 7ff61b738687 21285->21288 21289 7ff61b7384f4 OutputDebugStringA 21290 7ff61b738518 MultiByteToWideChar 21289->21290 21294 7ff61b738591 memcpy_s BuildCatchObjectHelperInternal 21289->21294 21291 7ff61b74ded4 21290->21291 21292 7ff61b73855f MultiByteToWideChar 21291->21292 21292->21294 21293 7ff61b7384dc 21293->21289 21331 7ff61b739bc0 47 API calls _invalid_parameter_noinfo_noreturn 21294->21331 21295 7ff61b738273 std::_Locinfo::_Locinfo_ctor BuildCatchObjectHelperInternal 21295->21274 21295->21280 21295->21289 21295->21293 21330 7ff61b73a010 49 API calls 4 library calls 21295->21330 21299 7ff61b74c300 wsprintfW CreateFileW 21298->21299 21300 7ff61b74c34d DeviceIoControl 21299->21300 21301 7ff61b74c509 21299->21301 21302 7ff61b74c398 __std_exception_destroy 21300->21302 21303 7ff61b74c500 CloseHandle 21300->21303 21301->21270 21302->21303 21304 7ff61b74c3c2 DeviceIoControl 21302->21304 21306 7ff61b74c520 WideCharToMultiByte WideCharToMultiByte 21302->21306 21307 7ff61b74c41c DeviceIoControl 21302->21307 21308 7ff61b74c480 DeviceIoControl 21302->21308 21332 7ff61b74c1b0 21302->21332 21303->21301 21304->21302 21305 7ff61b74c4f3 __std_exception_destroy 21304->21305 21305->21303 21306->21302 21307->21302 21307->21303 21308->21302 21308->21305 21311 7ff61b74c4ef 21311->21301 21312->21275 21317 7ff61b739ea1 21313->21317 21325 7ff61b739f77 21313->21325 21315 7ff61b739ea7 BuildCatchObjectHelperInternal 21315->21283 21317->21315 21319 7ff61b739f2c 21317->21319 21320 7ff61b739ed3 21317->21320 21318 7ff61b74de98 std::_Facet_Register 49 API calls 21322 7ff61b739ee9 21318->21322 21321 7ff61b74de98 std::_Facet_Register 49 API calls 21319->21321 21320->21318 21326 7ff61b739f71 21320->21326 21321->21315 21322->21315 21324 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21322->21324 21324->21326 21367 7ff61b7361c0 49 API calls 21325->21367 21366 7ff61b7319d0 49 API calls Concurrency::cancel_current_task 21326->21366 21327->21295 21328->21276 21329->21295 21330->21295 21331->21269 21334 7ff61b74c1d1 21332->21334 21333 7ff61b74c2c9 CloseHandle 21333->21299 21333->21311 21334->21333 21335 7ff61b74c22f CreateFileA 21334->21335 21335->21333 21336 7ff61b74c268 __std_exception_destroy 21335->21336 21337 7ff61b74c270 DeviceIoControl 21336->21337 21337->21333 21338 7ff61b74c2ab 21337->21338 21341 7ff61b74bdd0 21338->21341 21342 7ff61b74c190 CloseHandle 21341->21342 21343 7ff61b74bdfd memcpy_s 21341->21343 21344 7ff61b74c166 __std_exception_destroy 21343->21344 21345 7ff61b74be40 DeviceIoControl 21343->21345 21346 7ff61b74be8c DeviceIoControl 21343->21346 21347 7ff61b74bf8e DeviceIoControl 21343->21347 21348 7ff61b74bf08 GlobalAlloc 21343->21348 21350 7ff61b74bfee GlobalAlloc 21343->21350 21351 7ff61b74bf7b GlobalFree 21343->21351 21352 7ff61b74c5c0 WideCharToMultiByte WideCharToMultiByte GetSystemDefaultLangID DeviceIoControl lstrcpyA 21343->21352 21365 7ff61b74bd70 51 API calls 21343->21365 21344->21342 21345->21343 21345->21344 21346->21343 21347->21343 21348->21343 21349 7ff61b74bf20 DeviceIoControl 21348->21349 21349->21343 21349->21351 21350->21343 21353 7ff61b74c003 DeviceIoControl 21350->21353 21351->21343 21352->21343 21354 7ff61b74c06c GlobalFree 21353->21354 21355 7ff61b74c041 21353->21355 21354->21343 21361 7ff61b74c520 WideCharToMultiByte 21355->21361 21357 7ff61b74c04a GlobalFree 21357->21343 21358 7ff61b74c05b 21357->21358 21358->21343 21360 7ff61b74c1b0 58 API calls 21358->21360 21360->21358 21362 7ff61b74c561 21361->21362 21363 7ff61b74c59a __std_exception_destroy 21361->21363 21362->21363 21364 7ff61b74c570 WideCharToMultiByte 21362->21364 21363->21357 21364->21363 21365->21343 21366->21325 21369 7ff61b74de98 std::_Facet_Register 49 API calls 21368->21369 21370 7ff61b73f437 memcpy_s 21369->21370 21371 7ff61b73f44b GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 21370->21371 21372 7ff61b73f4a1 GetWindowTextW 21371->21372 21373 7ff61b73f4b4 CreateToolhelp32Snapshot 21371->21373 21372->21373 21374 7ff61b73f4d8 memcpy_s 21373->21374 21375 7ff61b73f555 CreateToolhelp32Snapshot 21373->21375 21377 7ff61b73f4e9 Process32FirstW 21374->21377 21378 7ff61b73f5f8 CreateToolhelp32Snapshot 21375->21378 21379 7ff61b73f577 memcpy_s 21375->21379 21377->21375 21387 7ff61b73f501 21377->21387 21381 7ff61b73f6a8 RegOpenKeyExW 21378->21381 21382 7ff61b73f61a memcpy_s 21378->21382 21383 7ff61b73f58b Process32FirstW 21379->21383 21385 7ff61b73f6fa RegQueryValueExW 21381->21385 21386 7ff61b73f913 RegOpenKeyExW 21381->21386 21389 7ff61b73f62e Process32FirstW 21382->21389 21383->21378 21393 7ff61b73f5a9 21383->21393 21390 7ff61b73f908 RegCloseKey 21385->21390 21402 7ff61b73f734 memcpy_s 21385->21402 21391 7ff61b73f951 RegQueryValueExW 21386->21391 21392 7ff61b73f9f2 RegOpenKeyExW 21386->21392 21387->21375 21388 7ff61b73f544 Process32NextW 21387->21388 21388->21375 21388->21387 21389->21381 21403 7ff61b73f64c 21389->21403 21390->21386 21397 7ff61b73f9e7 RegCloseKey 21391->21397 21405 7ff61b73f986 memcpy_s 21391->21405 21395 7ff61b73fad1 7 API calls 21392->21395 21396 7ff61b73fa30 RegQueryValueExW 21392->21396 21393->21378 21394 7ff61b73f5e4 Process32NextW 21393->21394 21394->21378 21394->21393 21398 7ff61b73fb89 21395->21398 21399 7ff61b73fb91 FindClose 21395->21399 21400 7ff61b73fac6 RegCloseKey 21396->21400 21410 7ff61b73fa65 memcpy_s 21396->21410 21397->21392 21398->21399 21431 7ff61b73fd10 GetVersion 21399->21431 21400->21395 21407 7ff61b73f75e RegQueryValueExW 21402->21407 21403->21381 21404 7ff61b73f694 Process32NextW 21403->21404 21404->21381 21404->21403 21408 7ff61b73f9b0 RegQueryValueExW 21405->21408 21406 7ff61b73fbd1 BuildCatchObjectHelperInternal 21420 7ff61b73fcbe 21406->21420 21421 7ff61b733e30 10 API calls 21406->21421 21407->21390 21409 7ff61b73f791 21407->21409 21408->21397 21411 7ff61b73f9df 21408->21411 21453 7ff61b741390 49 API calls 4 library calls 21409->21453 21413 7ff61b73fa8f RegQueryValueExW 21410->21413 21411->21397 21413->21400 21414 7ff61b73fabe 21413->21414 21414->21400 21415 7ff61b73f900 21415->21390 21416 7ff61b73fcfe 21417 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21416->21417 21419 7ff61b73fd03 21417->21419 21418 7ff61b73f79d 21418->21390 21418->21415 21418->21416 21420->21257 21421->21420 21423 7ff61b7587b7 21422->21423 21424 7ff61b7587ad 21422->21424 21581 7ff61b758afc 11 API calls _Wcrtomb 21423->21581 21424->21423 21429 7ff61b7587d3 21424->21429 21426 7ff61b7587bf 21582 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21426->21582 21428 7ff61b7587cb 21428->21255 21429->21428 21583 7ff61b758afc 11 API calls _Wcrtomb 21429->21583 21432 7ff61b73fd40 21431->21432 21433 7ff61b740145 21431->21433 21432->21433 21434 7ff61b73fd4c 7 API calls 21432->21434 21433->21406 21435 7ff61b73fdfa 21434->21435 21436 7ff61b73fe0e GetSystemMetrics 21434->21436 21437 7ff61b73fe97 8 API calls 21435->21437 21438 7ff61b73fe78 GetSystemMetrics 21436->21438 21439 7ff61b73fe2e GetSystemMetrics 21436->21439 21440 7ff61b73ffe2 memcpy_s 21437->21440 21438->21437 21439->21437 21441 7ff61b73fff7 GetDIBits 21440->21441 21442 7ff61b74002f memcpy_s BuildCatchObjectHelperInternal 21441->21442 21443 7ff61b74de98 std::_Facet_Register 49 API calls 21442->21443 21444 7ff61b7400a2 21443->21444 21454 7ff61b7402a0 GlobalAlloc GlobalLock 21444->21454 21447 7ff61b7400e1 DeleteObject DeleteObject ReleaseDC 21449 7ff61b74010b 21447->21449 21448 7ff61b7401b1 BuildCatchObjectHelperInternal 21450 7ff61b7401f2 DeleteObject DeleteObject ReleaseDC 21448->21450 21449->21433 21451 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21449->21451 21450->21449 21452 7ff61b740295 21451->21452 21453->21418 21502 7ff61b76d110 21454->21502 21457 7ff61b740671 GlobalFree 21459 7ff61b7400d1 21457->21459 21458 7ff61b74031f 21504 7ff61b7361e0 21458->21504 21459->21447 21459->21448 21463 7ff61b74037c 21464 7ff61b740384 GdipCreateBitmapFromStream 21463->21464 21501 7ff61b7405e7 21463->21501 21465 7ff61b7403bb 21464->21465 21466 7ff61b7403b0 GdipDisposeImage 21464->21466 21522 7ff61b73c340 GdipGetImagePixelFormat 21465->21522 21466->21501 21468 7ff61b740606 DeleteObject 21469 7ff61b74062a 21468->21469 21472 7ff61b7361e0 58 API calls 21469->21472 21470 7ff61b7403c8 GdipDisposeImage 21471 7ff61b7403dc CreateStreamOnHGlobal 21470->21471 21470->21501 21474 7ff61b7403f9 21471->21474 21471->21501 21473 7ff61b74062f EnterCriticalSection 21472->21473 21475 7ff61b740667 LeaveCriticalSection 21473->21475 21476 7ff61b740642 EnterCriticalSection 21473->21476 21556 7ff61b73c7b0 21474->21556 21475->21457 21478 7ff61b74065a LeaveCriticalSection 21476->21478 21479 7ff61b740654 GdiplusShutdown 21476->21479 21478->21475 21479->21478 21480 7ff61b740406 GetHGlobalFromStream GlobalLock 21481 7ff61b7404bf GlobalSize 21480->21481 21482 7ff61b74042e GlobalFree 21480->21482 21486 7ff61b7404d2 BuildCatchObjectHelperInternal 21481->21486 21484 7ff61b740471 21482->21484 21485 7ff61b74044f DeleteObject 21482->21485 21487 7ff61b7361e0 58 API calls 21484->21487 21485->21484 21488 7ff61b739e70 49 API calls 21486->21488 21489 7ff61b740476 EnterCriticalSection 21487->21489 21494 7ff61b740501 21488->21494 21490 7ff61b740489 EnterCriticalSection 21489->21490 21491 7ff61b7404ae LeaveCriticalSection 21489->21491 21492 7ff61b74049b GdiplusShutdown 21490->21492 21493 7ff61b7404a1 LeaveCriticalSection 21490->21493 21491->21459 21492->21493 21493->21491 21495 7ff61b740698 21494->21495 21496 7ff61b740594 21494->21496 21497 7ff61b753d58 _invalid_parameter_noinfo_noreturn 47 API calls 21495->21497 21498 7ff61b7405af DeleteObject 21496->21498 21499 7ff61b7405d3 GlobalUnlock 21496->21499 21500 7ff61b74069d 21497->21500 21498->21499 21499->21501 21501->21468 21501->21469 21503 7ff61b7402f8 GlobalUnlock CreateStreamOnHGlobal 21502->21503 21503->21457 21503->21458 21505 7ff61b73626b EnterCriticalSection LeaveCriticalSection 21504->21505 21506 7ff61b736200 21504->21506 21515 7ff61b73c9b0 21505->21515 21570 7ff61b74dbac AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 21506->21570 21516 7ff61b7361e0 58 API calls 21515->21516 21517 7ff61b73c9bb 21516->21517 21518 7ff61b73c9cc EnterCriticalSection 21517->21518 21519 7ff61b73c9c4 21517->21519 21520 7ff61b73c9e9 GdiplusStartup 21518->21520 21521 7ff61b73ca23 LeaveCriticalSection 21518->21521 21519->21463 21520->21521 21521->21463 21523 7ff61b73c385 GdipGetImageHeight 21522->21523 21525 7ff61b73c40f GdipGetImageWidth 21523->21525 21526 7ff61b73c402 21523->21526 21527 7ff61b73c424 21525->21527 21526->21525 21571 7ff61b73c160 21527->21571 21529 7ff61b73c445 21530 7ff61b73c449 __std_exception_destroy 21529->21530 21531 7ff61b73c461 GdipGetImagePaletteSize 21529->21531 21547 7ff61b73c5fc 21529->21547 21530->21470 21532 7ff61b73c47a std::_Locinfo::_Locinfo_ctor 21531->21532 21532->21530 21539 7ff61b73c4e7 GdipGetImagePalette 21532->21539 21533 7ff61b73c6e2 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 21533->21530 21534 7ff61b73c622 GdipBitmapLockBits 21534->21530 21535 7ff61b73c66a BuildCatchObjectHelperInternal 21534->21535 21536 7ff61b73c6c4 GdipBitmapUnlockBits 21535->21536 21537 7ff61b73c78d memcpy_s 21535->21537 21536->21530 21578 7ff61b758afc 11 API calls _Wcrtomb 21537->21578 21546 7ff61b73c4fb 21539->21546 21540 7ff61b73c799 21579 7ff61b753d38 47 API calls _invalid_parameter_noinfo_noreturn 21540->21579 21542 7ff61b73c7a4 21580 7ff61b7310f0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 21542->21580 21545 7ff61b73c5aa SetDIBColorTable 21545->21547 21548 7ff61b73c5c4 SelectObject 21545->21548 21546->21530 21546->21545 21576 7ff61b736280 56 API calls 21546->21576 21547->21533 21547->21534 21577 7ff61b736280 56 API calls 21548->21577 21551 7ff61b73c564 21553 7ff61b73c58e SelectObject 21551->21553 21554 7ff61b73c586 CreateCompatibleDC 21551->21554 21552 7ff61b73c5db 21552->21547 21555 7ff61b73c5f3 DeleteDC 21552->21555 21553->21545 21554->21553 21555->21547 21557 7ff61b73c9b0 61 API calls 21556->21557 21558 7ff61b73c7d4 21557->21558 21559 7ff61b73c7dc GdipGetImageEncodersSize 21558->21559 21560 7ff61b73c992 21558->21560 21559->21560 21562 7ff61b73c7f2 std::_Locinfo::_Locinfo_ctor 21559->21562 21560->21480 21561 7ff61b73c86b GdipGetImageEncoders 21563 7ff61b73c861 __std_exception_destroy 21561->21563 21564 7ff61b73c87f 21561->21564 21562->21561 21562->21563 21563->21480 21564->21563 21565 7ff61b73c8f1 GdipCreateBitmapFromScan0 21564->21565 21566 7ff61b73c923 GdipCreateBitmapFromHBITMAP 21564->21566 21567 7ff61b73c933 GdipSaveImageToStream 21565->21567 21566->21567 21568 7ff61b73c951 GdipDisposeImage 21567->21568 21569 7ff61b73c95e GdipDisposeImage 21567->21569 21568->21563 21569->21563 21572 7ff61b73c19b memcpy_s 21571->21572 21573 7ff61b73c202 CreateDIBSection 21572->21573 21575 7ff61b73c249 __std_exception_destroy 21572->21575 21574 7ff61b73c227 GetObjectW 21573->21574 21573->21575 21574->21575 21575->21529 21576->21551 21577->21552 21578->21540 21579->21542 21581->21426 21582->21428 21583->21426 21593 7ff61b75ebe8 GetLastError 21584->21593 21586 7ff61b7588d0 ExitThread 21587 7ff61b7588a5 21590 7ff61b7588b9 21587->21590 21591 7ff61b7588b3 CloseHandle 21587->21591 21588 7ff61b758889 21588->21586 21588->21587 21610 7ff61b7610fc 5 API calls std::_Lockit::_Lockit 21588->21610 21590->21586 21592 7ff61b7588c7 FreeLibraryAndExitThread 21590->21592 21591->21590 21592->21586 21594 7ff61b75ec29 FlsSetValue 21593->21594 21596 7ff61b75ec0c 21593->21596 21595 7ff61b75ec3b 21594->21595 21600 7ff61b75ec19 21594->21600 21598 7ff61b760788 _Wcrtomb 5 API calls 21595->21598 21596->21594 21596->21600 21597 7ff61b75ec95 SetLastError 21597->21588 21599 7ff61b75ec4a 21598->21599 21601 7ff61b75ec68 FlsSetValue 21599->21601 21602 7ff61b75ec58 FlsSetValue 21599->21602 21600->21597 21604 7ff61b75ec86 21601->21604 21605 7ff61b75ec74 FlsSetValue 21601->21605 21603 7ff61b75ec61 21602->21603 21606 7ff61b75e6bc __free_lconv_mon 5 API calls 21603->21606 21611 7ff61b75e820 11 API calls _Wcrtomb 21604->21611 21605->21603 21606->21600 21608 7ff61b75ec8e 21609 7ff61b75e6bc __free_lconv_mon 5 API calls 21608->21609 21609->21597 21610->21587 21611->21608 22232 7ff61b76cf14 57 API calls 2 library calls 22305 7ff61b735410 36 API calls 22306 7ff61b73d410 360 API calls 6 library calls 22307 7ff61b75cc10 GetCommandLineA GetCommandLineW 22308 7ff61b73e217 TerminateThread CloseHandle 22309 7ff61b739220 GetModuleFileNameW GetCommandLineW GetStartupInfoW CreateProcessW ExitProcess 22310 7ff61b73c020 GdipCloneImage GdipAlloc 22311 7ff61b73e01f 71 API calls memcpy_s 22235 7ff61b73ef25 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 22236 7ff61b73b331 17 API calls 22237 7ff61b731130 HeapAlloc 22239 7ff61b741b30 50 API calls 22240 7ff61b765d34 56 API calls 2 library calls 22315 7ff61b76ea30 WSACleanup 22316 7ff61b74e13c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22318 7ff61b761338 FreeLibrary 22241 7ff61b731040 GetTickCount 22242 7ff61b735640 40 API calls 22319 7ff61b731140 HeapFree 22320 7ff61b76a544 67 API calls 22321 7ff61b741340 HeapFree HeapDestroy HeapCreate HeapDestroy __std_exception_destroy 22322 7ff61b739740 83 API calls 22324 7ff61b73cd40 88 API calls 3 library calls 22243 7ff61b73de3f 55 API calls 4 library calls 22245 7ff61b765040 60 API calls 4 library calls 22246 7ff61b73e248 7 API calls 22330 7ff61b76714c 54 API calls 5 library calls 22247 7ff61b73dc4d 56 API calls 4 library calls 22331 7ff61b760748 12 API calls 22249 7ff61b76ea50 DeleteDC DeleteDC DeleteDC DeleteDC 22251 7ff61b731058 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 22334 7ff61b75ab5c 7 API calls 22253 7ff61b76cc64 CloseHandle 22335 7ff61b731160 HeapReAlloc 22336 7ff61b73f160 52 API calls 5 library calls 22338 7ff61b75bb69 63 API calls 22339 7ff61b73e36a OpenEventLogW ClearEventLogW CloseEventLog 22340 7ff61b760368 17 API calls 2 library calls 22258 7ff61b731470 VirtualFree 22259 7ff61b734470 164 API calls std::_Locinfo::_Locinfo_ctor 22261 7ff61b731078 InitializeCriticalSectionEx shared_ptr 22343 7ff61b74f77c 60 API calls _CreateFrameInfo 22263 7ff61b731a80 LeaveCriticalSection 22264 7ff61b73c080 64 API calls 22265 7ff61b73be80 12 API calls _Wcrtomb 22267 7ff61b760488 80 API calls __free_lconv_mon 22348 7ff61b73bd90 13 API calls 22270 7ff61b73e697 79 API calls 4 library calls 22272 7ff61b76549c GetProcessHeap 22273 7ff61b7354a0 70 API calls 22351 7ff61b76eba4 DecodePointer 22352 7ff61b7311a0 HeapSize 22274 7ff61b740ca0 15 API calls BuildCatchObjectHelperInternal 22353 7ff61b74dfa4 48 API calls 2 library calls 22356 7ff61b73efa3 RegOpenKeyExW RegDeleteValueW RegCloseKey 22357 7ff61b767ba0 57 API calls 4 library calls 22358 7ff61b7525aa 57 API calls 2 library calls 22359 7ff61b7311b0 HeapDestroy 22360 7ff61b74c7b4 DeleteCriticalSection __std_exception_destroy 22278 7ff61b76eab0 EnterCriticalSection GdiplusShutdown LeaveCriticalSection 22280 7ff61b74d0b0 7 API calls __std_exception_destroy

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff61b7362f0-7ff61b736344 call 7ff61b74e4e0 call 7ff61b74de98 call 7ff61b76d7b0 7 7ff61b736346-7ff61b736359 call 7ff61b7587a0 0->7 8 7ff61b73635e-7ff61b7363ac call 7ff61b76d7b0 gethostname gethostbyname 0->8 7->8 12 7ff61b73644f-7ff61b736538 MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 LoadLibraryW 8->12 13 7ff61b7363b2-7ff61b7363fc inet_ntoa call 7ff61b758f58 * 2 8->13 15 7ff61b73665c-7ff61b736697 GetSystemInfo wsprintfW 12->15 16 7ff61b73653e-7ff61b736551 GetProcAddress 12->16 13->12 29 7ff61b7363fe 13->29 17 7ff61b7366a0-7ff61b7366bf GetDriveTypeW 15->17 19 7ff61b736557-7ff61b7365e5 call 7ff61b733670 call 7ff61b74ded4 call 7ff61b7391a0 16->19 20 7ff61b736653-7ff61b736656 FreeLibrary 16->20 21 7ff61b7366f8-7ff61b7366fd 17->21 22 7ff61b7366c1-7ff61b7366f5 GetDiskFreeSpaceExW 17->22 45 7ff61b7365e7 19->45 46 7ff61b7365ed-7ff61b736620 RegOpenKeyExW RegQueryValueExW 19->46 20->15 21->17 25 7ff61b7366ff-7ff61b7367a2 GlobalMemoryStatusEx call 7ff61b733670 * 2 call 7ff61b738e00 GetForegroundWindow 21->25 22->21 47 7ff61b7367ba-7ff61b7367fd lstrlenW call 7ff61b738cd0 25->47 48 7ff61b7367a4-7ff61b7367b4 GetWindowTextW 25->48 32 7ff61b736400-7ff61b73644d inet_ntoa call 7ff61b758f58 * 2 29->32 32->12 45->46 49 7ff61b736640-7ff61b73664e RegCloseKey call 7ff61b74de64 46->49 50 7ff61b736622-7ff61b736624 46->50 56 7ff61b7367ff-7ff61b73681d GetLocalTime wsprintfW 47->56 57 7ff61b736823-7ff61b736862 call 7ff61b7587a0 lstrlenW call 7ff61b738cd0 47->57 48->47 49->20 50->49 52 7ff61b736626-7ff61b73663b call 7ff61b759248 50->52 52->49 56->57 62 7ff61b736878-7ff61b7368ab GetModuleHandleW GetProcAddress 57->62 63 7ff61b736864-7ff61b736873 call 7ff61b7587a0 57->63 65 7ff61b7368ad-7ff61b7368af GetNativeSystemInfo 62->65 66 7ff61b7368b1 GetSystemInfo 62->66 63->62 67 7ff61b7368b7-7ff61b7368c3 65->67 66->67 68 7ff61b7368d1 67->68 69 7ff61b7368c5-7ff61b7368cf 67->69 70 7ff61b7368d6-7ff61b736916 wsprintfW call 7ff61b738ad0 GetCurrentProcessId 68->70 69->68 69->70 73 7ff61b73691c-7ff61b736937 OpenProcess 70->73 74 7ff61b736a5e-7ff61b736a8f CoInitializeEx CoCreateInstance 70->74 75 7ff61b736a57 73->75 76 7ff61b73693d-7ff61b736955 K32GetProcessImageFileNameW 73->76 77 7ff61b736b8f 74->77 78 7ff61b736a95-7ff61b736aaa 74->78 75->74 79 7ff61b73695b-7ff61b73696f GetLogicalDriveStringsW 76->79 80 7ff61b736a4e-7ff61b736a51 CloseHandle 76->80 81 7ff61b736b96-7ff61b736bef call 7ff61b7587a0 call 7ff61b76d7b0 RegOpenKeyExW 77->81 82 7ff61b736ab0-7ff61b736ab2 78->82 83 7ff61b736a3e-7ff61b736a48 lstrcpyW 79->83 84 7ff61b736975-7ff61b73697e 79->84 80->75 96 7ff61b736bf5-7ff61b736c4f RegQueryInfoKeyW 81->96 97 7ff61b736d52-7ff61b736d62 lstrlenW 81->97 82->77 86 7ff61b736ab8-7ff61b736ae5 82->86 83->80 84->83 87 7ff61b736984-7ff61b73698b 84->87 105 7ff61b736aeb 86->105 106 7ff61b736b7e-7ff61b736b8d CoUninitialize 86->106 89 7ff61b736990-7ff61b7369b0 lstrcmpiW 87->89 92 7ff61b736a2e-7ff61b736a38 89->92 93 7ff61b7369b2-7ff61b7369c4 lstrcmpiW 89->93 92->83 92->89 93->92 95 7ff61b7369c6-7ff61b7369fe QueryDosDeviceW 93->95 95->80 99 7ff61b736a00-7ff61b736a28 lstrlenW call 7ff61b7590ac 95->99 100 7ff61b736c55-7ff61b736c67 96->100 101 7ff61b736d82-7ff61b736e7d call 7ff61b7379e0 call 7ff61b759248 GetTickCount call 7ff61b758b9c call 7ff61b758f10 wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 96->101 97->101 102 7ff61b736d64-7ff61b736d7d call 7ff61b759248 97->102 99->92 115 7ff61b736e8d-7ff61b736eb1 lstrcpyW lstrcatW 99->115 100->97 108 7ff61b736c6d-7ff61b736c70 100->108 137 7ff61b736eb6 101->137 138 7ff61b736e7f-7ff61b736e8b 101->138 102->101 111 7ff61b736af0-7ff61b736b13 105->111 106->77 106->81 108->97 109 7ff61b736c76-7ff61b736c8f call 7ff61b76d7b0 108->109 119 7ff61b736d47-7ff61b736d4c RegCloseKey 109->119 120 7ff61b736c95 109->120 122 7ff61b736b4d-7ff61b736b78 111->122 123 7ff61b736b15-7ff61b736b34 111->123 115->80 119->97 124 7ff61b736ca0-7ff61b736cf5 call 7ff61b76d7b0 RegEnumKeyExW lstrlenW 120->124 122->106 122->111 132 7ff61b736b36-7ff61b736b3c SysFreeString 123->132 133 7ff61b736b42-7ff61b736b47 123->133 135 7ff61b736d39-7ff61b736d41 124->135 136 7ff61b736cf7-7ff61b736d07 lstrlenW 124->136 132->133 133->122 135->119 135->124 136->135 139 7ff61b736d09-7ff61b736d34 call 7ff61b758b24 * 2 136->139 140 7ff61b736ebb-7ff61b736f0d call 7ff61b737250 lstrlenW call 7ff61b738cd0 137->140 138->140 139->135 148 7ff61b736fe7-7ff61b736ffb CreateToolhelp32Snapshot 140->148 149 7ff61b736f13-7ff61b736f96 GetLocalTime wsprintfW RegOpenKeyExW RegDeleteValueW RegCloseKey RegCreateKeyW 140->149 152 7ff61b737088 148->152 153 7ff61b737001-7ff61b737031 call 7ff61b76d7b0 Process32FirstW 148->153 150 7ff61b736f98-7ff61b736fcb lstrlenW RegSetValueExW 149->150 151 7ff61b736fda-7ff61b736fe1 RegCloseKey 149->151 150->151 155 7ff61b736fcd-7ff61b736fd4 RegCloseKey 150->155 151->148 154 7ff61b73708a-7ff61b7370a5 CreateToolhelp32Snapshot 152->154 153->152 161 7ff61b737033-7ff61b73703a 153->161 157 7ff61b737138 154->157 158 7ff61b7370ab-7ff61b7370db call 7ff61b76d7b0 Process32FirstW 154->158 155->151 162 7ff61b73713a-7ff61b737155 CreateToolhelp32Snapshot 157->162 158->157 167 7ff61b7370dd-7ff61b7370e8 158->167 164 7ff61b737040-7ff61b73704f 161->164 165 7ff61b73715b-7ff61b73718b call 7ff61b76d7b0 Process32FirstW 162->165 166 7ff61b7371ff-7ff61b737219 call 7ff61b733e30 162->166 168 7ff61b737050-7ff61b73705a 164->168 165->166 175 7ff61b73718d-7ff61b737198 165->175 171 7ff61b73721c-7ff61b737240 call 7ff61b74de64 166->171 170 7ff61b7370f0-7ff61b7370fe 167->170 172 7ff61b73705c-7ff61b737064 168->172 173 7ff61b737074-7ff61b737086 Process32NextW 168->173 176 7ff61b737100-7ff61b73710a 170->176 178 7ff61b7371e6-7ff61b7371eb 172->178 179 7ff61b73706a-7ff61b737072 172->179 173->152 173->164 180 7ff61b7371a0-7ff61b7371ae 175->180 181 7ff61b73710c-7ff61b737114 176->181 182 7ff61b737124-7ff61b737136 Process32NextW 176->182 178->154 179->168 179->173 184 7ff61b7371b0-7ff61b7371ba 180->184 185 7ff61b73711a-7ff61b737122 181->185 186 7ff61b7371f0-7ff61b7371f5 181->186 182->157 182->170 187 7ff61b7371bc-7ff61b7371c4 184->187 188 7ff61b7371d0-7ff61b7371e2 Process32NextW 184->188 185->176 185->182 186->162 189 7ff61b7371c6-7ff61b7371ce 187->189 190 7ff61b7371fa 187->190 188->180 191 7ff61b7371e4 188->191 189->184 189->188 190->166 191->166
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process32lstrlen$CloseCreateInfo$Systemwsprintf$ByteCharFirstHandleMultiNextOpenSnapshotTimeToolhelp32Wide$AddressFreeProcProcessQueryValue$Concurrency::cancel_current_taskCountCurrentDriveFileInstanceLibraryLocalModuleNativeTickWindow_invalid_parameter_noinfoinet_ntoalstrcmpi$DeleteDeviceDirectoryDiskEnumForegroundGlobalImageInitializeInputLastLoadLocaleLogicalMemoryNameProfileSpaceStatusStringStringsTextTypeUninitializegethostbynamegethostnamelstrcpy
            • String ID: %d min$%d.%d$%d.%d.%d$%sFree%d Gb $A:\$AppEvents$B:\$FriendlyName$GetNativeSystemInfo$HDD:%d$INSTALLTIME$Network$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Software$Software\Tencent\Plugin\VAS$Telegram.exe$VenGROUP$VenNetwork$VenREMARK$WeChat.exe$WxWork.exe$X64 %s$d91774dd-ee7f-4c3d-8560-05242810d920$kernel32.dll$ntdll.dll$x64$x86
            • API String ID: 4136965836-1533849582
            • Opcode ID: 43d19849282b6b05c610e9ddc3815cd0487b65068ac44ff9c992812d734889d8
            • Instruction ID: b7d21ad75c5670fc6901f01381a31530baf417c159b9c34578887d7c5f89211e
            • Opcode Fuzzy Hash: 43d19849282b6b05c610e9ddc3815cd0487b65068ac44ff9c992812d734889d8
            • Instruction Fuzzy Hash: 2E924132A08E9286FB24DF25D8446E92361FB88B64F846132DA5D877B4EF7CD64DC700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 193 7ff61b74b500-7ff61b74b541 call 7ff61b759c1c SleepEx 196 7ff61b74b573-7ff61b74b57a 193->196 197 7ff61b74b543-7ff61b74b56d call 7ff61b74de98 call 7ff61b758940 CloseHandle 193->197 198 7ff61b74b64f-7ff61b74b759 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 7ff61b758940 CloseHandle call 7ff61b74de98 call 7ff61b7336e0 call 7ff61b74ad80 AllocateAndInitializeSid 196->198 199 7ff61b74b580-7ff61b74b59d GetCurrentProcess OpenProcessToken 196->199 197->196 215 7ff61b74b75b-7ff61b74b773 CheckTokenMembership 198->215 216 7ff61b74b789-7ff61b74b790 198->216 201 7ff61b74b5f4-7ff61b74b617 GetModuleHandleA GetProcAddress 199->201 202 7ff61b74b59f-7ff61b74b5ee LookupPrivilegeValueW AdjustTokenPrivileges CloseHandle 199->202 201->198 205 7ff61b74b619-7ff61b74b64a GetCurrentProcessId OpenProcess 201->205 202->201 205->198 217 7ff61b74b77c-7ff61b74b783 FreeSid 215->217 218 7ff61b74b775 215->218 219 7ff61b74b80d-7ff61b74b81b 216->219 220 7ff61b74b792-7ff61b74b807 RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 216->220 217->216 218->217 221 7ff61b74b820-7ff61b74b833 219->221 220->219 222 7ff61b74b835-7ff61b74b85f call 7ff61b7587a0 * 2 221->222 223 7ff61b74b861-7ff61b74b885 call 7ff61b7587a0 * 2 221->223 232 7ff61b74b88b-7ff61b74b8b4 222->232 223->232 233 7ff61b74b8b6-7ff61b74b8f2 call 7ff61b7587a0 * 2 232->233 234 7ff61b74b8f9-7ff61b74b903 232->234 233->234 236 7ff61b74b90a-7ff61b74b955 call 7ff61b759c1c SleepEx call 7ff61b759c1c call 7ff61b733820 234->236 237 7ff61b74b905 234->237 236->221 246 7ff61b74b95b-7ff61b74ba18 call 7ff61b759c1c CreateEventA call 7ff61b7587a0 call 7ff61b7362f0 236->246 237->236 253 7ff61b74ba1d-7ff61b74ba20 246->253 254 7ff61b74ba22-7ff61b74ba2e 253->254 255 7ff61b74ba30 253->255 261 7ff61b74ba7e-7ff61b74ba8d 254->261 256 7ff61b74ba33-7ff61b74ba3a 255->256 258 7ff61b74ba3c-7ff61b74ba4c Sleep 256->258 259 7ff61b74ba65-7ff61b74ba6c 256->259 258->256 260 7ff61b74ba4e-7ff61b74ba55 258->260 263 7ff61b74ba72-7ff61b74ba7d Sleep 259->263 260->259 262 7ff61b74ba57-7ff61b74ba63 260->262 264 7ff61b74bad5-7ff61b74bae4 CloseHandle 261->264 265 7ff61b74ba8f-7ff61b74baa7 261->265 262->263 263->261 264->221 266 7ff61b74baa9-7ff61b74babc 265->266 267 7ff61b74babe-7ff61b74bace call 7ff61b74de64 265->267 266->267 269 7ff61b74bae9-7ff61b74bb04 call 7ff61b753d58 IsDebuggerPresent 266->269 267->264 274 7ff61b74bb06-7ff61b74bb10 269->274 275 7ff61b74bb11-7ff61b74bb34 LoadLibraryW 269->275 276 7ff61b74bb36-7ff61b74bb3b 275->276 277 7ff61b74bb40-7ff61b74bb5e GetProcAddress 275->277 278 7ff61b74bcae-7ff61b74bcc8 276->278 279 7ff61b74bb73-7ff61b74bc25 call 7ff61b76d7b0 GetLocalTime wsprintfW CreateFileW 277->279 280 7ff61b74bb60-7ff61b74bb6e FreeLibrary 277->280 284 7ff61b74bc27-7ff61b74bc33 FreeLibrary 279->284 285 7ff61b74bc35-7ff61b74bc90 GetCurrentThreadId GetCurrentProcessId GetCurrentProcess CloseHandle FreeLibrary 279->285 281 7ff61b74bca6 280->281 281->278 286 7ff61b74bc96-7ff61b74bc9e 284->286 285->286 286->281
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseHandle$ProcessSleep$OpenTokenValue$AddressByteCharCurrentFreeLibraryMultiProcWide_invalid_parameter_noinfoinet_ntoa$AdjustAllocateCheckCreateDebuggerDeleteEventExceptionFilterInitializeLoadLocalLookupMembershipModulePresentPrivilegePrivilegesTimeUnhandled_invalid_parameter_noinfo_noreturngethostbynamegethostnamewsprintf
            • String ID: !analyze -v$%4d.%2d.%2d-%2d:%2d:%2d$%s-%04d%02d%02d-%02d%02d%02d.dmp$10443$192.238.134.52$192.238.134.52$192.238.134.52$192.238.134.52$4433$4433$DbgHelp.dll$MiniDumpWriteDump$NtDll.dll$NtSetInformationProcess$SOFTWARE$SeDebugPrivilege$VenkernalData_info$loginconfig
            • API String ID: 905065789-3740111702
            • Opcode ID: 2290415987536a99476877d9ea12a47fc619f31b1382f2d977d81a2622406585
            • Instruction ID: 2b712bdbfe26e2ed145d2c19646344af984c8d98456e329e4c0ba167494aa29b
            • Opcode Fuzzy Hash: 2290415987536a99476877d9ea12a47fc619f31b1382f2d977d81a2622406585
            • Instruction Fuzzy Hash: 7B221B72A08F8286E720AF21E8442A977A5FB8CB65F502535DA4DC7AB4DF3CE54DD700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 289 7ff61b73f410-7ff61b73f49f call 7ff61b74de98 call 7ff61b76d7b0 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 294 7ff61b73f4a1-7ff61b73f4ae GetWindowTextW 289->294 295 7ff61b73f4b4-7ff61b73f4d6 CreateToolhelp32Snapshot 289->295 294->295 296 7ff61b73f4d8-7ff61b73f4ff call 7ff61b76d7b0 Process32FirstW 295->296 297 7ff61b73f555 295->297 296->297 303 7ff61b73f501-7ff61b73f508 296->303 299 7ff61b73f557-7ff61b73f571 CreateToolhelp32Snapshot 297->299 301 7ff61b73f5f8 299->301 302 7ff61b73f577-7ff61b73f5a7 call 7ff61b76d7b0 Process32FirstW 299->302 304 7ff61b73f5fa-7ff61b73f614 CreateToolhelp32Snapshot 301->304 302->301 313 7ff61b73f5a9 302->313 306 7ff61b73f510-7ff61b73f517 303->306 307 7ff61b73f6a8 304->307 308 7ff61b73f61a-7ff61b73f64a call 7ff61b76d7b0 Process32FirstW 304->308 311 7ff61b73f520-7ff61b73f52a 306->311 310 7ff61b73f6aa-7ff61b73f6f4 RegOpenKeyExW 307->310 308->307 325 7ff61b73f64c-7ff61b73f657 308->325 315 7ff61b73f6fa-7ff61b73f72e RegQueryValueExW 310->315 316 7ff61b73f913-7ff61b73f94b RegOpenKeyExW 310->316 317 7ff61b73f52c-7ff61b73f534 311->317 318 7ff61b73f544-7ff61b73f553 Process32NextW 311->318 314 7ff61b73f5b0-7ff61b73f5ba 313->314 320 7ff61b73f5c0-7ff61b73f5ca 314->320 321 7ff61b73f908-7ff61b73f90d RegCloseKey 315->321 322 7ff61b73f734-7ff61b73f78b call 7ff61b74ded4 call 7ff61b76d7b0 RegQueryValueExW 315->322 326 7ff61b73f951-7ff61b73f984 RegQueryValueExW 316->326 327 7ff61b73f9f2-7ff61b73fa2a RegOpenKeyExW 316->327 323 7ff61b73f53a-7ff61b73f542 317->323 324 7ff61b73f7f2-7ff61b73f7f4 317->324 318->297 318->306 328 7ff61b73f5cc-7ff61b73f5d4 320->328 329 7ff61b73f5e4-7ff61b73f5f6 Process32NextW 320->329 321->316 322->321 360 7ff61b73f791-7ff61b73f7b9 call 7ff61b741390 322->360 323->311 323->318 324->299 333 7ff61b73f660-7ff61b73f66a 325->333 334 7ff61b73f9e7-7ff61b73f9ec RegCloseKey 326->334 335 7ff61b73f986-7ff61b73f9dd call 7ff61b74ded4 call 7ff61b76d7b0 RegQueryValueExW 326->335 331 7ff61b73fad1-7ff61b73fb87 SHGetFolderPathW lstrcatW CreateFileW lstrlenW WriteFile CloseHandle FindFirstFileW 327->331 332 7ff61b73fa30-7ff61b73fa63 RegQueryValueExW 327->332 339 7ff61b73f7f9-7ff61b73f7fb 328->339 340 7ff61b73f5da-7ff61b73f5e2 328->340 329->301 329->314 336 7ff61b73fb89 331->336 337 7ff61b73fb91-7ff61b73fbdc FindClose call 7ff61b73fd10 331->337 342 7ff61b73fac6-7ff61b73facb RegCloseKey 332->342 343 7ff61b73fa65-7ff61b73fabc call 7ff61b74ded4 call 7ff61b76d7b0 RegQueryValueExW 332->343 344 7ff61b73f670-7ff61b73f67a 333->344 334->327 335->334 362 7ff61b73f9df 335->362 336->337 358 7ff61b73fbf8-7ff61b73fc20 call 7ff61b74ded4 337->358 359 7ff61b73fbde-7ff61b73fbe2 337->359 339->304 340->320 340->329 342->331 343->342 369 7ff61b73fabe 343->369 349 7ff61b73f67c-7ff61b73f684 344->349 350 7ff61b73f694-7ff61b73f6a6 Process32NextW 344->350 355 7ff61b73f68a-7ff61b73f692 349->355 356 7ff61b73f800-7ff61b73f802 349->356 350->307 350->333 355->344 355->350 356->310 370 7ff61b73fc23-7ff61b73fc7c 358->370 359->358 363 7ff61b73fbe4-7ff61b73fbf1 359->363 371 7ff61b73f7bf-7ff61b73f7ca 360->371 372 7ff61b73f845-7ff61b73f855 360->372 362->334 363->358 369->342 370->370 375 7ff61b73fc7e-7ff61b73fcac call 7ff61b76d110 370->375 376 7ff61b73f7d0-7ff61b73f7d9 371->376 373 7ff61b73f857-7ff61b73f85e 372->373 374 7ff61b73f8cd-7ff61b73f8d1 372->374 378 7ff61b73f862-7ff61b73f86b 373->378 374->321 377 7ff61b73f8d3-7ff61b73f8e5 374->377 389 7ff61b73fcbe-7ff61b73fcc1 375->389 390 7ff61b73fcae-7ff61b73fcbb call 7ff61b733e30 375->390 376->372 380 7ff61b73f7db 376->380 381 7ff61b73f8e7-7ff61b73f8fa 377->381 382 7ff61b73f900-7ff61b73f903 call 7ff61b74de64 377->382 378->374 383 7ff61b73f86d 378->383 385 7ff61b73f7e0-7ff61b73f7e4 380->385 381->382 386 7ff61b73fcfe-7ff61b73fd03 call 7ff61b753d58 381->386 382->321 388 7ff61b73f870-7ff61b73f874 383->388 391 7ff61b73f807-7ff61b73f80a 385->391 392 7ff61b73f7e6-7ff61b73f7ee 385->392 398 7ff61b73f876-7ff61b73f87e 388->398 399 7ff61b73f88b-7ff61b73f88e 388->399 394 7ff61b73fccb-7ff61b73fcf4 call 7ff61b74de64 389->394 395 7ff61b73fcc3-7ff61b73fcc6 call 7ff61b74de64 389->395 390->389 391->372 396 7ff61b73f80c-7ff61b73f81c 391->396 392->385 393 7ff61b73f7f0 392->393 393->372 395->394 403 7ff61b73f820-7ff61b73f826 396->403 398->388 405 7ff61b73f880 398->405 399->374 401 7ff61b73f890-7ff61b73f89d 399->401 406 7ff61b73f8a0-7ff61b73f8a6 401->406 408 7ff61b73f828-7ff61b73f834 403->408 409 7ff61b73f882-7ff61b73f886 403->409 405->374 410 7ff61b73f8ac-7ff61b73f8b8 406->410 411 7ff61b73fcf5-7ff61b73fcf9 406->411 408->403 412 7ff61b73f836-7ff61b73f83f 408->412 409->376 410->406 413 7ff61b73f8ba-7ff61b73f8c3 410->413 411->378 412->372 414 7ff61b73f8c5 412->414 413->374 413->414 414->374
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process32QueryValue$Close$CreateFirst$FileNextOpenSnapshotToolhelp32$Concurrency::cancel_current_taskFindWindow$CountFolderForegroundHandleInfoInputLastPathTextTickWrite_invalid_parameter_noinfo_noreturnlstrcatlstrlenwsprintf
            • String ID: %d min$C:\ProgramData\Mylnk$C:\Users$OpenAi_Service$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$Startup$Telegram.exe$WXWork.exe$WeChat.exe$\kernelquick.sys
            • API String ID: 3029130142-1423135667
            • Opcode ID: e62539a16d3ca5b5cc7c3476556dc898a7606d9ab66eaf610e565dd4e6f3647a
            • Instruction ID: 0c2d1506b1fb73a6deb91ee6ea83eb8f91439260e35860d1d0f14a773a7c094a
            • Opcode Fuzzy Hash: e62539a16d3ca5b5cc7c3476556dc898a7606d9ab66eaf610e565dd4e6f3647a
            • Instruction Fuzzy Hash: 4232A322A08E8285EB20DF25D8146BD77A0FB59FA4F846131DA9D8B7B5DF7CE548C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: lstrlen$QueryValue$Open
            • String ID: 10443$192.238.134.52$192.238.134.52$192.238.134.52$4433$Console$Vendata$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
            • API String ID: 1772312705-2005200276
            • Opcode ID: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
            • Instruction ID: 3b56a328266204bbe73e897a27f93b5cad294b39df741314edc7bbc2556a74f4
            • Opcode Fuzzy Hash: c599fbb0e57935ebe8c3f9b158b0f14cad8e83e9b9ac755a95a7fb9a9d72626c
            • Instruction Fuzzy Hash: 4F22B161E18E6B81FB24AB14E5546797361EF9CF66F816031C64EC2AB1EF7CE54D8300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 567 7ff61b73fd10-7ff61b73fd3a GetVersion 568 7ff61b73fd40 567->568 569 7ff61b740284-7ff61b74028f 567->569 570 7ff61b73fd4c-7ff61b73fdf8 GetDesktopWindow GetDC CreateCompatibleDC GetDC GetDeviceCaps * 2 ReleaseDC 568->570 571 7ff61b73fd42-7ff61b73fd46 568->571 572 7ff61b73fdfa-7ff61b73fe09 570->572 573 7ff61b73fe0e-7ff61b73fe2c GetSystemMetrics 570->573 571->569 571->570 574 7ff61b73fe97-7ff61b7400db GetSystemMetrics * 2 CreateCompatibleBitmap SelectObject SetStretchBltMode GetSystemMetrics * 2 StretchBlt call 7ff61b74ded4 call 7ff61b76d7b0 GetDIBits call 7ff61b74ded4 call 7ff61b76d7b0 call 7ff61b76d110 call 7ff61b74de98 call 7ff61b7402a0 572->574 575 7ff61b73fe78-7ff61b73fe93 GetSystemMetrics 573->575 576 7ff61b73fe2e-7ff61b73fe76 GetSystemMetrics 573->576 591 7ff61b7401b1-7ff61b7401e1 call 7ff61b74ded4 574->591 592 7ff61b7400e1-7ff61b74011b DeleteObject * 2 ReleaseDC call 7ff61b74de64 * 2 574->592 575->574 576->574 597 7ff61b7401e6-7ff61b740221 call 7ff61b76d110 DeleteObject * 2 ReleaseDC call 7ff61b74de64 * 2 591->597 598 7ff61b7401e3 591->598 603 7ff61b74014d-7ff61b7401b0 call 7ff61b74de64 592->603 604 7ff61b74011d-7ff61b74012a 592->604 617 7ff61b740226-7ff61b74022e 597->617 598->597 607 7ff61b740148 call 7ff61b74de64 604->607 608 7ff61b74012c-7ff61b74013f 604->608 607->603 611 7ff61b740290-7ff61b740295 call 7ff61b753d58 608->611 612 7ff61b740145 608->612 612->607 618 7ff61b74025c-7ff61b74027c call 7ff61b74de64 617->618 619 7ff61b740230-7ff61b74023d 617->619 618->569 621 7ff61b740257 call 7ff61b74de64 619->621 622 7ff61b74023f-7ff61b740252 619->622 621->618 622->611 625 7ff61b740254 622->625 625->621
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: MetricsSystem$Object$CapsCompatibleCreateDeleteDeviceReleaseStretch$BitmapBitsDesktopModeSelectVersionWindow_invalid_parameter_noinfo_noreturn
            • String ID: $($6$gfff$gfff
            • API String ID: 3905184151-2922166585
            • Opcode ID: 9eafb342d491789966fcdb852ac60d50250fc806a3a0662fbf213cd29233fd2c
            • Instruction ID: d9193f6ea500915ca4fe90f18b52c15151e89e6dbf88a5e063a21d0eb949ef55
            • Opcode Fuzzy Hash: 9eafb342d491789966fcdb852ac60d50250fc806a3a0662fbf213cd29233fd2c
            • Instruction Fuzzy Hash: 0AE1B272A18BC186E7259F25E40436EA3A1FB9DF94F409235DA8D9BB75DF3CD4888700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 626 7ff61b737250-7ff61b7372a6 627 7ff61b7372b0-7ff61b7372b9 626->627 627->627 628 7ff61b7372bb-7ff61b7372c4 627->628 629 7ff61b7372c6-7ff61b7372e0 call 7ff61b76d110 628->629 630 7ff61b7372e2-7ff61b7372e7 call 7ff61b73a300 628->630 634 7ff61b7372ec 629->634 630->634 635 7ff61b7372f3-7ff61b7372fb 634->635 635->635 636 7ff61b7372fd-7ff61b737310 635->636 637 7ff61b737345-7ff61b737355 call 7ff61b73a300 636->637 638 7ff61b737312-7ff61b737343 call 7ff61b76d110 636->638 642 7ff61b73735a 637->642 638->642 643 7ff61b737361-7ff61b73736a 642->643 643->643 644 7ff61b73736c-7ff61b73737f 643->644 645 7ff61b737381-7ff61b7373b2 call 7ff61b76d110 644->645 646 7ff61b7373b4-7ff61b7373c4 call 7ff61b73a300 644->646 650 7ff61b7373c9-7ff61b7373cd 645->650 646->650 651 7ff61b7373d4-7ff61b7373dd 650->651 651->651 652 7ff61b7373df-7ff61b7373f2 651->652 653 7ff61b737427-7ff61b737434 call 7ff61b73a300 652->653 654 7ff61b7373f4-7ff61b737425 call 7ff61b76d110 652->654 658 7ff61b737439-7ff61b73744d 653->658 654->658 659 7ff61b73744f-7ff61b737483 call 7ff61b76d110 658->659 660 7ff61b737485-7ff61b73749f call 7ff61b73a300 658->660 664 7ff61b7374a4-7ff61b7374af 659->664 660->664 665 7ff61b7374b0-7ff61b7374b9 664->665 665->665 666 7ff61b7374bb-7ff61b7374ce 665->666 667 7ff61b7374d0-7ff61b737501 call 7ff61b76d110 666->667 668 7ff61b737503-7ff61b737510 call 7ff61b73a300 666->668 672 7ff61b737515-7ff61b737519 667->672 668->672 673 7ff61b737520-7ff61b737529 672->673 673->673 674 7ff61b73752b-7ff61b73753e 673->674 675 7ff61b737540-7ff61b737571 call 7ff61b76d110 674->675 676 7ff61b737573-7ff61b737580 call 7ff61b73a300 674->676 680 7ff61b737585-7ff61b737634 call 7ff61b749170 call 7ff61b749b00 MultiByteToWideChar * 2 675->680 676->680 685 7ff61b737636-7ff61b737647 680->685 686 7ff61b737663-7ff61b73767d 680->686 687 7ff61b737649-7ff61b73765c 685->687 688 7ff61b73765e call 7ff61b74de64 685->688 689 7ff61b73767f-7ff61b737696 686->689 690 7ff61b7376b2-7ff61b7376d2 686->690 687->688 691 7ff61b7376d9-7ff61b737717 call 7ff61b753d58 CreateMutexExW GetLastError 687->691 688->686 693 7ff61b737698-7ff61b7376ab 689->693 694 7ff61b7376ad call 7ff61b74de64 689->694 701 7ff61b737749-7ff61b737750 691->701 702 7ff61b737719 691->702 693->694 695 7ff61b7376d3-7ff61b7376d8 call 7ff61b753d58 693->695 694->690 695->691 704 7ff61b737756 701->704 705 7ff61b7377f0-7ff61b7378a2 GetModuleHandleW GetConsoleWindow SHGetFolderPathW lstrcatW CreateMutexW WaitForSingleObject CreateFileW GetFileSize CloseHandle 701->705 703 7ff61b737720-7ff61b737747 Sleep CreateMutexW GetLastError 702->703 703->701 703->703 708 7ff61b737760-7ff61b7377c0 lstrlenW call 7ff61b738cd0 704->708 706 7ff61b7378ad-7ff61b7378dd ReleaseMutex DirectInput8Create 705->706 707 7ff61b7378a4-7ff61b7378a7 DeleteFileW 705->707 709 7ff61b737980-7ff61b73799e 706->709 710 7ff61b7378e3-7ff61b737903 706->710 707->706 713 7ff61b7377d8-7ff61b7377ea SleepEx 708->713 714 7ff61b7377c2-7ff61b7377d6 lstrcmpW 708->714 710->709 716 7ff61b737905-7ff61b73791b 710->716 713->705 713->708 714->705 714->713 716->709 718 7ff61b73791d-7ff61b737935 716->718 718->709 720 7ff61b737937-7ff61b73796d 718->720 720->709 722 7ff61b73796f-7ff61b73797e 720->722 722->709 724 7ff61b73799f-7ff61b7379d1 GetTickCount GetKeyState call 7ff61b73adb0 722->724
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ByteCharMultiWide$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID: <$X64$\DisplaySessionContainers.log$key$open
            • API String ID: 143101810-941791203
            • Opcode ID: b6f9b1fd57430f77313be91243793a102745fc176dedbb318d5ad7af9560adf6
            • Instruction ID: 6bdadda156e59779c17a5829eadf98f8cbb69fef212ab4da5ce2f0dcb91d7e85
            • Opcode Fuzzy Hash: b6f9b1fd57430f77313be91243793a102745fc176dedbb318d5ad7af9560adf6
            • Instruction Fuzzy Hash: B4229372A18E8692EB10DF25E4446AE7361FB88FA4F506231DA5E87BB4DF3CD548C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 939 7ff61b7379e0-7ff61b737a2c call 7ff61b76d7b0 call 7ff61b74fc98 944 7ff61b737afc-7ff61b737b27 CoCreateInstance 939->944 945 7ff61b737a32-7ff61b737a46 939->945 946 7ff61b737b2d-7ff61b737b79 944->946 947 7ff61b737d21-7ff61b737d2c lstrlenW 944->947 948 7ff61b737a50-7ff61b737a78 call 7ff61b76d7b0 CreateToolhelp32Snapshot 945->948 956 7ff61b737d0f-7ff61b737d19 946->956 957 7ff61b737b7f-7ff61b737b9b 946->957 950 7ff61b737d2e-7ff61b737d3e lstrcatW 947->950 951 7ff61b737d3f-7ff61b737d46 947->951 958 7ff61b737ad6-7ff61b737af6 call 7ff61b74fc98 948->958 959 7ff61b737a7a-7ff61b737a90 Process32FirstW 948->959 950->951 954 7ff61b737d48 951->954 955 7ff61b737d4e-7ff61b737d64 951->955 954->955 956->947 961 7ff61b737d1b 956->961 957->956 969 7ff61b737ba1-7ff61b737c5d call 7ff61b76d7b0 wsprintfW RegOpenKeyExW 957->969 958->944 958->948 962 7ff61b737acd-7ff61b737ad0 CloseHandle 959->962 963 7ff61b737a92-7ff61b737a9c 959->963 961->947 962->958 966 7ff61b737aa0-7ff61b737aaa 963->966 967 7ff61b737aac-7ff61b737ab2 966->967 968 7ff61b737ab4-7ff61b737ab9 966->968 967->966 967->968 970 7ff61b737abf-7ff61b737acb Process32NextW 968->970 971 7ff61b737d65-7ff61b737d6f CloseHandle 968->971 975 7ff61b737ced-7ff61b737cff 969->975 976 7ff61b737c63-7ff61b737cbe call 7ff61b76d7b0 RegQueryValueExW 969->976 970->962 970->963 971->958 974 7ff61b737d75-7ff61b737d93 lstrcatW * 2 971->974 974->958 979 7ff61b737d07-7ff61b737d09 975->979 980 7ff61b737ce0-7ff61b737ce7 RegCloseKey 976->980 981 7ff61b737cc0-7ff61b737cda lstrcatW * 2 976->981 979->956 979->969 980->975 981->980
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: lstrcat$Close$CreateHandleProcess32$FirstInstanceNextOpenQuerySnapshotToolhelp32Valuelstrlenwsprintf
            • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}$Windows Defender IOfficeAntiVirus implementation
            • API String ID: 582347850-1583895642
            • Opcode ID: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
            • Instruction ID: 4365acd8bef32fdb4aa71c6bd24d0086bb8e44b57894b0eff521ba8a35f8aeb9
            • Opcode Fuzzy Hash: 134265c9e40a9f760aa4fceb9a534aa5a21de15c77527937ae6ae4b8d1d4e22b
            • Instruction Fuzzy Hash: EDA18422A08E8286F760DF25E8406AA77A1FB89F58F445135DE4D87B78DF3CD648C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1080 7ff61b738690-7ff61b7386bf 1081 7ff61b7386c1 1080->1081 1082 7ff61b7386c4-7ff61b7386d3 1080->1082 1081->1082 1083 7ff61b7386d8-7ff61b7386ed 1082->1083 1084 7ff61b7386d5 1082->1084 1085 7ff61b7388d8 1083->1085 1086 7ff61b7386f3-7ff61b738713 GetTokenInformation 1083->1086 1084->1083 1089 7ff61b7388da-7ff61b7388f1 1085->1089 1087 7ff61b73874e-7ff61b738776 GetTokenInformation 1086->1087 1088 7ff61b738715-7ff61b73871e GetLastError 1086->1088 1091 7ff61b73877c-7ff61b7387be LookupAccountSidW 1087->1091 1092 7ff61b7388bf-7ff61b7388c2 1087->1092 1088->1085 1090 7ff61b738724-7ff61b738748 GetProcessHeap HeapAlloc 1088->1090 1090->1085 1090->1087 1094 7ff61b7387c0-7ff61b7387cb GetLastError 1091->1094 1095 7ff61b7387ef-7ff61b7387fe 1091->1095 1092->1085 1093 7ff61b7388c4-7ff61b7388d2 GetProcessHeap HeapFree 1092->1093 1093->1085 1097 7ff61b7387e8-7ff61b7387ea 1094->1097 1098 7ff61b7387cd-7ff61b7387e3 call 7ff61b7587a0 1094->1098 1096 7ff61b738800-7ff61b738807 1095->1096 1096->1096 1099 7ff61b738809-7ff61b738818 1096->1099 1097->1089 1098->1092 1101 7ff61b73881a-7ff61b738821 1099->1101 1102 7ff61b738844-7ff61b73884c call 7ff61b73a1a0 1099->1102 1104 7ff61b738826-7ff61b738842 call 7ff61b76d110 1101->1104 1105 7ff61b738823 1101->1105 1108 7ff61b738851-7ff61b738859 1102->1108 1104->1108 1105->1104 1110 7ff61b738860-7ff61b738867 1108->1110 1110->1110 1111 7ff61b738869-7ff61b738870 1110->1111 1112 7ff61b73889f-7ff61b7388ad call 7ff61b73a1a0 1111->1112 1113 7ff61b738872-7ff61b738879 1111->1113 1118 7ff61b7388b2-7ff61b7388ba 1112->1118 1115 7ff61b73887b 1113->1115 1116 7ff61b73887e-7ff61b73889d call 7ff61b76d110 1113->1116 1115->1116 1116->1118 1118->1092
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Heap$ErrorInformationLastProcessToken$AccountAllocFreeLookup
            • String ID: NONE_MAPPED
            • API String ID: 162735656-2950899194
            • Opcode ID: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
            • Instruction ID: c97c959c1d022bbd4d4209a6240e0c8065a39aca1e960ed4aa6311a41e9a5f78
            • Opcode Fuzzy Hash: fc7d76223dfa6cbbf8efa4015a3b0f0cb7eb74909b040ee270e83bc7d35c4934
            • Instruction Fuzzy Hash: A0519162A29F8196EA60DF01E4402AE63A0FB49FE4F845536DB5D97BB4DF3CD548C340

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ControlDevice$ByteCharCloseCreateFileHandleMultiWide$wsprintf
            • String ID: \\.\HCD%d
            • API String ID: 2324936672-2696249065
            • Opcode ID: 5ce96b038b44017890316f80b403f2fc54911078eba5beeafb1223e05245f713
            • Instruction ID: c7d67b1165a9b8889db5007a24585ad311c29b606c21113b8d5ebbe7d4346721
            • Opcode Fuzzy Hash: 5ce96b038b44017890316f80b403f2fc54911078eba5beeafb1223e05245f713
            • Instruction Fuzzy Hash: 8A51633160CB8186EB609F21B54076EB794FB89BA4F542135DA8E87BB5EF3CD419CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
            • String ID:
            • API String ID: 2277684705-0
            • Opcode ID: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
            • Instruction ID: ea3a35ae6506e53506c6f55cdea033ed7c99a706f30da7ab065d1dae64490deb
            • Opcode Fuzzy Hash: 6f2be5bc360ff60992bf957455bd65437668e6ddaf6ac78ef69b290b53bfb88b
            • Instruction Fuzzy Hash: A601D625A18E8282F714BB71AC5457937A1FF8CF36B857535D51ECA670DE3CA44D8700
            APIs
            • _get_daylight.LIBCMT ref: 00007FF61B761DED
              • Part of subcall function 00007FF61B761464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B761478
              • Part of subcall function 00007FF61B75E6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6D2
              • Part of subcall function 00007FF61B75E6BC: GetLastError.KERNEL32(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6DC
              • Part of subcall function 00007FF61B753D88: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF61B753D37,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B753D91
              • Part of subcall function 00007FF61B753D88: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF61B753D37,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B753DB6
              • Part of subcall function 00007FF61B769F14: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B769E5F
            • _get_daylight.LIBCMT ref: 00007FF61B761DDC
              • Part of subcall function 00007FF61B7614C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B7614D8
            • _get_daylight.LIBCMT ref: 00007FF61B762052
            • _get_daylight.LIBCMT ref: 00007FF61B762063
            • _get_daylight.LIBCMT ref: 00007FF61B762074
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF61B7622B4), ref: 00007FF61B76209B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 4070488512-239921721
            • Opcode ID: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
            • Instruction ID: 14f4bf91aa04ae7209ff0194e1cb54372c90d7788a5f5f6a15de24b735a434d3
            • Opcode Fuzzy Hash: e4d215210ab8a5127c723f465f4324ebd8545cea5875ff9c0ed7522d57f15f04
            • Instruction Fuzzy Hash: E4D1B076E08A8245FB249F22E8541B96761EF4CFA4F44A435EA0D87AB5DF3CE849C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ControlDevice_invalid_parameter_noinfo_noreturn$CreateFilewsprintf
            • String ID:
            • API String ID: 3155671162-0
            • Opcode ID: ca3a5f53a69bd94d5085424c179d366c67bc8047cf41c0a47e4941c75c49cf7e
            • Instruction ID: 7ee88a46c81e00bf9b2858b0d8644332796e7bc93e3c0b985e72612359d01c11
            • Opcode Fuzzy Hash: ca3a5f53a69bd94d5085424c179d366c67bc8047cf41c0a47e4941c75c49cf7e
            • Instruction Fuzzy Hash: 96028222F18F8185FB00DB61E4502AD23A1AB59FB8F006635DE5D97BFADE3CD4899340
            APIs
            • _get_daylight.LIBCMT ref: 00007FF61B762052
              • Part of subcall function 00007FF61B7614C4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B7614D8
            • _get_daylight.LIBCMT ref: 00007FF61B762063
              • Part of subcall function 00007FF61B761464: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B761478
            • _get_daylight.LIBCMT ref: 00007FF61B762074
              • Part of subcall function 00007FF61B761494: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B7614A8
              • Part of subcall function 00007FF61B75E6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6D2
              • Part of subcall function 00007FF61B75E6BC: GetLastError.KERNEL32(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6DC
            • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF61B7622B4), ref: 00007FF61B76209B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
            • String ID: Eastern Standard Time$Eastern Summer Time
            • API String ID: 3458911817-239921721
            • Opcode ID: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
            • Instruction ID: 9b63d44b30b5a3cf38d426b3a99319d6add82339144e1a00868dd5f2704092d1
            • Opcode Fuzzy Hash: d39622db5b0ee5333b178c37cbbab90ca343d8bae9bfc90199294d5daa5d9118
            • Instruction Fuzzy Hash: 7A517F32E18A8286F750DF22E8905A96760FF4CFA4F446535EA4DC7AB6DF3CE5488740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1405656091-0
            • Opcode ID: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
            • Instruction ID: 6b363f7f29b492569820197f9f6f613eb3397542c66ba31bded5d6e7121fb10a
            • Opcode Fuzzy Hash: bc1b3b9caf7716422d15d8d8075c51535e8cc771750b1ef0c981aa63b125a24c
            • Instruction Fuzzy Hash: C791E8B2B057864BEB588F25C9412B863A1EB5CF98F44A035DA0DCBBB5EF3CE4458744
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$AllocFreeTimerecvselecttime
            • String ID:
            • API String ID: 1996171534-0
            • Opcode ID: 12d6ea6a5e9638a2a12ebf09b867218817c5d33edb793a075e5ebf3298344bd1
            • Instruction ID: 482ffc9d1affd1d360f410f68f9dfbbcf10a231f63cacf6b1fa1e283805c6f7b
            • Opcode Fuzzy Hash: 12d6ea6a5e9638a2a12ebf09b867218817c5d33edb793a075e5ebf3298344bd1
            • Instruction Fuzzy Hash: 01713D62A18E8581EB20DF29D4446BD3360FB99F98F55A235DB8D477B5EF38E488C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
            • Instruction ID: 0fb6920b1ce9af8cea85769e8e8cd46d4d206215380fe22e4358f1917dce0753
            • Opcode Fuzzy Hash: 7adfbc43d79927e24f2f975998fe396b12a3d4926a19e200812a52629311d3ed
            • Instruction Fuzzy Hash: 3D410472708A818AE709CF2BF4506696765FB88F94F045139EE0EC7B74EE38D885C740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 727 7ff61b738900-7ff61b738938 GetCurrentProcessId OpenProcess 728 7ff61b738967-7ff61b73896c 727->728 729 7ff61b73893a-7ff61b73895c OpenProcessToken 727->729 732 7ff61b738a9a-7ff61b738ab4 728->732 730 7ff61b738971-7ff61b738a12 call 7ff61b738690 call 7ff61b76d110 CloseHandle * 2 729->730 731 7ff61b73895e-7ff61b738961 CloseHandle 729->731 737 7ff61b738a4f-7ff61b738a63 730->737 738 7ff61b738a14-7ff61b738a2b 730->738 731->728 741 7ff61b738a98 737->741 742 7ff61b738a65-7ff61b738a7c 737->742 739 7ff61b738a2d-7ff61b738a40 738->739 740 7ff61b738a42-7ff61b738a47 call 7ff61b74de64 738->740 739->740 743 7ff61b738abb-7ff61b738b39 call 7ff61b753d58 call 7ff61b74ded4 GetCurrentProcessId wsprintfW call 7ff61b738900 call 7ff61b76d7b0 GetVersionExW 739->743 740->737 741->732 745 7ff61b738a7e-7ff61b738a91 742->745 746 7ff61b738a93 call 7ff61b74de64 742->746 761 7ff61b738b3f-7ff61b738b44 743->761 762 7ff61b738c92 743->762 745->746 748 7ff61b738ab5-7ff61b738aba call 7ff61b753d58 745->748 746->741 748->743 761->762 763 7ff61b738b4a-7ff61b738b4f 761->763 764 7ff61b738c99-7ff61b738ca3 wsprintfW 762->764 763->762 766 7ff61b738b55-7ff61b738b7b GetCurrentProcess OpenProcessToken 763->766 765 7ff61b738ca9-7ff61b738cc0 call 7ff61b74de64 764->765 766->762 768 7ff61b738b81-7ff61b738bb0 GetTokenInformation 766->768 770 7ff61b738bb6-7ff61b738bbf GetLastError 768->770 771 7ff61b738c3c-7ff61b738c4c CloseHandle 768->771 770->771 773 7ff61b738bc1-7ff61b738be1 LocalAlloc 770->773 771->762 772 7ff61b738c4e-7ff61b738c54 771->772 774 7ff61b738c89-7ff61b738c90 772->774 775 7ff61b738c56-7ff61b738c5c 772->775 776 7ff61b738c34 773->776 777 7ff61b738be3-7ff61b738c10 GetTokenInformation 773->777 774->764 778 7ff61b738c80-7ff61b738c87 775->778 779 7ff61b738c5e-7ff61b738c64 775->779 776->771 780 7ff61b738c2b-7ff61b738c2e LocalFree 777->780 781 7ff61b738c12-7ff61b738c29 GetSidSubAuthorityCount GetSidSubAuthority 777->781 778->764 782 7ff61b738c77-7ff61b738c7e 779->782 783 7ff61b738c66-7ff61b738c6c 779->783 780->776 781->780 782->764 783->765 784 7ff61b738c6e-7ff61b738c75 783->784 784->764
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process$CloseHandleToken$CurrentOpen$AuthorityInformationLocal_invalid_parameter_noinfo_noreturnwsprintf$AllocCountErrorFreeLastVersion
            • String ID: -N/$NO/$None/%s$VenNetwork
            • API String ID: 3589523989-819860926
            • Opcode ID: d42ba7504cebbf2a51a649e7bef0d695714f0f5e07d95865d6b26a32d06dfaba
            • Instruction ID: 064951337e74231c72e3c84b62f20494f2438690ffbd95e325a488b6469f2d64
            • Opcode Fuzzy Hash: d42ba7504cebbf2a51a649e7bef0d695714f0f5e07d95865d6b26a32d06dfaba
            • Instruction Fuzzy Hash: CFA14F61A0DFC282FA60DB25E4443B96361FB89FA0F946235DA9D87AB4DF3CD549C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 785 7ff61b7402a0-7ff61b740319 GlobalAlloc GlobalLock call 7ff61b76d110 GlobalUnlock CreateStreamOnHGlobal 788 7ff61b740671-7ff61b74067a GlobalFree 785->788 789 7ff61b74031f-7ff61b74037e call 7ff61b7361e0 EnterCriticalSection LeaveCriticalSection call 7ff61b73c9b0 785->789 790 7ff61b74067d-7ff61b740697 788->790 795 7ff61b7405ee-7ff61b740604 789->795 796 7ff61b740384-7ff61b7403ae GdipCreateBitmapFromStream 789->796 801 7ff61b740606-7ff61b740624 DeleteObject 795->801 802 7ff61b74062a-7ff61b740640 call 7ff61b7361e0 EnterCriticalSection 795->802 797 7ff61b7403bb-7ff61b7403d6 call 7ff61b73c340 GdipDisposeImage 796->797 798 7ff61b7403b0-7ff61b7403b6 GdipDisposeImage 796->798 797->795 804 7ff61b7403dc-7ff61b7403f3 CreateStreamOnHGlobal 797->804 798->795 801->802 808 7ff61b740667-7ff61b74066b LeaveCriticalSection 802->808 809 7ff61b740642-7ff61b740652 EnterCriticalSection 802->809 804->795 807 7ff61b7403f9-7ff61b740428 call 7ff61b73c7b0 GetHGlobalFromStream GlobalLock 804->807 814 7ff61b7404bf-7ff61b740508 GlobalSize call 7ff61b74ded4 call 7ff61b76d110 call 7ff61b739e70 807->814 815 7ff61b74042e-7ff61b74044d GlobalFree 807->815 808->788 811 7ff61b74065a-7ff61b740661 LeaveCriticalSection 809->811 812 7ff61b740654 GdiplusShutdown 809->812 811->808 812->811 829 7ff61b74050a-7ff61b740512 814->829 830 7ff61b74055e 814->830 820 7ff61b740471-7ff61b740487 call 7ff61b7361e0 EnterCriticalSection 815->820 821 7ff61b74044f-7ff61b74046b DeleteObject 815->821 827 7ff61b740489-7ff61b740499 EnterCriticalSection 820->827 828 7ff61b7404ae-7ff61b7404ba LeaveCriticalSection 820->828 821->820 831 7ff61b74049b GdiplusShutdown 827->831 832 7ff61b7404a1-7ff61b7404a8 LeaveCriticalSection 827->832 828->790 833 7ff61b740544-7ff61b74055c 829->833 834 7ff61b740514-7ff61b740521 829->834 835 7ff61b740562-7ff61b740566 830->835 831->832 832->828 833->835 836 7ff61b74053f call 7ff61b74de64 834->836 837 7ff61b740523-7ff61b740536 834->837 838 7ff61b740599-7ff61b7405ad call 7ff61b74de64 835->838 839 7ff61b740568-7ff61b740579 835->839 836->833 843 7ff61b740698-7ff61b74069f call 7ff61b753d58 837->843 844 7ff61b74053c 837->844 849 7ff61b7405af-7ff61b7405cd DeleteObject 838->849 850 7ff61b7405d3-7ff61b7405e1 GlobalUnlock 838->850 840 7ff61b74057b-7ff61b74058e 839->840 841 7ff61b740594 call 7ff61b74de64 839->841 840->841 840->843 841->838 844->836 849->850 852 7ff61b7405e7 850->852 852->795
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$Global$EnterLeave$Stream$CreateGdip$DeleteDisposeFreeFromGdiplusImageLockObjectShutdown$AllocBitmapErrorInitializeLastUnlock_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 953580087-0
            • Opcode ID: 6a47932f2d824f93bffde5a913d367a737229ea91dfede279ec8d7f768a18219
            • Instruction ID: 3d36060a00767317fe259446624c0992369d760f3a4974ffbb5d6f9aeb19bd51
            • Opcode Fuzzy Hash: 6a47932f2d824f93bffde5a913d367a737229ea91dfede279ec8d7f768a18219
            • Instruction Fuzzy Hash: 36C11A36B08F428AEB00EB65E8442AD2375EB48F69F406135CE5E97AB9DF38D45DD340

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 853 7ff61b73c340-7ff61b73c383 GdipGetImagePixelFormat 854 7ff61b73c387-7ff61b73c3a4 853->854 855 7ff61b73c385 853->855 856 7ff61b73c3b9-7ff61b73c3c4 854->856 857 7ff61b73c3a6-7ff61b73c3b3 854->857 855->854 858 7ff61b73c3c6-7ff61b73c3d4 856->858 859 7ff61b73c3db-7ff61b73c400 GdipGetImageHeight 856->859 857->856 858->859 860 7ff61b73c40f-7ff61b73c422 GdipGetImageWidth 859->860 861 7ff61b73c402-7ff61b73c40c 859->861 862 7ff61b73c426-7ff61b73c447 call 7ff61b73c160 860->862 863 7ff61b73c424 860->863 861->860 866 7ff61b73c449-7ff61b73c44e 862->866 867 7ff61b73c453-7ff61b73c45b 862->867 863->862 868 7ff61b73c773-7ff61b73c78c 866->868 869 7ff61b73c60d-7ff61b73c61c 867->869 870 7ff61b73c461-7ff61b73c478 GdipGetImagePaletteSize 867->870 873 7ff61b73c6e2-7ff61b73c74d GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 869->873 874 7ff61b73c622-7ff61b73c64e GdipBitmapLockBits 869->874 871 7ff61b73c47c-7ff61b73c487 870->871 872 7ff61b73c47a 870->872 875 7ff61b73c489-7ff61b73c492 call 7ff61b73b2e0 871->875 876 7ff61b73c4ba-7ff61b73c4c6 call 7ff61b753dd0 871->876 872->871 877 7ff61b73c753-7ff61b73c756 873->877 878 7ff61b73c66a-7ff61b73c686 874->878 879 7ff61b73c650-7ff61b73c65a 874->879 875->876 894 7ff61b73c494-7ff61b73c49b 875->894 896 7ff61b73c4c8-7ff61b73c4cb 876->896 897 7ff61b73c4cd-7ff61b73c4d4 876->897 881 7ff61b73c758 877->881 882 7ff61b73c770 877->882 884 7ff61b73c688-7ff61b73c68b 878->884 885 7ff61b73c6c4-7ff61b73c6db GdipBitmapUnlockBits 878->885 879->877 890 7ff61b73c760-7ff61b73c76e call 7ff61b753938 881->890 882->868 886 7ff61b73c6ad-7ff61b73c6c2 884->886 887 7ff61b73c68d-7ff61b73c690 884->887 885->877 889 7ff61b73c6dd-7ff61b73c6e0 885->889 886->884 886->885 892 7ff61b73c696-7ff61b73c69f 887->892 893 7ff61b73c794-7ff61b73c7af call 7ff61b758afc call 7ff61b753d38 call 7ff61b7310f0 887->893 889->877 890->882 899 7ff61b73c78d-7ff61b73c78f call 7ff61b76d7b0 892->899 900 7ff61b73c6a5-7ff61b73c6a8 call 7ff61b76d110 892->900 902 7ff61b73c4a7-7ff61b73c4b8 call 7ff61b74e4e0 894->902 903 7ff61b73c49d 894->903 898 7ff61b73c4d7-7ff61b73c4da 896->898 897->898 906 7ff61b73c4e7-7ff61b73c4f9 GdipGetImagePalette 898->906 907 7ff61b73c4dc-7ff61b73c4e2 898->907 899->893 900->886 902->898 903->902 911 7ff61b73c4fb 906->911 912 7ff61b73c4ff-7ff61b73c50a 906->912 907->877 911->912 916 7ff61b73c510-7ff61b73c515 912->916 917 7ff61b73c65f-7ff61b73c665 912->917 919 7ff61b73c517 916->919 920 7ff61b73c555-7ff61b73c55d 916->920 917->877 922 7ff61b73c520-7ff61b73c553 919->922 923 7ff61b73c5aa-7ff61b73c5c2 SetDIBColorTable 920->923 924 7ff61b73c55f-7ff61b73c56a call 7ff61b736280 920->924 922->920 922->922 925 7ff61b73c607 923->925 926 7ff61b73c5c4-7ff61b73c5de SelectObject call 7ff61b736280 923->926 931 7ff61b73c570-7ff61b73c57d 924->931 925->869 932 7ff61b73c5e0-7ff61b73c5ea 926->932 933 7ff61b73c57f-7ff61b73c584 931->933 934 7ff61b73c58e-7ff61b73c5a6 SelectObject 931->934 935 7ff61b73c5fc-7ff61b73c603 932->935 936 7ff61b73c5ec-7ff61b73c5f1 932->936 933->931 937 7ff61b73c586-7ff61b73c588 CreateCompatibleDC 933->937 934->923 935->925 936->932 938 7ff61b73c5f3-7ff61b73c5f6 DeleteDC 936->938 937->934 938->935
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Gdip$Image$Bitmap$BitsCreateDeleteGraphicsObjectPaletteSelect$ColorCompatibleContextDisposeDrawFormatFromHeightLockPixelScan0SizeTableUnlockWidth_invalid_parameter_noinfo
            • String ID: &
            • API String ID: 4034434136-3042966939
            • Opcode ID: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
            • Instruction ID: 430ba43baeaf7b44365f9427b0ee1ce43f5c42060a90dcac5a3f1db5a8dbbefe
            • Opcode Fuzzy Hash: dd11024c4d0ee26c12cb960423acbe48478663fb147fae3e010d538c7f7c31a7
            • Instruction Fuzzy Hash: CCD1A072608B828AE760DF26D9446A937A4FB08FA8F416035DF1D9BB74DF38E548C740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: setsockopt$ByteCharMultiWidelstrlen$EventIoctlResetTimeconnectgethostbynamehtonssockettime
            • String ID: 0u
            • API String ID: 3082052849-3203441087
            • Opcode ID: d7dedfdc74d27028bc8071cb557e224e85a0c6efb35fccbc3b8993d6d1d3f93e
            • Instruction ID: 9bce246c59077145d61380d68f67cd855a00375c878cf1e26807effec9d0398c
            • Opcode Fuzzy Hash: d7dedfdc74d27028bc8071cb557e224e85a0c6efb35fccbc3b8993d6d1d3f93e
            • Instruction Fuzzy Hash: 03713172608B8186E724DF21F44076AB7A5FB88B64F405239EA9E47B78DF3DD149CB04

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
            • String ID: VenNetwork
            • API String ID: 4155081256-3057682757
            • Opcode ID: 544014d16ea7105ca2918a4ebfd3314dfb4a8e47be3c755dc7ae7334bb45691a
            • Instruction ID: f5ff45bb9c49f031090c7c5e4ec820267cf6317efb7314f965432ad04fb37a0f
            • Opcode Fuzzy Hash: 544014d16ea7105ca2918a4ebfd3314dfb4a8e47be3c755dc7ae7334bb45691a
            • Instruction Fuzzy Hash: C1413D31A0DE8286FB61DB61E4547B96360EB89FA1F846135CA4E866F4DE3CD94DC700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1029 7ff61b74bdd0-7ff61b74bdf7 1030 7ff61b74bdfd-7ff61b74be17 1029->1030 1031 7ff61b74c190-7ff61b74c1a1 CloseHandle 1029->1031 1032 7ff61b74be20-7ff61b74be3a call 7ff61b753dd0 1030->1032 1035 7ff61b74c170-7ff61b74c188 1032->1035 1036 7ff61b74be40-7ff61b74be7c DeviceIoControl 1032->1036 1035->1031 1037 7ff61b74c168-7ff61b74c16b call 7ff61b753938 1036->1037 1038 7ff61b74be82-7ff61b74be86 1036->1038 1037->1035 1039 7ff61b74c15a-7ff61b74c160 1038->1039 1040 7ff61b74be8c-7ff61b74beeb DeviceIoControl 1038->1040 1039->1032 1044 7ff61b74c166 1039->1044 1042 7ff61b74bf84-7ff61b74bf88 1040->1042 1043 7ff61b74bef1-7ff61b74bef8 1040->1043 1046 7ff61b74c075-7ff61b74c0cd call 7ff61b76d7b0 call 7ff61b74c5c0 * 2 1042->1046 1047 7ff61b74bf8e-7ff61b74bfd5 DeviceIoControl 1042->1047 1043->1042 1045 7ff61b74befe-7ff61b74bf06 1043->1045 1044->1035 1045->1042 1048 7ff61b74bf08-7ff61b74bf1e GlobalAlloc 1045->1048 1065 7ff61b74c0d2-7ff61b74c0f9 call 7ff61b74bd70 1046->1065 1047->1046 1050 7ff61b74bfdb-7ff61b74bfe8 1047->1050 1048->1042 1051 7ff61b74bf20-7ff61b74bf64 DeviceIoControl 1048->1051 1050->1046 1053 7ff61b74bfee-7ff61b74c001 GlobalAlloc 1050->1053 1054 7ff61b74bf7b-7ff61b74bf7e GlobalFree 1051->1054 1055 7ff61b74bf66-7ff61b74bf6c 1051->1055 1053->1046 1057 7ff61b74c003-7ff61b74c03f DeviceIoControl 1053->1057 1054->1042 1055->1054 1058 7ff61b74bf6e-7ff61b74bf79 1055->1058 1060 7ff61b74c06c-7ff61b74c06f GlobalFree 1057->1060 1061 7ff61b74c041-7ff61b74c059 call 7ff61b74c520 GlobalFree 1057->1061 1058->1042 1058->1054 1060->1046 1061->1046 1066 7ff61b74c05b-7ff61b74c06a call 7ff61b74c1b0 1061->1066 1071 7ff61b74c100-7ff61b74c107 1065->1071 1066->1046 1071->1071 1072 7ff61b74c109-7ff61b74c10d 1071->1072 1073 7ff61b74c114-7ff61b74c11c 1072->1073 1073->1073 1074 7ff61b74c11e-7ff61b74c128 1073->1074 1074->1035 1075 7ff61b74c12a-7ff61b74c12d 1074->1075 1076 7ff61b74c130-7ff61b74c138 1075->1076 1076->1076 1077 7ff61b74c13a-7ff61b74c13e 1076->1077 1078 7ff61b74c140-7ff61b74c14e 1077->1078 1078->1078 1079 7ff61b74c150-7ff61b74c155 1078->1079 1079->1039
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ControlDeviceGlobal$Free$Alloc
            • String ID: - External Hub$%s-%s|
            • API String ID: 3253977144-729331614
            • Opcode ID: 6b626a0ebb27f4899b856dfdbd77a6afa44de305ba64ec9147ca6ca1ee3b1713
            • Instruction ID: 51c750c204f0f1b29fa28b74ed5fef9d30a5f91f51ffe96883c7e95e64eb2ff5
            • Opcode Fuzzy Hash: 6b626a0ebb27f4899b856dfdbd77a6afa44de305ba64ec9147ca6ca1ee3b1713
            • Instruction Fuzzy Hash: 8AB17072A18B8185E760CF21A8403AEB7A0FB89BA4F545135DB8D977B5DF3CD549CB00

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CountInfoInputLastOpenQueryTickValue_invalid_parameter_noinfo_noreturnwsprintf
            • String ID: %d min$Console$IpDatespecial
            • API String ID: 357503962-2712035571
            • Opcode ID: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
            • Instruction ID: 433dad3063e0dad06cfdcc02497ff4c725e298c78c69eca71017e8fbee46f5a3
            • Opcode Fuzzy Hash: efa53836958f32f8ab0cb54a8671f626514f8aa22354df529298ed1da135f9ea
            • Instruction Fuzzy Hash: 05519C72608EC585EB60DF28EC543B927A4EB48FA9F845131DA4C8B6B9DF3DC589C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Gdip$Image$BitmapCreateDisposeEncodersFrom$SaveScan0SizeStream
            • String ID: &
            • API String ID: 370471037-3042966939
            • Opcode ID: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
            • Instruction ID: b0b2cc2ef8b911e03347536829480078da2f6d1def044593646ed5f89be336d9
            • Opcode Fuzzy Hash: 4526caf998ada3252c84406b8f766584f007c4df05e28e230d859843c7169577
            • Instruction Fuzzy Hash: 0C516132A08F8296EB11DB2698005B863A1FB4CFB8F456131DE5D97BB4DF3CE54A8340
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: InfoSystem$AddressHandleModuleNativeProc
            • String ID: GetNativeSystemInfo$kernel32.dll
            • API String ID: 3433367815-192647395
            • Opcode ID: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
            • Instruction ID: b4a956b5e8ec5caba5aee5769cb91fa3dc90b0e42333fd5a444c058b4147f4a5
            • Opcode Fuzzy Hash: 882c301155eb64aee104ed8b19a7cf0e71553aaaeea973eafe02328fb5bce8a2
            • Instruction Fuzzy Hash: E4F04F15E29E8682FA61E710A8142792251FB9CB15F907236E98E81674EE5CE7998B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcmp
            • String ID:
            • API String ID: 4288439342-0
            • Opcode ID: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
            • Instruction ID: 45bd8028779c45516c1f29b957f6d1e70732e476d923d365aa3bc0da0dcc9157
            • Opcode Fuzzy Hash: 898e3f92dd09ced9f59f1214a1bb77de0c366a7caab65dc6ea004482ae0e6425
            • Instruction Fuzzy Hash: 6C31643161CE8182E760CB25E88866A7364FB9CFA0F905231DA9D837B8DF3DD548DB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$CreateFactory
            • String ID: %s%s %d %d $%s%s %d*%d
            • API String ID: 2331002265-1924168580
            • Opcode ID: 8fa00d72778a232c14932e728595a13cc51c5fe8bf1a07966f1b6ffb0567861c
            • Instruction ID: 4aa91e66aeff47dc3e87449a961e378b1de1a10b56a09787b77a4d61ca0ba003
            • Opcode Fuzzy Hash: 8fa00d72778a232c14932e728595a13cc51c5fe8bf1a07966f1b6ffb0567861c
            • Instruction Fuzzy Hash: F3A19032B08F8589EB10CF65D4442AE7761FB88BA8F541622DE9D97BB8DF38D485C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2067211477-0
            • Opcode ID: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
            • Instruction ID: cb7365a1f40b7a51b235dd9420032500bdc171b078482ea7a2d2415d8f43ab04
            • Opcode Fuzzy Hash: bf8243345e757f2f55ee74e3b164a4444cec9f217b6620c703edaf3e446c73ac
            • Instruction Fuzzy Hash: A8216A25A0DF8286EA15AF66A40017AB3A0EF8CFA0F445535EE4D87775EF3CE4088708
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ControlCreateDeviceFile
            • String ID: L$\\.\
            • API String ID: 107608037-1891537229
            • Opcode ID: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
            • Instruction ID: 97df11e47fb2289cea21121a518b34500f02eb61cee528d03db99f62a074f791
            • Opcode Fuzzy Hash: 0cbf31d1c7ae4fdc9b9f59bce1c389b46034841fd4249985a256846f0105b842
            • Instruction Fuzzy Hash: CD31C472608B8481E7408F61B0503797BA0EB89FF4F085235EAAA477E5CF7CC5098B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CurrentThreadsend
            • String ID:
            • API String ID: 302076607-0
            • Opcode ID: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
            • Instruction ID: be980203ad7fa4122fa66c5caefbedb174125c91f5513eb833e4e82ffb7099a7
            • Opcode Fuzzy Hash: 8fc84bb4e0a68a1d65a8e1ac48c208ce2ab72bf0ff2939eb6e9be73f1c549aff
            • Instruction Fuzzy Hash: 17518F22A04B4687E724DF26E08436A77B0FB48F94F45A035DB5987B75DF39E45A8340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CancelEventclosesocketsetsockopt
            • String ID:
            • API String ID: 852421847-0
            • Opcode ID: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
            • Instruction ID: cc278f388b608fb4700a04d240fc2c6d81ef268dd76b082f3da1fe5084b94e43
            • Opcode Fuzzy Hash: 2fb1975f05564cd4b635324778d61c2216334fb941b2a99bb5b0bfd9df8af0fc
            • Instruction Fuzzy Hash: B8F01D36604A8187E7149F25E55436AB371FB88B64F905335CBAD4BAB4CF39D4698700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ByteCharMultiWide$ControlDefaultDeviceLangSystemlstrcpy
            • String ID:
            • API String ID: 3058672631-0
            • Opcode ID: f9daac3b4797e4e4ed63acccb6d7f5589fa86b82bdaf3d0711c722ad5586c17b
            • Instruction ID: e38f6a6df8768cb1670b948921a86002f220e4b57fb84c55a16fae3c2779716b
            • Opcode Fuzzy Hash: f9daac3b4797e4e4ed63acccb6d7f5589fa86b82bdaf3d0711c722ad5586c17b
            • Instruction Fuzzy Hash: EE31C73160CA8285EB10DB11E4443AAA7A5EB8DFA1F54A135FA9DC7BB5DF3DD444CB00
            APIs
              • Part of subcall function 00007FF61B7361E0: InitializeCriticalSectionEx.KERNEL32 ref: 00007FF61B736231
              • Part of subcall function 00007FF61B7361E0: GetLastError.KERNEL32 ref: 00007FF61B73623B
            • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF61B73C7D4), ref: 00007FF61B73C9DA
            • GdiplusStartup.GDIPLUS ref: 00007FF61B73CA0F
            • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF61B73C7D4), ref: 00007FF61B73CA27
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorGdiplusInitializeLastLeaveStartup
            • String ID:
            • API String ID: 2723390537-0
            • Opcode ID: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
            • Instruction ID: 6ced40fde7c0670967b0b0bb020227e065c5ccbec97acf9070c9f0513969a1b0
            • Opcode Fuzzy Hash: 65629aaaa719a2e99d15e3f5434e13b9281ffa3b8c64cff51ac5a9778f412de6
            • Instruction Fuzzy Hash: 18014032508B8586E750DF25E44436A77E5F789F55F882025EA8997674CF3CD059CB40
            APIs
              • Part of subcall function 00007FF61B75EBE8: GetLastError.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EBF7
              • Part of subcall function 00007FF61B75EBE8: SetLastError.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC97
            • CloseHandle.KERNEL32(?,?,?,00007FF61B758A25,?,?,?,?,00007FF61B758869), ref: 00007FF61B7588B3
            • FreeLibraryAndExitThread.KERNEL32(?,?,?,00007FF61B758A25,?,?,?,?,00007FF61B758869), ref: 00007FF61B7588C9
            • ExitThread.KERNEL32 ref: 00007FF61B7588D2
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorExitLastThread$CloseFreeHandleLibrary
            • String ID:
            • API String ID: 1991824761-0
            • Opcode ID: 9d899525cbf94069d0aecb2dad8b7ed7b52f5d6c34f84ba4291cfdf2ce1d2a7a
            • Instruction ID: d6f0719dc975e4af600b0257cdfe840cb72cd261e5a6f93ada963e100d55031f
            • Opcode Fuzzy Hash: 9d899525cbf94069d0aecb2dad8b7ed7b52f5d6c34f84ba4291cfdf2ce1d2a7a
            • Instruction Fuzzy Hash: DCF06221A29EC692FE546B2094442BD2264EF48F35F5C6735D63C962F5DF3CE84D8344
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ByteCharMultiWide
            • String ID:
            • API String ID: 626452242-0
            • Opcode ID: bb8afed493b508f7922d7b4954a12e94e0c77452b6319c2f16ef211ca1375834
            • Instruction ID: db963061250dc2416aa08d3bcf058fdd93c8e33ac71cfb2b6f68cbd49480648b
            • Opcode Fuzzy Hash: bb8afed493b508f7922d7b4954a12e94e0c77452b6319c2f16ef211ca1375834
            • Instruction Fuzzy Hash: F3117332708F8186E7509F27784002D76E5FB88FA0B585238EA5E877B5DF38E4158704
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: SleepTimetime
            • String ID:
            • API String ID: 346578373-0
            • Opcode ID: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
            • Instruction ID: 436d0d24840463e2ba976a6d417f6154572c29c031939e3f1e1dbeec47b34553
            • Opcode Fuzzy Hash: 2becff6657bc7d5012ec94526cf32972d5272bc21be79492e35a94961d449a59
            • Instruction Fuzzy Hash: A8011B22A18A458AE7648B65E1C836D26A0F749BA4F452234C65A8A7B4CF7CD4A9C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorExitLastThread
            • String ID:
            • API String ID: 1611280651-0
            • Opcode ID: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
            • Instruction ID: 5d97d6407040338c8b3ce25958d4ba59ef3742200c9fca866a0366e0377a0b24
            • Opcode Fuzzy Hash: 86e50ef011b0631a2311c12b12e79fa44030a146f353d628d3291aff0b0405bd
            • Instruction Fuzzy Hash: CCF09022E1AE8286FF04BB7194191BC1260AF5DF60F043534D90AD73B2DF2CA84D8304
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-0
            • Opcode ID: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
            • Instruction ID: 93b523c6a7a98f8dc5fb0d58b4917a24858a39c0888e983c076117a0fad4e964
            • Opcode Fuzzy Hash: a47e5a6ac0625703f2fd5b566550f71a2f7208a7861a0071670bc6a0f9e7358f
            • Instruction Fuzzy Hash: FDE0B651E1EE1749FD696172265517401500F6DF72E283B30D9BE842F3AE1CA89D8314
            APIs
            • RtlFreeHeap.NTDLL(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6D2
            • GetLastError.KERNEL32(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6DC
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
            • Instruction ID: 35835f01622c6ebd4a32428a1b30e86f2cd708b465d5ec6cb6ee5bc3e3f17d05
            • Opcode Fuzzy Hash: a27750d6ae148c980c7c980f65ba2d3e2e52c6c92a9735542c6e0cceef461146
            • Instruction Fuzzy Hash: B2E0E651F19D5343FB146BB2985507421519F8CF71F447834D91ED6275EE2C684D4718
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
            • Instruction ID: 80bc0de63225a9ed9b3a7b56f1c5488336c6aac400ace687f567fe44a0001f32
            • Opcode Fuzzy Hash: 616965ea612f33b462fe03c73724eb49c1abe59c321f00a6c33259c6d796c58f
            • Instruction Fuzzy Hash: 27216531B18E4586D724DB2AF44012AB7B1FB88B90B149135EB9ED3B38DF3CE5858B44
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
            • Instruction ID: a8a211fd62645928d7350b256d5f79e61f5cb02218b549174aac4adbf63cee54
            • Opcode Fuzzy Hash: 0d2589c5e0cc1a94e4b3bf8f4f54a9d1287f00ffced7c8db5b8a82110618710c
            • Instruction Fuzzy Hash: 8C119671B28E8182E705CF26A440129A3A5EF9CFD4B146131E94ED7B78DF3CD9958B40
            APIs
              • Part of subcall function 00007FF61B74DC60: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF61B74DC74
            • __scrt_release_startup_lock.LIBCMT ref: 00007FF61B74E057
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: __scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
            • String ID:
            • API String ID: 2217363868-0
            • Opcode ID: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
            • Instruction ID: 7b558f7b40ecc40c8cb8633078977d7cb8fa1c0fcae280ee9a1363521ffe9ae0
            • Opcode Fuzzy Hash: cbc0649b0607904615e0344cdc653858b0dfbbed05089a03dbfd93f3e9e99ab1
            • Instruction Fuzzy Hash: 64316B21E0CE4781FA18AB20D4513B92291AF4DFB5F947835D94DCB2F3DE2DA84D8700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Startup
            • String ID:
            • API String ID: 724789610-0
            • Opcode ID: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
            • Instruction ID: 516bc6c84f71f9d355bd6b05c5b0a9361ddcb8858b3b62a91bd03dfe551be502
            • Opcode Fuzzy Hash: 27a40b9f3cf52b959e37d45274ab80e386b8a2eb9336faf4e796e06ae50c97e7
            • Instruction Fuzzy Hash: 66E04F36B09945CAE611AF24D4490687364F76D710F805131E58CC7774DE2CD5598F00
            APIs
            • HeapAlloc.KERNEL32(?,?,?,00007FF61B76252D,?,?,00000000,00007FF61B75A3FB,?,?,?,00007FF61B75C5D3,?,?,?,00007FF61B75C4C9), ref: 00007FF61B75EE0E
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AllocHeap
            • String ID:
            • API String ID: 4292702814-0
            • Opcode ID: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
            • Instruction ID: f3c235a5399bada882d2f271c3c1f8f5c4fd5e43ae8f1144c36a01d635980733
            • Opcode Fuzzy Hash: c5d91307553507d7a0b65c4578cb45837d9ca66b83f15ba5a6112bdae37f71ee
            • Instruction Fuzzy Hash: 56F05810A2DE4689FA686A62584127821815F8CFB0F08AE34D82EC66F2DE2CA4894318
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process$Virtual$AddressLibraryLoadProcProtect$AllocCreateCurrentMemoryOpenThreadTokenWrite$AdjustDirectoryFileLookupModuleNamePrivilegePrivilegesRemoteResumeSleepSystemValue
            • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$SeDebugPrivilege$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
            • API String ID: 3040193174-4212407401
            • Opcode ID: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
            • Instruction ID: e1649dc2dd3d3645c05bc87587aef297983cee55a160037f82ccb8a5b03546a5
            • Opcode Fuzzy Hash: 0c2d203bb3590072b2790da5483ee898493f9f682a060de060c9115ce93124ea
            • Instruction Fuzzy Hash: CBA13E32A18F8286F7219F61E8147E923A4FB4CBA8F446135DA4D9AB74DF7CD249C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: lstrlen$wsprintf$ClipboardFileGlobal$CloseCountTickWindow$CreateDataForegroundHandleLocalLockMutexObjectOpenPointerReleaseSingleSizeSleepStateTextTimeUnlockWaitWrite
            • String ID: [$[$%s%s$%s%s$%s%s$[esc]
            • API String ID: 3669393114-972647286
            • Opcode ID: e6ab48ff98ca9ddfa9a13a1758a8a9b1ffd3d9cd46131382e05cf3f4eced504b
            • Instruction ID: 5fe4035328ad3c736a05e6bf52d94e091d5b1429ca69fb6aa9e8052447c45ca2
            • Opcode Fuzzy Hash: e6ab48ff98ca9ddfa9a13a1758a8a9b1ffd3d9cd46131382e05cf3f4eced504b
            • Instruction Fuzzy Hash: 02D13A21A0CE8686F714EB55E8842B963A0FF9DB60F806536D94EC66B4DF3CE64DC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: lstrlen$CreateEventLocalTimewsprintf
            • String ID: %4d.%2d.%2d-%2d:%2d:%2d$o1:$p1:$t1:
            • API String ID: 2157945651-1225219777
            • Opcode ID: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
            • Instruction ID: 22f2c51064e9c90ab5bf628be6127dae6c26eb0d5a54af25bd34eb1605d4a004
            • Opcode Fuzzy Hash: 4ab38958384f3d8ae6ea9e35e84b41bd479a6b61bb859707b2bd8aeb0401d26c
            • Instruction Fuzzy Hash: CDF1F962F18A9286EB24DF25D4403BD2361FB48FA4F406231DA5E97AB5DF7CE589C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
            • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
            • API String ID: 2977986460-1099148085
            • Opcode ID: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
            • Instruction ID: cffcd07eed820329d9087052b1fb5e1360280775368eb4be56f61105836b460c
            • Opcode Fuzzy Hash: b869be42eea26ef83cf2f127258845e1be2102d2018284c86f6782853b1c64bb
            • Instruction Fuzzy Hash: CD41A325609A8286FA60EB11A9147BA67A0FB8DFB4F446130CD9E87774DF3CD54CCB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Lockitstd::_$Clipboard$GlobalLockit::_$Lockit::~_$Close_invalid_parameter_noinfo_noreturn$DataLockOpenUnlock$AllocEmptySetgloballocaleSleeplstrlenstd::locale::_
            • String ID:
            • API String ID: 1851032462-0
            • Opcode ID: 57475f5eeade9a15ba90b0c6b2e4b195fe2ff05ea7ed50c1724f462bec61f548
            • Instruction ID: fb2f2980a5cec065c818c72f0cd903d544b892519a5cffae962bad4956102fe1
            • Opcode Fuzzy Hash: 57475f5eeade9a15ba90b0c6b2e4b195fe2ff05ea7ed50c1724f462bec61f548
            • Instruction Fuzzy Hash: 49D1B262B08F8282EB10AF65E4442AD6361FF89FA5F446135EA5D87BB9DF3CD448C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
            • String ID: %s %s$%s%s$@$Windows\System32\svchost.exe$d91774dd-ee7f-4c3d-8560-05242810d920$h$nlyloadinmyself$plugmark
            • API String ID: 4033188109-3660303421
            • Opcode ID: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
            • Instruction ID: fe306dcbf4d5673d87923f8089fcc53a841e7bb8844e7ffeb4dbfb6de2113851
            • Opcode Fuzzy Hash: 046c22b18b6f5ac0ccc3cac11c7471c69f57d2820ce8935287c8eeb1aafb36af
            • Instruction Fuzzy Hash: AC129D62B18E8282E720CF26D4442BD67A1FB99B94F449136DB4D87BB6DF3CD589C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
            • Instruction ID: e13d6b8f71bca6a09f3ab91b32baccc296f4e54ee2543668324d977a89e65d26
            • Opcode Fuzzy Hash: 207f020c3be7a49f4dae7fd528dd377aaad196edefdcd6a65a6542525f0315a2
            • Instruction Fuzzy Hash: E8314C35A0CEC281F720AF25E8543AA6360FB88F66F406035DA4E96A74DF3DD58EC700
            APIs
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A5E5
            • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A66A
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A6BF
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A6DE
            • VirtualAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A741
            • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A762
            • HeapAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A776
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A793
            • VirtualFree.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A7AF
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74A7CC
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B73D242), ref: 00007FF61B74AAB2
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$Alloc$ErrorLast$FreeHeap$InfoNativeProcessSystem
            • String ID:
            • API String ID: 1282860858-0
            • Opcode ID: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
            • Instruction ID: dc3f825638a1ea23076682fd21a7a6aba27e98fa1c5b903e8180c37ca7a99551
            • Opcode Fuzzy Hash: 88d7adfe9b312bdb6fdf674f549a5cc549a824bf45d913ac83d4f697423f226a
            • Instruction Fuzzy Hash: 7AD18E32B19E4286FB61AB16E45077973A4EF4CFA5F456035CA4E87BB0EE3CE4498300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
            • Instruction ID: bbdb13ce30b56d2fdda25bc07881d197b0dd76bf34a5f3d7c4bcc7ad365b839a
            • Opcode Fuzzy Hash: eb7aa2d56a82b613c27039d286a92213749df77ba304c44aa2638bc2cb38e150
            • Instruction Fuzzy Hash: 39312D35A0CE8281F720AF25E8143AA6360FB88F66F406035DA4D96A74DF3DD18EC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue$ExitWindows
            • String ID: SeShutdownPrivilege
            • API String ID: 1423298842-3733053543
            • Opcode ID: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
            • Instruction ID: 7b45f7c75a3f359d9419bf77faae0275cde779c3a08c33e74f230644719c64a5
            • Opcode Fuzzy Hash: 2905a319caa5e6a93b8be62912fe952188e187deaf7a97c308075b004fe8cd81
            • Instruction Fuzzy Hash: 13310B35A08E8281F720AF25E8143AA6760FB88F66F406035DA4D96A74DF7DD58EC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
            • API String ID: 808467561-2761157908
            • Opcode ID: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
            • Instruction ID: bb4764ce74d0e8dcb3ea7205db22bc4e903921cc3d371dd12f1ec3efc0ce0a90
            • Opcode Fuzzy Hash: 622423286a591ad007cfa081ef015de5a4a39bf13039204cb660433145fa8b31
            • Instruction Fuzzy Hash: D3B2D4B2A186C28BF7658E64D4407FD37A1FB5CB94F406136DA0D97AB4DF38A908CB40
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Create$Event$CountCriticalInitializeSectionSpin$Heap$ProcessTimetime
            • String ID: <$<
            • API String ID: 2446585644-213342407
            • Opcode ID: b1ad8ba58de1e0846612e2a068909c756507ce6fc06109a86d1a20cc9e8294d7
            • Instruction ID: e2e36ccdb18254aab61216ce4b800d702bd31a1e28a7c113bbf3159a3f13fd8e
            • Opcode Fuzzy Hash: b1ad8ba58de1e0846612e2a068909c756507ce6fc06109a86d1a20cc9e8294d7
            • Instruction Fuzzy Hash: F2B13A72605B828AE744DF35E5853A937A5FB48F18F985138CB4C8BBB5DF38A068C714
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Close$OpenQueryValuelstrcpy
            • String ID: %08X
            • API String ID: 2032971926-3773563069
            • Opcode ID: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
            • Instruction ID: b4b15bdecbbb0d1d09458c8d137a8cf2ee8d1207a9206da6fb68d3940d0a9d65
            • Opcode Fuzzy Hash: 5daa38b5fec1510e7cc40f4dc4df9c16a8fb62c5527b438061e7080e78411b39
            • Instruction Fuzzy Hash: 86513B6260CEC185E7709B25E8443AAB3A1FB89B65F805135D79D83AB8DF3CD548CB08
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
            • TranslateName.LIBCMT ref: 00007FF61B767746
            • TranslateName.LIBCMT ref: 00007FF61B767781
            • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF61B75D4D8), ref: 00007FF61B7677C8
            • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF61B75D4D8), ref: 00007FF61B767800
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B7679BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
            • String ID: utf8
            • API String ID: 3069159798-905460609
            • Opcode ID: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
            • Instruction ID: 8b32030deef56045539bd4c6d8e378cb8c81ee44aededc1ddb08a2724aec319e
            • Opcode Fuzzy Hash: 8c099eda83a5c1324d953c8da46f7dcfc7382bd5fb40a4303c146f7c8692acb4
            • Instruction Fuzzy Hash: 79918B32A08B8285FB259F21D5416B9A3A4EB48FE0F44A531DE4C877B5EF3CE959C340
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAB5
            • GetUserDefaultLCID.KERNEL32(00000000,00000092,?,?), ref: 00007FF61B768294
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAE2
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAF3
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB04
            • EnumSystemLocalesW.KERNEL32(00000000,00000092,?,?,00000000,?,?,00007FF61B75D4D1), ref: 00007FF61B76827B
            • ProcessCodePage.LIBCMT ref: 00007FF61B7682BE
            • IsValidCodePage.KERNEL32 ref: 00007FF61B7682D0
            • IsValidLocale.KERNEL32 ref: 00007FF61B7682E6
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B768342
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B76835E
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
            • String ID:
            • API String ID: 2591520935-0
            • Opcode ID: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
            • Instruction ID: f6efc4335fbe0825ca0b3b59cd51469d28558c2dd13fe51585c7c1a07b7e094c
            • Opcode Fuzzy Hash: f1a69095846091a71a20ee3ef6c788d879191f60c9ca7d1b933c088628ba7f76
            • Instruction Fuzzy Hash: CB717FA2B18E828AFB119F61D8506BD23A0BF4CF64F446436CE0D876B5EF3CA549C350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 3140674995-0
            • Opcode ID: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
            • Instruction ID: 7a81d65ce28bd1bf827b1465f55d35594274b24820cddf8222fbee1ce72695fa
            • Opcode Fuzzy Hash: 18c7dfee12948f11b2b1ef149d65aa3e1b9c7e2d1ea7ed06afb51cbb3a88d299
            • Instruction Fuzzy Hash: DE315E72609F8186EB649F61E8403ED7364FB88B64F44543ADA4E87BB9EF38D548C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Event$ClearCloseOpen
            • String ID: Application$Security$System
            • API String ID: 1391105993-2169399579
            • Opcode ID: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
            • Instruction ID: 0bf1511d3921343cb2713f6b0e31046f2999a6e68702cf7067a43663e9b3f932
            • Opcode Fuzzy Hash: 2cf3709b3cb76df16a2a92579992847c2f846cbe0948eda6c13293e34c808135
            • Instruction Fuzzy Hash: B4F03136E0DF4281EA15DB15F914265A3A4FB8CB74F446435C94D83774EE7CD09A8710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
            • String ID:
            • API String ID: 1239891234-0
            • Opcode ID: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
            • Instruction ID: 03af49e0e59d7377cee025c0b04b36e42dbd6627f815e1072e477990c7a49258
            • Opcode Fuzzy Hash: e6fb25ffa18b66ffda036dc74a26e2becfae59b68bb230e1827b5a608bc93c87
            • Instruction Fuzzy Hash: 58314132618F8186EB64DF25E8402AE73A4FB88B64F541135EA9D87B79DF3CD549CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: FileFindFirst_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2227656907-0
            • Opcode ID: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
            • Instruction ID: b7b714819cd076c10b55764a1dd48cde90d52aaac94571416d6b9720145734d9
            • Opcode Fuzzy Hash: 116a84698524b3bcd43aaaa4f2cca2c7c536e0f4c45a8280c933762a24cf8a5b
            • Instruction Fuzzy Hash: 2BB1D322B18ED241FA649B2598002B963A2EB58FF0F446131EA5E87BF5DE3CE549C300
            APIs
            Strings
            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF61B74C78F
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: DebugDebuggerErrorLastOutputPresentString
            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
            • API String ID: 389471666-631824599
            • Opcode ID: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
            • Instruction ID: e7294939c5042319fc395aafc31ed485c55f8eaf124f9d9cf6c582c0946369de
            • Opcode Fuzzy Hash: efbf15865cd5c1087f73e292c5c5f3e8b2dd5a504a7ddbe30f15df4fd023cf7f
            • Instruction Fuzzy Hash: 65116A32A18F8297F7059B22E6403B932A4FB48B61F446135C64DC6A70EF3CE0688700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: memcpy_s
            • String ID:
            • API String ID: 1502251526-0
            • Opcode ID: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction ID: b75a60ef1554bc0012cde2504d4f903d23c9e5cc78512841a12ac7ddb24a7b9b
            • Opcode Fuzzy Hash: a3a34dc7f104a5757306e0e4006adbba08ef9a00a3e13a0073f806107d450ba3
            • Instruction Fuzzy Hash: 67C1E372B18A8A87E7248F15A04467AB795FB88B94F44A135DB4AC3B64DF3DE805CF04
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAB5
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B767C0C
              • Part of subcall function 00007FF61B763D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B763D49
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B767C55
              • Part of subcall function 00007FF61B763D2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B763DA2
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B767D1D
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1791019856-0
            • Opcode ID: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
            • Instruction ID: fa94a70fe648b304bf968e5938f55043cbd403f8697353f83ff929fe4df4f231
            • Opcode Fuzzy Hash: 605c002cd1232363f8b97f7bb09a672fc6956a026fdc72186da3fd3d1de90a13
            • Instruction Fuzzy Hash: F5616F32A0998286FB748F15D440279B3A5FB88BA4F446135CB5EC76F5EF3CE8599700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID: GetLocaleInfoEx
            • API String ID: 2299586839-2904428671
            • Opcode ID: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
            • Instruction ID: e3a076898520adb35bdee117f28612e8f842347129d91c4a922d38ea3dfc90d6
            • Opcode Fuzzy Hash: 053289818baea42516c59c341b95a57cf593464f2c81e046735848086310e6c4
            • Instruction Fuzzy Hash: CC018421B0CE8285F7049B57B4440A6A6A0EB8CFE0F555036DE4D97B75CF7CD9498340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ExceptionRaise_clrfp
            • String ID:
            • API String ID: 15204871-0
            • Opcode ID: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
            • Instruction ID: 79e20da81089155f3c74fb6b422934d202cab6d91dc687234face20e8dbada07
            • Opcode Fuzzy Hash: d1d57c0b9bdf7be1867346d5e9c7cf9c26021b93baf768b42c1e913034eff148
            • Instruction Fuzzy Hash: ECB15B73A14B898AE715CF2DC8863683BA0F788F58F198925DA5D877B4CF39D455C700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID: $
            • API String ID: 0-227171996
            • Opcode ID: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
            • Instruction ID: 4e210b9b335ece5598be1a67450de7fc829843640a30cf9ee974a09b4de49ac7
            • Opcode Fuzzy Hash: f4d1caadcdf6a988165dfb6027386ea397a00727bebf28c93510380ffb834353
            • Instruction Fuzzy Hash: 24E1B472A08E4686EB688E29C05013DB7A0FF4DF68F146135DE5E877B4CF29E849C748
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID: e+000$gfff
            • API String ID: 0-3030954782
            • Opcode ID: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
            • Instruction ID: c3121195af7de7610d6d7bd01c96290bc6436f20b679c12e142d60f49f5d5b16
            • Opcode Fuzzy Hash: 7a480f9cb63785b231e93cdb4053ba6ead140b4a31814c2e6dd1f53a1ff5a9d1
            • Instruction Fuzzy Hash: E3517962B18AC546E7248E35980076D6B91E748FA4F48A631CBA88BAF5CE7DE0498700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Info
            • String ID:
            • API String ID: 1807457897-0
            • Opcode ID: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
            • Instruction ID: 11cfab25e5f325f9a3e7f1df8beb93e0bb6ad9a107719b9799fec761e1f5ddbd
            • Opcode Fuzzy Hash: 7f0259b4a75c2d79dd05197e9e3c50a83c61ba8df8d38db5a1941d1f165b01d3
            • Instruction Fuzzy Hash: DA12A022A08BC186E751DF3895542FD73A4FB5CB58F05A235EB9D826A2DF38E589C700
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
            • Instruction ID: 9f5c44eaadad13e565dcd28a17d4082e83e42a62bc2218006375d5c3415f399e
            • Opcode Fuzzy Hash: a2a91221a961958e25f62bfb1168308d288fd5f56a1465658bce0cb830e97a7a
            • Instruction Fuzzy Hash: 56E16E22A04F8186E724DB61E4506EA77A4FB58B98F405635DF8D93BA6EF38D249D300
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID: [RO] %ld bytes
            • API String ID: 0-772938740
            • Opcode ID: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
            • Instruction ID: 385709170744917da1be94b38832c2518d11572e0c4f6b1d842f736f7e353df2
            • Opcode Fuzzy Hash: 2a2e8e66bac2129e6156a5cab3092c46a0c869edfc0550a0c0319ad8eb13d815
            • Instruction Fuzzy Hash: 8342C1336097C5CFC328CF28D48026E7BA1F759B44F448129DB8A87B66DB38E859CB51
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
              • Part of subcall function 00007FF61B75EA70: FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAB5
            • GetLocaleInfoW.KERNEL32 ref: 00007FF61B767E50
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLastValue$InfoLocale
            • String ID:
            • API String ID: 673564084-0
            • Opcode ID: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
            • Instruction ID: c9d162888cd5c2a2bc64fb6a9a8d6d59f5e7e76578776ffc7d36fb1bb66270d5
            • Opcode Fuzzy Hash: b88317f099404d3c0d10a5a24cf9ae58312b9b643a33a099b411d16474a7bbc4
            • Instruction Fuzzy Hash: 9F317331A08AC286FB648B25D4417AAB3A1FB4CB94F44A535DA5DC36B5EF3CE8498701
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF61B768227,00000000,00000092,?,?,00000000,?,?,00007FF61B75D4D1), ref: 00007FF61B767AD6
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
            • Instruction ID: 5ab3470ccc11e879b6d42dbd82bdf2f2b16cb6ec8c9436c2101a2d805357caeb
            • Opcode Fuzzy Hash: ddf0bcd54fee30cee3c2fa2f3cf32a3156214357c3b61558b17e74e9ba4e1d34
            • Instruction Fuzzy Hash: BC11C667A1CA858AFB148F29D0806B877A1EB44FE0F545135CA19833E0EE28D6D5C740
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
            • GetLocaleInfoW.KERNEL32(?,?,?,00007FF61B767D9A), ref: 00007FF61B768027
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$InfoLocaleValue
            • String ID:
            • API String ID: 3796814847-0
            • Opcode ID: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
            • Instruction ID: 7280f0f79a0b78d76d1220012b8e9d484803faea7f5d3202bfe66623a64e0b5e
            • Opcode Fuzzy Hash: 4756a55a6f6df2e1738916ac1a71c6225747ce609875c26223506d2cfc4742c0
            • Instruction Fuzzy Hash: 75113D71F1899283FB748725A04067E6251EB4CBB0F546A32D76D876F4DE2ED8858700
            APIs
              • Part of subcall function 00007FF61B75EA70: GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
              • Part of subcall function 00007FF61B75EA70: FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
              • Part of subcall function 00007FF61B75EA70: SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
            • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF61B7681E3,00000000,00000092,?,?,00000000,?,?,00007FF61B75D4D1), ref: 00007FF61B767B86
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$EnumLocalesSystemValue
            • String ID:
            • API String ID: 3029459697-0
            • Opcode ID: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
            • Instruction ID: 1126e8241a9301342310c248007c982ca19425be2b2d5e62c9bf12ff0bcccc32
            • Opcode Fuzzy Hash: bc703af400f14b42b20c9fcb5047461b7f50c903457c8d4997ca4285d83e45ea
            • Instruction Fuzzy Hash: 5201B972E0C6C586F7144F25E4407B9B6B1EB48FF4F55A231DA2D872F4EF6894898700
            APIs
            • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF61B760CDF,?,?,?,?,?,?,?,?,00000000,00007FF61B767088), ref: 00007FF61B760887
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: EnumLocalesSystem
            • String ID:
            • API String ID: 2099609381-0
            • Opcode ID: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
            • Instruction ID: dc0f42e06eb7eebbac30345e2af7295b0e439e5931b7306ce3dd3a0461674b08
            • Opcode Fuzzy Hash: 0da49028f00012ccddbac4aa6a8129618cfbebd136c027dc8325545b3ece71c8
            • Instruction Fuzzy Hash: 05F01972A08F4183E704DB29E8902A92362EB9CBA0F54A035DA4DD7375CE3CD4998740
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID: gfffffff
            • API String ID: 0-1523873471
            • Opcode ID: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
            • Instruction ID: 6d3781d56f6a1b93ff618b624aaecbe6a77217ca6b19a95fb6a0817c2b820954
            • Opcode Fuzzy Hash: 172941b2f1d4039ba21c6dc8853c143536a16ca8654b5df5f12dde2487208479
            • Instruction Fuzzy Hash: 38A15863B08BC546EB21DF29A4407AD7791AB58FA4F04A031DE8D8B7B1DE3DE509C701
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3916222277
            • Opcode ID: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
            • Instruction ID: 8b98bc849f797cee98fc7221720a96c61550d34602d4e0c9b69cc0248aa634c6
            • Opcode Fuzzy Hash: 6871d27396c91e0bed272bc22aae0ea20e11987830d478801ef476eeb5b70fb8
            • Instruction Fuzzy Hash: 0FB1A172908B8586E7648F39E05017C3BA4E74DF68F242135EA4E973B9CF39E449C748
            APIs
            • GetLastError.KERNEL32 ref: 00007FF61B7627E9
              • Part of subcall function 00007FF61B760788: HeapAlloc.KERNEL32(?,?,00000000,00007FF61B75EC4A,?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000), ref: 00007FF61B7607DD
              • Part of subcall function 00007FF61B75E6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6D2
              • Part of subcall function 00007FF61B75E6BC: GetLastError.KERNEL32(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6DC
              • Part of subcall function 00007FF61B769FAC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B769FDF
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
            • String ID:
            • API String ID: 916656526-0
            • Opcode ID: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
            • Instruction ID: cef330402f651af9fb9094b60467e3db2ca1c4b63510dff73b9dd0bf998a7ef9
            • Opcode Fuzzy Hash: c069c10827176b9df77e9eacd146a24f3ebe0e1c557e8cf5116eb7accc2f9201
            • Instruction Fuzzy Hash: 7141F721F09AC341FAB15A22685177A62907F9DFE0F446535EE8DD7BB6DE3CE4094700
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction ID: ea8057b0bb0761df68a05da1259849286377d17061389988ab1509f21aaec746
            • Opcode Fuzzy Hash: f9d3e26cd520c0d7484bca21c75386a0081201fe8f2cf936fcf25e5b7a4aa551
            • Instruction Fuzzy Hash: F622CEB7B3805047D36DCB1DEC52FA97692B7A5308748A02CBA07C3F45EA3DEA458A44
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction ID: 2a8fb52169cce43ecb3bb912cc23239560564c9264b6f310f4e3099c7fd1f3fe
            • Opcode Fuzzy Hash: 2dbab6f601d912f7832fe87e6cb8010b159b99cec89eaaed4f22644e13967388
            • Instruction Fuzzy Hash: 77C13373B19A9187DB09CF26D950579B792FBC8BE0B41D134CA4A47BA8DE3CD805CB00
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
            • Instruction ID: 40d7ac394b627c87d8476ef9c3f8bf02d9c25f8550ff61e3085041b596709926
            • Opcode Fuzzy Hash: 4fe8ec01f60584a1ee149ae2a08fff37cdae008ac808ef4f9df4273de0df04db
            • Instruction Fuzzy Hash: D3D1E522A08E4686FB688E25D45027DA7A0EF4DF68F146235DE0D876F5DF3DE849C348
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
            • String ID:
            • API String ID: 4023145424-0
            • Opcode ID: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
            • Instruction ID: a442f4a8602534f4ff2f74f2505bbb5c7d9657dddac589e3c16c7f44f7318962
            • Opcode Fuzzy Hash: 8a64524f1fb9e6959651956f91e34aa30073aa11383fd560e196b95c26644943
            • Instruction Fuzzy Hash: 09C1EA65A08A8185FB609B619410BBA37A4FB98FE8F406035DE5EC77B4DF3CE54AC704
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$Value_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1500699246-0
            • Opcode ID: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
            • Instruction ID: e4fb83bcccc2bf873c64a7d5d24e0bc6c59259131ee7c9e3ab3c5a33dde1bd28
            • Opcode Fuzzy Hash: 40463cb8fd89e5f38144c8e404f20e2a32259e43623898d7ad92a87b920fc9c4
            • Instruction Fuzzy Hash: 57B1E532A18AC686FB649F21D4116B973A0EB48FE8F506131DE59C36F5EF3CE5498740
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
            • Instruction ID: ae2c39cbce8c3b1462b0ec9b6c697ae4c5c68c462068563ef8576ad7ddcb1399
            • Opcode Fuzzy Hash: 4fe3a20954eaf19cca18b720aca6cea66dcaf64d55a17c7986fbc43ae61592d0
            • Instruction Fuzzy Hash: 8AB17172908A8585EB648F29E05027C3BA0F74DF68F246135EB4E873B5DF39E549C748
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID:
            • API String ID: 3215553584-0
            • Opcode ID: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
            • Instruction ID: 9b1ec306a0da6dd7dc71fa3cdd18b68a520f0a1a284d2bee9347475d34c0449a
            • Opcode Fuzzy Hash: 7c967eb539ab6c81368948c69a9b6320c10fa2f7b73efbe3c4b6df7895ae468e
            • Instruction Fuzzy Hash: E6818F72A04F5186EB64EE29D49137D23A0FB48FA8F149636EE1E877B5DF38D4498304
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
            • Instruction ID: 2f873fd5bc8bc95e2ab4f8fcce94e7ae986022dace88ddda1add518f68bba40d
            • Opcode Fuzzy Hash: aa2f4ae56baf169408e60df2444458542a3c73068db43e6345bf2ec4a63d4b14
            • Instruction Fuzzy Hash: 4381E672A08B8146E774EF19944037A7691FB4EBA4F145239DA8D8BBF9DF3CD4488B04
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction ID: 3de1a197cd164e89ff893ee23c5bc5b1b9bb470655d851dcd34a861fc3546d05
            • Opcode Fuzzy Hash: f6f6a1a1a1cf9baf0de81f1e4df80e775a01d7d2970379cd065fadcfc056c7f6
            • Instruction Fuzzy Hash: 1261E762B14F8982DF208B19E4416A9A360F75DB90F546331EB9C87BA4EF3DE194C340
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction ID: c14727ac153fce8a78e5a7ea2a7abbecafac96647c9cd6213d94deb0b41138cf
            • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
            • Instruction Fuzzy Hash: FD516D72A18E5186E7248B29C05432C33A1EB48F78F24A135DA4DD77B4CF3AE84BC744
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction ID: d820d8d33a070291e9adb1d3b3b2608a7e9d2295a0b056dfef4c025565f9a4dd
            • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
            • Instruction Fuzzy Hash: 96518136A18E5582E7648B29C45032827A0EB49F78F286131CA4D977F8CF3AE857C784
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction ID: d46e004ac597c53d633e3815e487d8a071c81c9b649741ac1d7ed7efbcfe2e28
            • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
            • Instruction Fuzzy Hash: 01515F76A28E5186E7248B29C05436837A1EB48F78F24A131CE4DD77B4CF3AE857C784
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction ID: 38769905863c73c216d170e8cbd0d0630717b3bd19fe8af95ac6b365e4a6dff1
            • Opcode Fuzzy Hash: f6a3dccb135ddd09f63c505db29ff29986bf9dd63497299e7c799fac6b959aa4
            • Instruction Fuzzy Hash: 39518072A18A5586E7248B29D0543383BA0EB4CF68F246131CE4DD77B4CF3AE947C784
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction ID: 98f2f714b0bda6e59d634b3f73b242f96ab1b09e7aec8c4041df9759c96db1bd
            • Opcode Fuzzy Hash: db363646d287334b7a31293e9082935613ba5dde14aee32d187fc7345eaa1eeb
            • Instruction Fuzzy Hash: 16519376B18E5586E7648B29C04423837A0EB4DF68F286131CE4C877B8CF3AED56D784
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction ID: 7c55191eae1b6d4cff4e1b23cc42c3822d7e635323bf153891a7d93b931b77f5
            • Opcode Fuzzy Hash: e46230d8c0bb23a9b26f12389beaf27d8e9063d4bba2e4d98de2a57eaa924be5
            • Instruction Fuzzy Hash: 54517276A28A9186E7248B29C04032D27A1EB48F68F246131CE4DD77B5CF3AE84BC744
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorFreeHeapLast
            • String ID:
            • API String ID: 485612231-0
            • Opcode ID: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
            • Instruction ID: 7fbd7c615cce6ab12a884dcdf26d9a5ae99cf6f44af8886663f5701cfd6ffbc2
            • Opcode Fuzzy Hash: 4d1d88932efd7b63ecfdde29945dfc17fd218d95b7e0763bafd054a92f058063
            • Instruction Fuzzy Hash: 9441FF62714E5482EF04CF2AD92426963A1FB4CFE4B58A032EE0DD7B78DE3CC4458304
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
            • Instruction ID: 3d2f642a9756c2fb89c4aee7cbe336a56936900946f949743817b0472747964f
            • Opcode Fuzzy Hash: 8325bb8896eb9c8ae2d46c5932a003c3c7f8bfc008283704c68a5069cd28ac66
            • Instruction Fuzzy Hash: 45F06871B18A958ADB948F78A802A2977D0F70C790F409539D58DC7B24DF3C95659F04
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
            • Instruction ID: 9037f75cd14a16e157148409741755e203331779727234652dd07dead20c1728
            • Opcode Fuzzy Hash: 174bfe62ffdb35f0a8b82215b8c446e4258c47945d5cfe3425f7157a53489505
            • Instruction Fuzzy Hash: 3CA0026194CC46D0F6099B01ED550702330FB58B31B823431D11DD5071AF3CB508C301
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Event$Message$Reset$CloseCriticalErrorLastPeekSectionThread$CurrentDispatchEnterHandleLeaveMultipleObjectsSwitchTranslateWaitclosesocketsendshutdown
            • String ID:
            • API String ID: 4058177064-0
            • Opcode ID: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
            • Instruction ID: 53776cf3df4a58062cdef40fef400a6478325d1645913e133d3a817698ea0ebc
            • Opcode Fuzzy Hash: 1d5cc57fb7fbf7527f04433d1c2939eb4b1b6e6938b0e21f75a258dbfa576023
            • Instruction Fuzzy Hash: 82914D76A08E8297E758DB25E5846A973A0FB48F60F446535CB5DC7AB0CF3CE4A8D700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
            • String ID: "%1$%s\shell\open\command$WinSta0\Default$h
            • API String ID: 1783372451-551013563
            • Opcode ID: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
            • Instruction ID: 84e26623351823f9a5117c91a704100f3b53845b377d3d37ca59917b3e44976d
            • Opcode Fuzzy Hash: 2aa4d3ebf5c45bd74505c1267e1058c2c24ed9b570e41b1434e0a24903c1c98a
            • Instruction Fuzzy Hash: 67618022A18F8285FB21DF61D8442FD2360FB9DB58F446135DA4D96AB9EF3CD248CB40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ByteCharEventMultiWidelstrlensetsockopt$CreateErrorIoctlLastSelectconnectgethostbynamehtonssocket
            • String ID:
            • API String ID: 1455939504-0
            • Opcode ID: 6f0a85a34c6bb75636ccf932ec56d1350418621ff62b1755ad958c4a4e8ec29f
            • Instruction ID: 129d55d35b5e63480a70e28a9a7e077ca1c06657ffb2dde95d725c3613c6b682
            • Opcode Fuzzy Hash: 6f0a85a34c6bb75636ccf932ec56d1350418621ff62b1755ad958c4a4e8ec29f
            • Instruction Fuzzy Hash: 1E514E36608E9186E724DF21E84026A77A5FB88FA4F501235EE9D87BB8CF3CD549C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
            • String ID:
            • API String ID: 2081738530-0
            • Opcode ID: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
            • Instruction ID: 449279cb35e3dd939f6df50235ed0337c125a67b9e27d94eabcd5d01c2cc7d82
            • Opcode Fuzzy Hash: 86a4ff4925cbc545ad5961b211c5cb2ede80d6a6447645a52bcc9b3ede11fd42
            • Instruction Fuzzy Hash: D6515D22A09E4285EB15EB26E44417937A1FB5CFB1F186132DA5E87BB5DF3CE44AC700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$EventTimetime$EnumEventsNetworkResetSelectsend
            • String ID:
            • API String ID: 957247320-3916222277
            • Opcode ID: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
            • Instruction ID: e189242e0d3a87ffa664fd20ab181df25565518148e04d014053bf6b6bff8983
            • Opcode Fuzzy Hash: 70faab5df619376ecbd789658116d1a95d03484d4b81b7d6c2cb32eb3eab3399
            • Instruction Fuzzy Hash: BA715E76A08A828BE368CF29D58436977E0FB48B68F545035CB4DC76B5CF7DE4498B40
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
            • Instruction ID: e67a76a305731ccb5fb78f58bbfac0d40cef697cb8f2d0501149ba5ec2eb043c
            • Opcode Fuzzy Hash: ce0fa88aebe3efe6d4cfa5056a018ff2338e1d011f624170396f62e2d62db8ee
            • Instruction Fuzzy Hash: FB61AF32B08E8282E758DB22E55467D6365FB88FA5F856031CA1EC76B0DF3CE459C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
            • Instruction ID: 5ea37a068f7dc016c3429ec0396be9b776d9fad876e3410851a13f6ec50f9092
            • Opcode Fuzzy Hash: b12bcef403b9db2977f705d0ecef41abbd2038a6eeb512479f31e0cb207d576e
            • Instruction Fuzzy Hash: 4A314E22B0CE8282F758EB2599981796765FF4DFA5F542034DA5ECAAB1CF2CE449C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseValue$CreateDeleteOpenlstrlen
            • String ID: Software$VenNetwork
            • API String ID: 3197061591-1820303132
            • Opcode ID: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
            • Instruction ID: 72e755b35a5fe8fb5c9e62f61ed4c08bc49a5d38e3455a3deb25d379acef4106
            • Opcode Fuzzy Hash: 977d34d6a8543d540e474d7a41a606a027e4303f67bb5f64f5b8d5885a1a35b1
            • Instruction Fuzzy Hash: A1213E26618E8086EB109B22E84465AB761FB88FB1F845131DE5D87B78DFBCD14DCB04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalErrorLastSection$EnterLeave
            • String ID:
            • API String ID: 2124651672-0
            • Opcode ID: 1e7b01e8061498853063041e14b47fd2e59aeeeabd15da1d9f1fa77a953021b1
            • Instruction ID: 26750c8fc86f534185ca7a293ce92d3c9460d2dd981cafd8bb3a959a061106d0
            • Opcode Fuzzy Hash: 1e7b01e8061498853063041e14b47fd2e59aeeeabd15da1d9f1fa77a953021b1
            • Instruction Fuzzy Hash: 78519B32A0CA428BE764EB15E54067C77A5FB4CFA4F456139EA4E877B1DF28E8098740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$f$p$p$f
            • API String ID: 3215553584-1325933183
            • Opcode ID: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction ID: 24a076bcaad609fbf2344039e9ef7e4694700c14a03368b2e6024f3eacca1513
            • Opcode Fuzzy Hash: 338c2a64cdc3021812c5b6ddca5db7159329e9a17ba8d876efc02d9e71b2fbd5
            • Instruction Fuzzy Hash: DE12A472B0C98386FB649F15D0447B97261FB84F64F946135E68A866FCDF3CE4898B08
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$setsockopt$CreateEventResetTimerWaitable
            • String ID:
            • API String ID: 2911610646-0
            • Opcode ID: 29f4db180f811eed727e115f3e9634c508b58a893b040440cf1ba2de9885e7b9
            • Instruction ID: 48f04ffd86299624d9af11e722ef2a81c23d038302f9ac40f3eed4481a85ce8a
            • Opcode Fuzzy Hash: 29f4db180f811eed727e115f3e9634c508b58a893b040440cf1ba2de9885e7b9
            • Instruction Fuzzy Hash: 34515576A09A8287E718DF25E94436977A0FB48B64F401135DB4C9BBB0DF7DE46A8B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
            • String ID:
            • API String ID: 3019579578-0
            • Opcode ID: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
            • Instruction ID: e6c97d53857360956f73bac908912a06c79a4cb32c9ca3e78ba9ac8760922d21
            • Opcode Fuzzy Hash: 0f5c7540d6a6d13954bf3b0610fbdb20e4227d3d9c7ae04a05d2493569245aae
            • Instruction Fuzzy Hash: 65414E72918A828BE770DB15D54423E7761FB88F64F542135DA8E87AB4DF3CF8898740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterErrorLastLeave
            • String ID:
            • API String ID: 4082018349-0
            • Opcode ID: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
            • Instruction ID: ffbf9d13891e8126c94defdbbe6571eb9692a39be24615dfd96eaa2e46d6c634
            • Opcode Fuzzy Hash: 67fb679d431cd07a0a75245ad9faae6b58536de87acf8e54a525854fe2ab2b98
            • Instruction Fuzzy Hash: A8310832A18D928AE790DF25D58827D37A4FB48F59F842031DA0ECA6B5DF3DE859C701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
            • Instruction ID: 3d6bdd4b82ad3c682e58e209cb4c3687b439df35bfc6d79a1243febddeeecab1
            • Opcode Fuzzy Hash: 2b2ef099c7c498c1f83d83cf8365c45f4a2add1e44776cae4b3bb5ec5925f551
            • Instruction Fuzzy Hash: 39D19372A08B418AEB219F25D4413AD77A0FB4DBA8F102135EE4D97BB5DF38E588C705
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AddressFreeLibraryProc
            • String ID: api-ms-$ext-ms-
            • API String ID: 3013587201-537541572
            • Opcode ID: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
            • Instruction ID: dd48f24345670fee81869d5452789afbebe9777fa5655f6fd2916dc6b08beada
            • Opcode Fuzzy Hash: 7440c042807cac739352953deb803b73dd017de38a4217708bea05fa604c5186
            • Instruction Fuzzy Hash: C141D121B19F4245FA16DB16A85027623A1BF4DFB0F486536DD0DDB7B4EE3CE4498300
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Filelstrcatlstrlenwsprintf$CloseCreateEnvironmentExpandHandleStringsWritelstrcpy
            • String ID: %s %s
            • API String ID: 958574092-2939940506
            • Opcode ID: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
            • Instruction ID: f83be216e75f9304c29c468c23122f9c9cc5206648376d97103a6919ab4c3326
            • Opcode Fuzzy Hash: eceb82c3cd3af4ca55499d5fe9bd5fadc0488819e054981a88d383308b1fa06d
            • Instruction Fuzzy Hash: 7D413222A18FC681E711CF28D9042FD2720F799B58F55A325DB4D56672EF39E2D9C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave$ErrorLastsend
            • String ID:
            • API String ID: 3480985631-0
            • Opcode ID: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
            • Instruction ID: bc22343b1e8792f6a37aacb44944d98bd4eeda95db72ff45e1a5391c6b0688be
            • Opcode Fuzzy Hash: dcbfb0b2159904ea6d1c624c1834ef820b2325ccb56d393d0a5f1f6bb36a758c
            • Instruction Fuzzy Hash: D6410536608A8182E758DF26E5442AC73A4FB48FA8F582135CE5D8BB78CF38E559C750
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo
            • String ID: f$p$p
            • API String ID: 3215553584-1995029353
            • Opcode ID: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction ID: 720b72a87b25a9a0cf118c5a3a050c51407a3b5d24baeb8b93a80cf7296719fb
            • Opcode Fuzzy Hash: 42fb3e65d0f17d18353857ebdda260012259b146ac6ef5ada1715a4ca3ec7708
            • Instruction Fuzzy Hash: DF12B571E0C94786FB205A15D0542BA72A2FB89F70F885135D6DA876F4DF3CE588CB18
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$ErrorLast$EnterLeave$CurrentThread$EventsMultipleTimerWaitWaitablesend
            • String ID:
            • API String ID: 2807917265-0
            • Opcode ID: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
            • Instruction ID: 120baafd099740344646c24f1cfcd04316b9f116ed5eac5ba23e58c8e7794edf
            • Opcode Fuzzy Hash: 495490e7d3477735b75ad2edb0a11b0efccf73ea01b4538bcbeaf1220e2ab4c3
            • Instruction Fuzzy Hash: 20513376A08E4286EB68DF25984427D23A4FB48F78F546635DE5EC77B4DF38E4488700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: std::_$Lockit$GetctypeGetwctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
            • String ID: bad locale name
            • API String ID: 1386471777-1405518554
            • Opcode ID: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
            • Instruction ID: 3d9cf6c04496632deceb84de4457cf836151dc1569b461a491542d96b48be7a7
            • Opcode Fuzzy Hash: 1e5e98c9536fad76aa215f10c33411828afcd6fe37bfa1046ea3f08e32c02a87
            • Instruction Fuzzy Hash: 24515D22B09B418AFB15DBB0D4902BC3370EF58B68F445135DE8DA6A76DF38E55AC304
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: std::_$Lockit$GetcollLocinfo::_Locinfo_ctorLockit::_Lockit::~__invalid_parameter_noinfo_noreturn
            • String ID: bad locale name
            • API String ID: 3908275632-1405518554
            • Opcode ID: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
            • Instruction ID: f6bc459557081ddc07fa929aba6455ad41c2a1a9e2880feb7c60f41d30fc0d95
            • Opcode Fuzzy Hash: b631740363b0e831fde9baf712990589db3f9d8b5b5567fa3c7a7b01eb85b2e8
            • Instruction Fuzzy Hash: 9F517A22B09B4189FB10EBB1E4503AC33A1EF48B69F445135DE4DA7AB9DF38D40AC304
            APIs
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF61B7537DE,?,?,?,00007FF61B7534D0,?,?,?,00007FF61B750109), ref: 00007FF61B7535B1
            • GetLastError.KERNEL32(?,?,?,00007FF61B7537DE,?,?,?,00007FF61B7534D0,?,?,?,00007FF61B750109), ref: 00007FF61B7535BF
            • LoadLibraryExW.KERNEL32(?,?,?,00007FF61B7537DE,?,?,?,00007FF61B7534D0,?,?,?,00007FF61B750109), ref: 00007FF61B7535E9
            • FreeLibrary.KERNEL32(?,?,?,00007FF61B7537DE,?,?,?,00007FF61B7534D0,?,?,?,00007FF61B750109), ref: 00007FF61B753657
            • GetProcAddress.KERNEL32(?,?,?,00007FF61B7537DE,?,?,?,00007FF61B7534D0,?,?,?,00007FF61B750109), ref: 00007FF61B753663
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Library$Load$AddressErrorFreeLastProc
            • String ID: api-ms-
            • API String ID: 2559590344-2084034818
            • Opcode ID: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
            • Instruction ID: 2cbf76ba3475765508fa118ab683cd29f0ca335050df0efc18d2dce1ba0bce52
            • Opcode Fuzzy Hash: 79f1708f0d73a3895a2fe6d32fc30880b345232a89ca131bb8ab1f3b75cbd6b1
            • Instruction Fuzzy Hash: 00316121A1AE4191EE21AB1698405796394FF4CFB4F5A253ADD1FCB3B0EF3CE5498704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AttributesCreateErrorFileLastProcesslstrlen
            • String ID: WinSta0\Default$h
            • API String ID: 591566999-1620045033
            • Opcode ID: 9328811ce07eccb9baa46191bf573199de9204eba7fc0589a085695e6e112cb4
            • Instruction ID: a47f0b8ace24ca28e063f3d6c7ead3063c188417ac14b2c56d57e3782f8d6c34
            • Opcode Fuzzy Hash: 9328811ce07eccb9baa46191bf573199de9204eba7fc0589a085695e6e112cb4
            • Instruction Fuzzy Hash: EF316821E0CBC246E6609B15B5043BA6391FB9DBA0F406335E99DC7BB5EF7CD4988B00
            APIs
            • GetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA7F
            • FlsGetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EA94
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAB5
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAE2
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EAF3
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB04
            • SetLastError.KERNEL32(?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F,?,?,?,00007FF61B756443), ref: 00007FF61B75EB1F
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
            • Instruction ID: 927fda394f0d7a1ae0885b35ac148f63ee7396ff554b7657c890c126fc8cc098
            • Opcode Fuzzy Hash: 0e252fc1aa08c509f0e93816402eca9f1f65028cc0729f634b753678d4cd798a
            • Instruction Fuzzy Hash: 65219D60B0DE4281FA596B3155850396162AF4CFB0F04AB38E87FC7AF6DE6CF8095344
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
            • String ID: CONOUT$
            • API String ID: 3230265001-3130406586
            • Opcode ID: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
            • Instruction ID: afadf9a6079624e9d62a2170173f1c73d93f9ea73e716d253bb0b68ccf8e2506
            • Opcode Fuzzy Hash: c477bea2d07ef44c7e07df60decfd2619db83e7f0bc9226f08f6201d8069434b
            • Instruction Fuzzy Hash: 5B113721A18E8186F7509B52E854729B6A0BB8CFF4F445234EA6EC77B4DF7CD8588740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
            • String ID:
            • API String ID: 4202892810-0
            • Opcode ID: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
            • Instruction ID: 4d6ba4cdd66f570ef4d910ac4be5edc74046e1c1403bda2e7026b0a262e45fb5
            • Opcode Fuzzy Hash: 6d311e261bfe59e5949d3104aa2c883e73ffb96b44e413d4cc9c1204dacd56c9
            • Instruction Fuzzy Hash: 80114861A08E8282F710AB11F8487297760EB8CFB4F506231DA6A4BBB4CF7CD54D8B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value$CloseDeleteOpen
            • String ID: Console$IpDatespecial
            • API String ID: 3183427449-1840232981
            • Opcode ID: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
            • Instruction ID: 01e65d6a62866dd7b4def7727823b84205f5e89b545a98a5549f05e6f492347b
            • Opcode Fuzzy Hash: f23957102dd5c337703c86b23f0909451c31f6d4053b1f337106711f9d04a52f
            • Instruction Fuzzy Hash: 20013936A08EC186E7219F24EC247A93720EB88B65F446122CE4D877B8DE7CD19DCB04
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
            • String ID:
            • API String ID: 3421218197-3916222277
            • Opcode ID: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
            • Instruction ID: d7bb7edc2672a5f13770ff6ce0acc85b0d8c0e9b4a257351e88c98292d497ea6
            • Opcode Fuzzy Hash: 190dd20226834de6593c2658ef490eeec5e65b5d977b517c4b94419b13326a92
            • Instruction Fuzzy Hash: 94F01232618EC186EB609F24F85875EB7A0FB8C794F902135D68E86A74DF3CC149CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLast$recv
            • String ID:
            • API String ID: 316788870-0
            • Opcode ID: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
            • Instruction ID: f48adce9b97e5756e97911663fcd85710bc713b94c4a30bc03c7e974a6bfd605
            • Opcode Fuzzy Hash: 4d768c99772465553fa61935876ff201d4a32ce5a3f2b2de379ff66690b2a509
            • Instruction Fuzzy Hash: 36316176A1CE4281FB64DF29E48437D27A1EB48F68F942536CA4DC62B4DF3DD8489701
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 3523768491-393685449
            • Opcode ID: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
            • Instruction ID: dd029e7f72056a9d1989d4d71ab870ec7477c8b9981bbd6bb06ce3dca05ba15c
            • Opcode Fuzzy Hash: 89a7cbb458af1ec799ed0823309e47d85c371afd6e512bd69dcc86c67ccd7e4c
            • Instruction Fuzzy Hash: 2CE1B373908B828AE750DF65D4803AD37A0FB49B69F102135DA8D87A75DF38E589C705
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: EventReset$Thread$CurrentErrorLastObjectSingleSwitchTimeWait_invalid_parameter_noinfotime
            • String ID:
            • API String ID: 2235205178-0
            • Opcode ID: 6797ce520ad4e8d809bfec53c9e8342f43c56bbc6854028e75bb9cf567634471
            • Instruction ID: cd1604332782cde7b79fd4cb231e2873d98632cac364ccc6e5adad2f40df7b8a
            • Opcode Fuzzy Hash: 6797ce520ad4e8d809bfec53c9e8342f43c56bbc6854028e75bb9cf567634471
            • Instruction Fuzzy Hash: 6B215A36A08E8186EB40DF25E84026D73A4FB88FA8F585531DE4DDB778CF38D5898750
            APIs
            • GetLastError.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EBF7
            • FlsSetValue.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC2D
            • FlsSetValue.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC5A
            • FlsSetValue.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC6B
            • FlsSetValue.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC7C
            • SetLastError.KERNEL32(?,?,000054315B38B81F,00007FF61B758B05,?,?,?,?,00007FF61B762546,?,?,00000000,00007FF61B75A3FB,?,?,?), ref: 00007FF61B75EC97
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value$ErrorLast
            • String ID:
            • API String ID: 2506987500-0
            • Opcode ID: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
            • Instruction ID: 8ef8ff5d393dcabb5a3da102212b4dd4ae4bd0424f1d6fccc3a5473d3e91861e
            • Opcode Fuzzy Hash: c7396dbfbcb47cfb6cfc33ed0fb29296ace80fe16ba5d506c85f3ecfa09c6d8f
            • Instruction Fuzzy Hash: 00116060A0DE8242FA556B2555910395152AF4CFB0F54AB38E86FC67F6DE6CF8095304
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AddressFreeHandleLibraryModuleProc
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 4061214504-1276376045
            • Opcode ID: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
            • Instruction ID: 7a604ef087283540402c43a096de879f976f1e74259940e327082464fe9880d5
            • Opcode Fuzzy Hash: 4e200ac4912f663bf200d97a0492af6b570e41165da9f834e6f0b0fe5145a0ad
            • Instruction Fuzzy Hash: E7F04F61A19E4281FA109B24E4553796320EF4DB71F942239D96EC96F4CF6CD54DC704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseDeleteOpenValue
            • String ID: Console$IpDatespecial
            • API String ID: 849931509-1840232981
            • Opcode ID: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
            • Instruction ID: 3d6b6eac819d9c9f2dfdcc2680aaf4cc6eec53c993d8eb9730cf5ce2cdb13ac8
            • Opcode Fuzzy Hash: 6e7d2c7a670a32b5de56c4a84771261a6cdbf4bc2880aa7204407435697e958c
            • Instruction Fuzzy Hash: 10F0F936A08DC285EB208B14EC147A96320EB88B7AF402131CE1D97778DE79D59E8B04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
            • Instruction ID: 9e5108ad65ffd54e4b4cdc501e88b33517f294ac58fde9509fb11f405f271e74
            • Opcode Fuzzy Hash: f957c6767cf5b81622e8ff6fae34e0b794288dc4cc0809d74a0a7b197e878a35
            • Instruction Fuzzy Hash: 01B1F422A0AF4681FE66DF1190406796394EF4CFA4F09A835DE4E8B7B5DF3CE4498748
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _set_statfp
            • String ID:
            • API String ID: 1156100317-0
            • Opcode ID: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction ID: a4a806bf52651bfae020776d75f05997109426fdfb3e7748bffa360bb8ef859d
            • Opcode Fuzzy Hash: 3a9c703ea5aaac55ee3dcba71a43574e980d604707a0521e319b1fc91c9c8b59
            • Instruction Fuzzy Hash: 2B115126E1CED301F6E8113CE44637530516F5CB70E596635EA7ECA6FA9F1CAC498304
            APIs
            • FlsGetValue.KERNEL32(?,?,?,00007FF61B7539FB,?,?,00000000,00007FF61B753C96,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B75ECCF
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B7539FB,?,?,00000000,00007FF61B753C96,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B75ECEE
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B7539FB,?,?,00000000,00007FF61B753C96,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B75ED16
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B7539FB,?,?,00000000,00007FF61B753C96,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B75ED27
            • FlsSetValue.KERNEL32(?,?,?,00007FF61B7539FB,?,?,00000000,00007FF61B753C96,?,?,?,?,?,00007FF61B753C22), ref: 00007FF61B75ED38
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
            • Instruction ID: 6c32f9f00a5bb247c3da2d31497c5a5f3cb4d823d2fb11e696c79287800aace5
            • Opcode Fuzzy Hash: 8e80255def71e26e38969c6b9ad95fb919b46607e2d80395ee43e046c775e245
            • Instruction Fuzzy Hash: 12118EA0E09E4241FA995721A5911796152AF4CFB0F04BB39E87EC66F6DE2CF8096704
            APIs
            • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F), ref: 00007FF61B75EB55
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F), ref: 00007FF61B75EB74
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F), ref: 00007FF61B75EB9C
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F), ref: 00007FF61B75EBAD
            • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF61B766E73,?,?,?,00007FF61B75F1A4,?,?,?,00007FF61B75819F), ref: 00007FF61B75EBBE
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Value
            • String ID:
            • API String ID: 3702945584-0
            • Opcode ID: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
            • Instruction ID: 4b8759cb1ea12e4386bb012a1005557498e95cf69bda0f753e374d259ffa086e
            • Opcode Fuzzy Hash: be4a96ff5b18d49a05f4adbf766956ae433ebef540c65d26a29db4b7139a2023
            • Instruction Fuzzy Hash: F1113C50E0DE4702F9996B21546197921619F4CF71F14BF38E8BFCA2F2DE6CB8095344
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
            • Instruction ID: d04a5bebb050ca0dd5e6d2350172fff035a4c1e0930a1ebe55e79a1abc0e2eb4
            • Opcode Fuzzy Hash: ec8515e0b6118a22be018e0c36bf8043355ac570717b599eb6440d7a0495df03
            • Instruction Fuzzy Hash: B111C132624985C3EB50EB65F4943A96760FB48B59F847031DB8F86A75DF3CE48AC700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
            • String ID:
            • API String ID: 1513102227-0
            • Opcode ID: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
            • Instruction ID: d81448276348b05061678af280febef9e7d15147068e172d9f3a305eb2298e8c
            • Opcode Fuzzy Hash: cdd56314798a8dc9bb9b375cd871b4762f9b413abb23fcd634828e7dcd198d12
            • Instruction Fuzzy Hash: 85113A32519F9281EB10DF29E88406873B4FB48FA8B686236D65D866B4DF38D95AC340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseHandleObjectSingleThreadWait$CurrentErrorLastSleepSwitch
            • String ID:
            • API String ID: 1535946027-0
            • Opcode ID: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
            • Instruction ID: 3ec48f3d14920ebd109e339aba0bdbe8cf9616dfcbf431b9dbdae75e56cc126b
            • Opcode Fuzzy Hash: 6bee8a0a4dea1eafbbaf25a2cc800b23e58b43f259c7b6e2f946ecae76c8c5a2
            • Instruction Fuzzy Hash: 1AF0AF75608E8586F704AF25DC941783721EB8DF75F586230DA2E8B7B4CF38D8898360
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
            • Instruction ID: f9f7dc0148a6662ae97785c38d54a4a7fdd9f861c670cc97e671c1e089648122
            • Opcode Fuzzy Hash: a53d2363c14758023286afc4a6ab41b9c25c1dd74b553e4400a7d45858c9584b
            • Instruction Fuzzy Hash: CC91B073A08B818AE711DF65E8402EC77A0FB49B98F10512AEA8D97B75DF38D199C704
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
            • String ID: csm
            • API String ID: 2395640692-1018135373
            • Opcode ID: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
            • Instruction ID: cd21e3c7ebec2168a4f5626f02128fa9b9226660e6a13defccc69c2c018b50a8
            • Opcode Fuzzy Hash: 97e6136df740a7f50eb7a5892aa497e90dc07242db7e08e9cb4e882c62b2f360
            • Instruction Fuzzy Hash: 7F51E631B19A028AEB14EF25E44863933A1EB58FA9F115135DE4E8B7B8DF7CE845C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
            • Instruction ID: 95312e4cfe59e63a86b9e74f6e9b7db3b79c843d58e85b32e4b6f1da6e21fde4
            • Opcode Fuzzy Hash: 1c7f32590a0a5e31803e0cd6c6efa8edac5466215bfbb7b2d07330e269dc0479
            • Instruction Fuzzy Hash: 1751A332A08A428AEB748F12A8442787790FB58FA6F146135DA5D87FF5CF3CE895C705
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CallEncodePointerTranslator
            • String ID: MOC$RCC
            • API String ID: 3544855599-2084237596
            • Opcode ID: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
            • Instruction ID: 6bed7bd56034911a52ad498ad2e44f98593e8e1d23f39ee656a51f270ccbfd33
            • Opcode Fuzzy Hash: b953805b3f16366bb71475c1063139944ec3feeea47b818f87e78a0e56bad00b
            • Instruction Fuzzy Hash: 0A61D132908FC581E7309B15E0407AAB7A0FB89BA9F045225EB8D53B75CF3CE188CB04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: FileWrite$ConsoleErrorLastOutput
            • String ID:
            • API String ID: 2718003287-0
            • Opcode ID: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
            • Instruction ID: 5bbd7e8f9016eeb9b31fcbc010266972de752b4117b370e24d790690b22bbbe7
            • Opcode Fuzzy Hash: 77dd5d4aa20de0d79966c3f830593b01910af74af4cc21fda2ecf357b99f0be0
            • Instruction Fuzzy Hash: 24D1B232B18E818AF711DF66D4402AC37B5FB48BA8B145236DE5D97BB9DE38D54AC300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
            • Instruction ID: 5c19f1e7f11137ab39eba84e227754c2a63907b36617bda56106226293be58f6
            • Opcode Fuzzy Hash: 7d7153dc9ae7d5b3424c28ff14d58aef55a80775f13d9447e24f61463487f32c
            • Instruction Fuzzy Hash: CDB19172F14B5585FB00CBA5D4447AC6372FB08BA9F40A225DE6D67BB9DF78A885C300
            APIs
            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF61B76B0CF), ref: 00007FF61B76B200
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF61B76B0CF), ref: 00007FF61B76B28B
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ConsoleErrorLastMode
            • String ID:
            • API String ID: 953036326-0
            • Opcode ID: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
            • Instruction ID: e46c2e154f7313a335b3db93554cf9d7ecbc775c3db63f7d507d9389840cd92a
            • Opcode Fuzzy Hash: 8d852cd364b953300601feb318994bc5f66eb9b85f3205e0d4ed1d6cdd918134
            • Instruction Fuzzy Hash: 6D91B422F08E9189F7549F6694412BD2BA0FB0AFA8F546139DE0ED67B4DF38D44AC700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 3936042273-0
            • Opcode ID: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
            • Instruction ID: 279cc7d6a1db30adca6e4c78118b48cfb05cf264a399d3963ef4c6ec1117ea23
            • Opcode Fuzzy Hash: aa83a4776d611bfa6910a88996202f0a13839e5925797b86addcbd2790bd8b35
            • Instruction Fuzzy Hash: A271C162B18F8985EA04DB25D40436C6364EB89FE0F55A631DEAC57BF5DF78E884C300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Process32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 4260596558-0
            • Opcode ID: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
            • Instruction ID: 6fa1b744eff458649220567604ab151d8557915eced523c6b8efc89f87622d4b
            • Opcode Fuzzy Hash: 7762ce93aa6985307a259bfb251e473b870e7df6f058cf487220d00444a178a1
            • Instruction Fuzzy Hash: 0271A362A19E8681EA20EB25D4442AD6361FB89FF4F446331EAAD877F4DF7CD548C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: Virtual$AllocInfoProtectQuerySystem
            • String ID:
            • API String ID: 3562403962-0
            • Opcode ID: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
            • Instruction ID: 4e3e6e7edc5fe6f543055f4ca6cc4e643d8d94978187ada34385a8f1b6764dfd
            • Opcode Fuzzy Hash: 8276b17d3f0086b027f55cc71dd443fed715192864dd3a3d0b6a65bee2902499
            • Instruction Fuzzy Hash: 8D314A32714A819EEB20DF35D8547E923A5FB4DB98F845025EA4D8BB68DF38E649C700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CriticalSection$Leave$EnterEvent
            • String ID:
            • API String ID: 3394196147-0
            • Opcode ID: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
            • Instruction ID: 9ea8814df7a2da8920ea86db1457cd152cfc9373ba2274778c0f81632f344aac
            • Opcode Fuzzy Hash: ee59a16ddcb61b2f30476306e2c70f7e991c931b41d410101ed0a7d795a74e2b
            • Instruction Fuzzy Hash: 2B212432704B8193E788CB2AE5802A9B3A4FB48B94F545035DB6E83775DF38E8A5C740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
            • Instruction ID: b6844c9e765eb688292c2c8e723f806db0de5e722a66a78cbebbdac070795402
            • Opcode Fuzzy Hash: cc56691cd60568e6146a7dde9c83608ec099c6c6a56f3e0ff612a8b3836fe06a
            • Instruction Fuzzy Hash: 7A111C26B18F018AEB009F60E8542A833A4FB1DB68F842E31DA6D867B4DF78D1588340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ObjectSingleWait$Sleep
            • String ID:
            • API String ID: 2961732021-0
            • Opcode ID: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
            • Instruction ID: e76cd71b412ccf9525e3d7785bd9a055e8a51a79e5802d8e4a5f17d7011c4eac
            • Opcode Fuzzy Hash: 4ede45267323656183b3c0ec57ef8ecec2c46d3b5a24cc8965c2015fc5653a59
            • Instruction Fuzzy Hash: 6AF0DA72609E8586E740AB39D8942283761EF8DF35F551330CA2D8B7F4CF38C8898350
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID: ^(T[A-Za-z0-9]*|0x[A-Za-z0-9]*)$
            • API String ID: 3668304517-660079095
            • Opcode ID: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
            • Instruction ID: 2f630d003557d6a2d2b7b43d293f86103366c01cde778ac7197ec546c481e840
            • Opcode Fuzzy Hash: 1a7bd3f9ad1e2be3bb215426da79a080b2b48fcb5330e2929561e3c4d22847e3
            • Instruction Fuzzy Hash: 7C817A72B19B8189EB50DF65E4403AC37A5EB4CBA9F046235EA5D83BB8DF38D558C340
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: __except_validate_context_record
            • String ID: csm$csm
            • API String ID: 1467352782-3733052814
            • Opcode ID: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
            • Instruction ID: 30a64344b3152b832b6b6d5e8041db6f30e6589e60d78c26557d1ee725744641
            • Opcode Fuzzy Hash: 2e13650262a6f61ea207b4025eb27adbf5cb157b43e28d55221f4b040b54e9a1
            • Instruction Fuzzy Hash: 6171E372508A8186DB609F21D04037D7BA0FB09FA5F08A135EE8C87AB9CF3CD699C745
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CloseHandlewsprintf
            • String ID: %s_bin
            • API String ID: 3088109604-2665034546
            • Opcode ID: 38539e2762eca19275933df481f064c263753660025e23b79f8a6f04b4997217
            • Instruction ID: dee9650d37daecd41cf9dd1141d36a67a601f0dd1cfe3929755d1adcbb61db37
            • Opcode Fuzzy Hash: 38539e2762eca19275933df481f064c263753660025e23b79f8a6f04b4997217
            • Instruction Fuzzy Hash: C251DE62B29EA685EB60DB21C414AB92365EF88F64F469136DA0D877F1DF3CD809C301
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: _get_daylight$_invalid_parameter_noinfo
            • String ID: ?
            • API String ID: 1286766494-1684325040
            • Opcode ID: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
            • Instruction ID: 645158cacaa5eaf3ff32efde33e4ddd43af031c44272d836642c28812d33b5e9
            • Opcode Fuzzy Hash: 0b7c1d742c13ddddedbe4d6e2c5e7ad1023c035335ca7369220edd5dde904ae5
            • Instruction Fuzzy Hash: F0412822A08BC246FB609B26E45537A6660EB88FB4F146235EE5C87EF5DF3CD449C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: CreateFrameInfo__except_validate_context_record
            • String ID: csm
            • API String ID: 2558813199-1018135373
            • Opcode ID: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
            • Instruction ID: ff4e52510171df3ee15c68973c19b3f879e1b707bf0888d4962bcd9771ad8954
            • Opcode Fuzzy Hash: 503767daf86984436527780b72ab736630531d0d6d2b9058069c45c3b2766ca2
            • Instruction Fuzzy Hash: CC515E32A18B4196E660EB25E44026D77A4FB8DFA0F142134EB8D87B75CF3CE464CB05
            APIs
            • _invalid_parameter_noinfo.LIBCMT ref: 00007FF61B75BFB6
              • Part of subcall function 00007FF61B75E6BC: RtlFreeHeap.NTDLL(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6D2
              • Part of subcall function 00007FF61B75E6BC: GetLastError.KERNEL32(?,?,?,00007FF61B7665C2,?,?,?,00007FF61B76693F,?,?,00000000,00007FF61B766D85,?,?,?,00007FF61B766CB7), ref: 00007FF61B75E6DC
            • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF61B74DF31), ref: 00007FF61B75BFD4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
            • String ID: C:\Users\user\Desktop\WgnsGjhA3P.exe
            • API String ID: 3580290477-2952926942
            • Opcode ID: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
            • Instruction ID: d1b6aa92d66041a44daa8bf55f6ba2151e31611d0693cfe90f0ecad59e659766
            • Opcode Fuzzy Hash: 3a5b6248115956fb8c5867fcb2c099a73d6e8c573ad95eb16c3a51b61da9d299
            • Instruction Fuzzy Hash: 5D418F76A08F1285E714EF25D8501B867A4FF48FA0B546039E94EC3BB5DE3CE8498744
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorFileLastWrite
            • String ID: U
            • API String ID: 442123175-4171548499
            • Opcode ID: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
            • Instruction ID: 8a19306f1512b542d37c58ab687e404548b9a05627088a7523c0d39ee3c2dd7f
            • Opcode Fuzzy Hash: 54112263acd02f42df0a8cef6501b04abbfb211da2f70ad802a6942ee1910395
            • Instruction Fuzzy Hash: 0B419172A18E8185EB209F25E4443A967A0FB98BA4F815035EE4EC77B8EF3CD449C740
            APIs
            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B731111), ref: 00007FF61B7500A0
            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF61B731111), ref: 00007FF61B7500E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
            • Instruction ID: 969f06deea9cbb7b8421cf4261f9f17051d98fc79d25de3bd6121cc2b404670c
            • Opcode Fuzzy Hash: 3c98ac448948905eff4ad47a47963f754950c65019d46630b15deedf807f34ab
            • Instruction Fuzzy Hash: 24114632618F8082EB218B25E410269B7E1FB8CBA4F585231EA8C47B78DF3CC9558B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.4113693106.00007FF61B731000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61B730000, based on PE: true
            • Associated: 00000000.00000002.4113676280.00007FF61B730000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113721372.00007FF61B76F000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113741510.00007FF61B785000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113758728.00007FF61B788000.00000008.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113776992.00007FF61B78C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.4113795240.00007FF61B790000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff61b730000_WgnsGjhA3P.jbxd
            Similarity
            • API ID: ErrorLastRead
            • String ID:
            • API String ID: 4100373531-0
            • Opcode ID: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
            • Instruction ID: 7b282fc94866a2dac40d2a72bcf26e54216224b5b46c4d1e3d29202d17fdffce
            • Opcode Fuzzy Hash: e0e517c51036cec7b570afbeb596ed896a79d3929b09d4426d0e27ecdcf8b3b8
            • Instruction Fuzzy Hash: 5B413A62B09B4287EB109B2AE54427973A0FB48FA5F046435CF4E87B64DF3CE4A9C700